#define UNI_XDIGIT 0x8
#define UNI_SPACE 0x10
+#ifdef HAVE_NSS_H
+#include <nss.h>
+#else
+
+/* Minimal needed to compile.. */
+
+enum nss_status {
+ NSS_STATUS_SUCCESS,
+ NSS_STATUS_NOTFOUND,
+ NSS_STATUS_UNAVAIL
+};
+
+#endif
+
/***** automatically generated prototypes *****/
#include "proto.h"
#define MAX_SEC_CTX_DEPTH 8 /* Maximum number of security contexts */
-#ifdef HAVE_NSS_H
-#include <nss.h>
-#else
-
-/* Minimal needed to compile.. */
-
-enum nss_status {
- NSS_STATUS_SUCCESS,
- NSS_STATUS_NOTFOUND,
- NSS_STATUS_UNAVAIL
-};
-
-#endif
-
#endif /* _INCLUDES_H */
{
DOM_SID user_sid, group_sid;
DOM_SID **group_sids = NULL;
- int i, j, ngroup_sids = 0;
+ int i, j;
+ uint ngroup_sids = 0;
SEC_ACL *acl;
uint8 check_ace_type;
{
DOM_SID *dyn_sid;
fstring key;
- int size;
+ size_t size;
slprintf(key, sizeof(key), "%s/%s", SECRETS_DOMAIN_SID, domain);
dyn_sid = (DOM_SID *)secrets_fetch(key, &size);
********************************************************************/
BOOL new_smb_io_job_info_2(char *desc, NEW_BUFFER *buffer, JOB_INFO_2 *info, int depth)
{
- int pipo=0;
+ uint pipo=0;
prs_struct *ps=&(buffer->prs);
prs_debug(ps, depth, desc, "new_smb_io_job_info_2");
return ERROR_INVALID_HANDLE;
}
- (*buffer_written) = print_job_write(Printer->jobid, buffer, buffer_size);
+ (*buffer_written) = print_job_write(Printer->jobid, (char *)buffer,
+ buffer_size);
return 0x0;
}
/****************************************************************************
initialise custom vfs hooks
****************************************************************************/
+
#ifdef HAVE_LIBDL
BOOL vfs_init_custom(connection_struct *conn)
{
/* Get handle on vfs_init() symbol */
- fptr = dlsym(handle, "vfs_init");
+ fptr = (struct vfs_ops *(*)(struct vfs_options *))
+ dlsym(handle, "vfs_init");
if (fptr == NULL) {
DEBUG(0, ("No vfs_init() symbol found in %s\n",