According to "librpc/gen_ndr/security.h" they need to be "uint32_t".
const struct security_token *token)
{
uint32_t denied = 0, granted = 0;
- unsigned i;
+ uint32_t i;
if (security_token_has_sid(token, sd->owner_sid)) {
granted |= SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL | SEC_STD_DELETE;
uint32_t access_desired,
uint32_t *access_granted)
{
- int i;
+ uint32_t i;
uint32_t bits_remaining;
*access_granted = access_desired;
struct object_tree *tree,
struct dom_sid *replace_sid)
{
- int i;
+ uint32_t i;
uint32_t bits_remaining;
struct object_tree *node;
const struct GUID *type;
return NT_STATUS_OK;
}
-
-
-
struct dom_sid *group,
struct GUID *object_list)
{
- int i;
+ uint32_t i;
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
struct security_acl *tmp_acl = talloc_zero(mem_ctx, struct security_acl);
struct dom_sid *co, *cg;
struct dom_sid *group,
struct GUID *object_list)
{
- int i;
+ uint32_t i;
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
struct security_acl *tmp_acl = talloc_zero(tmp_ctx, struct security_acl);
struct security_acl *new_acl;
void security_token_debug(int dbg_lev, const struct security_token *token)
{
TALLOC_CTX *mem_ctx;
- int i;
+ uint32_t i;
if (!token) {
DEBUG(dbg_lev, ("Security token: (NULL)\n"));
bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid)
{
- int i;
+ uint32_t i;
for (i = 0; i < token->num_sids; i++) {
if (dom_sid_equal(&token->sids[i], sid)) {
return true;