Signed-off-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Uri Simchoni <uri@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
struct wb_acct_info **pinfo)
{
struct rpc_pipe_client *samr_pipe;
struct wb_acct_info **pinfo)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
struct wb_acct_info *info = NULL;
uint32_t num_info = 0;
TALLOC_CTX *tmp_ctx;
struct wb_acct_info *info = NULL;
uint32_t num_info = 0;
TALLOC_CTX *tmp_ctx;
DEBUG(3,("sam_enum_dom_groups\n"));
DEBUG(3,("sam_enum_dom_groups\n"));
- ZERO_STRUCT(dom_pol);
-
if (pnum_info) {
*pnum_info = 0;
}
if (pnum_info) {
*pnum_info = 0;
}
uint32_t **prids)
{
struct rpc_pipe_client *samr_pipe = NULL;
uint32_t **prids)
{
struct rpc_pipe_client *samr_pipe = NULL;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
uint32_t *rids;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
uint32_t *rids;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
DEBUG(3,("samr_query_user_list\n"));
DEBUG(3,("samr_query_user_list\n"));
- ZERO_STRUCT(dom_pol);
-
*prids = NULL;
tmp_ctx = talloc_stackframe();
*prids = NULL;
tmp_ctx = talloc_stackframe();
struct netr_DomainTrustList *ptrust_list)
{
struct rpc_pipe_client *lsa_pipe;
struct netr_DomainTrustList *ptrust_list)
{
struct rpc_pipe_client *lsa_pipe;
- struct policy_handle lsa_policy;
+ struct policy_handle lsa_policy = { 0 };
struct netr_DomainTrust *trusts = NULL;
uint32_t num_trusts = 0;
TALLOC_CTX *tmp_ctx;
struct netr_DomainTrust *trusts = NULL;
uint32_t num_trusts = 0;
TALLOC_CTX *tmp_ctx;
DEBUG(3,("samr: trusted domains\n"));
DEBUG(3,("samr: trusted domains\n"));
- ZERO_STRUCT(lsa_policy);
-
if (ptrust_list) {
ZERO_STRUCTP(ptrust_list);
}
if (ptrust_list) {
ZERO_STRUCTP(ptrust_list);
}
uint32_t **pname_types)
{
struct rpc_pipe_client *samr_pipe;
uint32_t **pname_types)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
uint32_t num_names = 0;
struct dom_sid *sid_mem = NULL;
uint32_t num_names = 0;
struct dom_sid *sid_mem = NULL;
DEBUG(3,("sam_lookup_groupmem\n"));
DEBUG(3,("sam_lookup_groupmem\n"));
- ZERO_STRUCT(dom_pol);
-
/* Paranoia check */
if (sid_check_is_in_builtin(group_sid) && (type != SID_NAME_ALIAS)) {
/* There's no groups, only aliases in BUILTIN */
/* Paranoia check */
if (sid_check_is_in_builtin(group_sid) && (type != SID_NAME_ALIAS)) {
/* There's no groups, only aliases in BUILTIN */
struct wb_acct_info **pinfo)
{
struct rpc_pipe_client *samr_pipe;
struct wb_acct_info **pinfo)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
struct wb_acct_info *info = NULL;
uint32_t num_info = 0;
TALLOC_CTX *tmp_ctx;
struct wb_acct_info *info = NULL;
uint32_t num_info = 0;
TALLOC_CTX *tmp_ctx;
DEBUG(3,("samr: enum local groups\n"));
DEBUG(3,("samr: enum local groups\n"));
- ZERO_STRUCT(dom_pol);
-
if (pnum_info) {
*pnum_info = 0;
}
if (pnum_info) {
*pnum_info = 0;
}
enum lsa_SidType *ptype)
{
struct rpc_pipe_client *lsa_pipe;
enum lsa_SidType *ptype)
{
struct rpc_pipe_client *lsa_pipe;
- struct policy_handle lsa_policy;
+ struct policy_handle lsa_policy = { 0 };
struct dom_sid sid;
enum lsa_SidType type;
TALLOC_CTX *tmp_ctx;
struct dom_sid sid;
enum lsa_SidType type;
TALLOC_CTX *tmp_ctx;
DEBUG(3,("sam_name_to_sid\n"));
DEBUG(3,("sam_name_to_sid\n"));
- ZERO_STRUCT(lsa_policy);
-
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
enum lsa_SidType *ptype)
{
struct rpc_pipe_client *lsa_pipe;
enum lsa_SidType *ptype)
{
struct rpc_pipe_client *lsa_pipe;
- struct policy_handle lsa_policy;
+ struct policy_handle lsa_policy = { 0 };
char *domain_name = NULL;
char *name = NULL;
enum lsa_SidType type;
char *domain_name = NULL;
char *name = NULL;
enum lsa_SidType type;
DEBUG(3,("sam_sid_to_name\n"));
DEBUG(3,("sam_sid_to_name\n"));
- ZERO_STRUCT(lsa_policy);
-
/* Paranoia check */
if (!sid_check_is_in_builtin(sid) &&
!sid_check_is_builtin(sid) &&
/* Paranoia check */
if (!sid_check_is_in_builtin(sid) &&
!sid_check_is_builtin(sid) &&
enum lsa_SidType **ptypes)
{
struct rpc_pipe_client *lsa_pipe;
enum lsa_SidType **ptypes)
{
struct rpc_pipe_client *lsa_pipe;
- struct policy_handle lsa_policy;
+ struct policy_handle lsa_policy = { 0 };
enum lsa_SidType *types = NULL;
char *domain_name = NULL;
char **names = NULL;
enum lsa_SidType *types = NULL;
char *domain_name = NULL;
char **names = NULL;
DEBUG(3,("sam_rids_to_names for %s\n", domain->name));
DEBUG(3,("sam_rids_to_names for %s\n", domain->name));
- ZERO_STRUCT(lsa_policy);
-
/* Paranoia check */
if (!sid_check_is_builtin(domain_sid) &&
!sid_check_is_our_sam(domain_sid) &&
/* Paranoia check */
if (!sid_check_is_builtin(domain_sid) &&
!sid_check_is_our_sam(domain_sid) &&
struct samr_DomInfo12 *lockout_policy)
{
struct rpc_pipe_client *samr_pipe;
struct samr_DomInfo12 *lockout_policy)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
union samr_DomainInfo *info = NULL;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
union samr_DomainInfo *info = NULL;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
DEBUG(3,("sam_lockout_policy\n"));
DEBUG(3,("sam_lockout_policy\n"));
- ZERO_STRUCT(dom_pol);
-
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
struct samr_DomInfo1 *passwd_policy)
{
struct rpc_pipe_client *samr_pipe;
struct samr_DomInfo1 *passwd_policy)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
union samr_DomainInfo *info = NULL;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
union samr_DomainInfo *info = NULL;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
DEBUG(3,("sam_password_policy\n"));
DEBUG(3,("sam_password_policy\n"));
- ZERO_STRUCT(dom_pol);
-
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
tmp_ctx = talloc_stackframe();
if (tmp_ctx == NULL) {
return NT_STATUS_NO_MEMORY;
uint32_t **palias_rids)
{
struct rpc_pipe_client *samr_pipe;
uint32_t **palias_rids)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
uint32_t num_aliases = 0;
uint32_t *alias_rids = NULL;
TALLOC_CTX *tmp_ctx;
uint32_t num_aliases = 0;
uint32_t *alias_rids = NULL;
TALLOC_CTX *tmp_ctx;
DEBUG(3,("sam_lookup_useraliases\n"));
DEBUG(3,("sam_lookup_useraliases\n"));
- ZERO_STRUCT(dom_pol);
-
if (pnum_aliases) {
*pnum_aliases = 0;
}
if (pnum_aliases) {
*pnum_aliases = 0;
}
uint32_t *pseq)
{
struct rpc_pipe_client *samr_pipe;
uint32_t *pseq)
{
struct rpc_pipe_client *samr_pipe;
- struct policy_handle dom_pol;
+ struct policy_handle dom_pol = { 0 };
uint32_t seq = DOM_SEQUENCE_NONE;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
uint32_t seq = DOM_SEQUENCE_NONE;
TALLOC_CTX *tmp_ctx;
NTSTATUS status, result;
DEBUG(3,("samr: sequence number\n"));
DEBUG(3,("samr: sequence number\n"));
- ZERO_STRUCT(dom_pol);
-
if (pseq) {
*pseq = DOM_SEQUENCE_NONE;
}
if (pseq) {
*pseq = DOM_SEQUENCE_NONE;
}