}
bool _async_req_setup(TALLOC_CTX *mem_ctx, struct async_req **preq,
- void *pstate, size_t state_size, const char *typename)
+ void *pstate, size_t state_size, const char *_typename)
{
struct async_req *req;
void **ppstate = (void **)pstate;
TALLOC_FREE(req);
return false;
}
- talloc_set_name_const(state, typename);
+ talloc_set_name_const(state, _typename);
req->private_data = state;
*preq = req;
void (*trigger)(struct async_req *req));
bool _async_req_setup(TALLOC_CTX *mem_ctx, struct async_req **preq,
- void *pstate, size_t state_size, const char *typename);
+ void *pstate, size_t state_size, const char *_typename);
#define async_req_setup(_mem_ctx, _preq, _pstate, type) \
_async_req_setup((_mem_ctx), (_preq), (_pstate), sizeof(type), #type)
connection_struct *conn = handle->conn;
uint32_t caps = FILE_CASE_SENSITIVE_SEARCH | FILE_CASE_PRESERVED_NAMES;
SMB_STRUCT_STAT st;
- NTSTATUS status;
struct timespec mtime_ts, ctime_ts, atime_ts;
int ret = -1;
struct samr_Password new_password;
des_crypt112_16(new_password.hash,
- new_trust_passwd_hash,
+ (unsigned char *)new_trust_passwd_hash,
cli->dc->sess_key, 1);
result = rpccli_netr_ServerPasswordSet(cli, mem_ctx,
uint32 rid;
bool ret = false;
struct samu *pwd = NULL;
- uint32_t acc_required, acc_granted;
+ uint32_t acc_required, acc_granted = 0;
/* search for the handle */
if (!find_policy_by_hnd(p, r->in.user_handle, (void **)(void *)&info))