s4:RPC server - cosmetic fixes - indentation, comments
authorMatthias Dieter Wallnöfer <mdw@samba.org>
Wed, 3 Nov 2010 08:23:00 +0000 (09:23 +0100)
committerMatthias Dieter Wallnöfer <mdw@samba.org>
Wed, 3 Nov 2010 08:23:00 +0000 (09:23 +0100)
source4/rpc_server/common/reply.c
source4/rpc_server/dcerpc_server.c
source4/rpc_server/dcesrv_auth.c

index d883317d6e4ad14f8727ef00a33148508eb1c404..e5d97d17d15ac524157664311d2a143c8a4d165e 100644 (file)
@@ -206,7 +206,8 @@ _PUBLIC_ NTSTATUS dcesrv_reply(struct dcesrv_call_state *call)
                length = MIN(chunk_size, stub.length);
 
                /* form the dcerpc response packet */
-               dcesrv_init_hdr(&pkt, lpcfg_rpc_big_endian(call->conn->dce_ctx->lp_ctx));
+               dcesrv_init_hdr(&pkt,
+                               lpcfg_rpc_big_endian(call->conn->dce_ctx->lp_ctx));
                pkt.auth_length = 0;
                pkt.call_id = call->pkt.call_id;
                pkt.ptype = DCERPC_PKT_RESPONSE;
index 0dc00e524afa42fc25c4699f4506f8a0c1c704b0..061d8e80b2b1d34312c8d4e5f3e25841f278c526 100644 (file)
@@ -1046,8 +1046,8 @@ NTSTATUS dcesrv_process_ncacn_packet(struct dcesrv_connection *dce_conn,
                        return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
                }
 
-               /* this is a continuation of an existing call - find the call then
-                  tack it on the end */
+               /* this is a continuation of an existing call - find the call
+                  then tack it on the end */
                call = dcesrv_find_fragmented_call(dce_conn, call2->pkt.call_id);
                if (!call) {
                        return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
index c7f3cdecc15d72bb9dba3a7faf56b5fb6b96b4e8..4c91fcb392b8d3b210b932f323f1b380b4d4dfb8 100644 (file)
@@ -395,8 +395,8 @@ bool dcesrv_auth_response(struct dcesrv_call_state *call,
 
        case DCERPC_AUTH_LEVEL_CONNECT:
                /*
-                * TODO: let the gensec mech decide if it wants to generate a signature
-                *       that might be needed for schannel...
+                * TODO: let the gensec mech decide if it wants to generate a
+                *       signature that might be needed for schannel...
                 */
                status = ncacn_push_auth(blob, call, pkt, NULL);
                return NT_STATUS_IS_OK(status);
@@ -430,7 +430,8 @@ bool dcesrv_auth_response(struct dcesrv_call_state *call,
           of the stub */
        dce_conn->auth_state.auth_info->auth_pad_length =
                (16 - (pkt->u.response.stub_and_verifier.length & 15)) & 15;
-       ndr_err = ndr_push_zero(ndr, dce_conn->auth_state.auth_info->auth_pad_length);
+       ndr_err = ndr_push_zero(ndr,
+                               dce_conn->auth_state.auth_info->auth_pad_length);
        if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
                return false;
        }
@@ -443,7 +444,7 @@ bool dcesrv_auth_response(struct dcesrv_call_state *call,
 
        /* add the auth verifier */
        ndr_err = ndr_push_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS,
-                                     dce_conn->auth_state.auth_info);
+                                      dce_conn->auth_state.auth_info);
        if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
                return false;
        }