}
mem_ctx = talloc_init("sec_desc");
- error = reg_get_sec_desc(mem_ctx, p, &sec_desc);
- if (!W_ERROR_IS_OK(error)) {
- DEBUG(0, ("Error getting security descriptor: - %s\n",
- win_errstr(error)));
+ if (!W_ERROR_IS_OK(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
+ DEBUG(0, ("Error getting security descriptor\n"));
}
talloc_free(mem_ctx);
}
(void **)&ret, &converted_size);
break;
case REG_DWORD:
- ret = talloc_asprintf(mem_ctx, "0x%8.8x",
- RIVAL(data.data, 0));
- break;
case REG_DWORD_BIG_ENDIAN:
+ SMB_ASSERT(data.length == sizeof(uint32_t));
ret = talloc_asprintf(mem_ctx, "0x%8.8x",
IVAL(data.data, 0));
break;
case REG_QWORD:
+ SMB_ASSERT(data.length == sizeof(uint64_t));
ret = talloc_asprintf(mem_ctx, "0x%16.16llx",
(long long)BVAL(data.data, 0));
break;