summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRichard Sharpe <rsharpe@samba.org>2015-05-09 07:33:08 -0700
committerJeremy Allison <jra@samba.org>2015-05-12 01:32:12 +0200
commit1ef68eb6809fb4fd6d4981a302a86644a6ee0313 (patch)
treee13e26d016b0e32fe2271dec359e6d1c1c082026
parent1e776786488f7fb2b26af45bdabc6d41579725ac (diff)
downloadsamba-1ef68eb6809fb4fd6d4981a302a86644a6ee0313.tar.gz
Convert all uint32/16/8 to _t in source3/rpcclient.
Signed-off-by: Richard Sharpe <rsharpe@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
-rw-r--r--source3/rpcclient/cmd_dfs.c10
-rw-r--r--source3/rpcclient/cmd_echo.c8
-rw-r--r--source3/rpcclient/cmd_lsarpc.c32
-rw-r--r--source3/rpcclient/cmd_netlogon.c4
-rw-r--r--source3/rpcclient/cmd_samr.c88
-rw-r--r--source3/rpcclient/cmd_shutdown.c2
-rw-r--r--source3/rpcclient/cmd_spoolss.c2
-rw-r--r--source3/rpcclient/cmd_srvsvc.c18
8 files changed, 82 insertions, 82 deletions
diff --git a/source3/rpcclient/cmd_dfs.c b/source3/rpcclient/cmd_dfs.c
index 59fafe928b1..43d17b34608 100644
--- a/source3/rpcclient/cmd_dfs.c
+++ b/source3/rpcclient/cmd_dfs.c
@@ -58,7 +58,7 @@ static WERROR cmd_dfs_add(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
NTSTATUS result;
WERROR werr;
const char *path, *servername, *sharename, *comment;
- uint32 flags = 0;
+ uint32_t flags = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;
if (argc != 5) {
@@ -149,7 +149,7 @@ static void display_dfs_info_3(struct dfs_Info3 *info3)
/* Display a DFS_INFO_CTR structure */
-static void display_dfs_info(uint32 level, union dfs_Info *ctr)
+static void display_dfs_info(uint32_t level, union dfs_Info *ctr)
{
switch (level) {
case 0x01:
@@ -202,7 +202,7 @@ static WERROR cmd_dfs_enum(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
NTSTATUS result;
WERROR werr;
- uint32 total = 0;
+ uint32_t total = 0;
if (argc > 2) {
printf("Usage: %s [info_level]\n", argv[0]);
@@ -253,7 +253,7 @@ static WERROR cmd_dfs_enumex(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
NTSTATUS result;
WERROR werr;
- uint32 total = 0;
+ uint32_t total = 0;
if (argc < 2 || argc > 3) {
printf("Usage: %s dfs_name [info_level]\n", argv[0]);
@@ -296,7 +296,7 @@ static WERROR cmd_dfs_getinfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
NTSTATUS result;
WERROR werr;
const char *path, *servername, *sharename;
- uint32 info_level = 1;
+ uint32_t info_level = 1;
union dfs_Info ctr;
struct dcerpc_binding_handle *b = cli->binding_handle;
diff --git a/source3/rpcclient/cmd_echo.c b/source3/rpcclient/cmd_echo.c
index c1c97e339d7..b6072be0799 100644
--- a/source3/rpcclient/cmd_echo.c
+++ b/source3/rpcclient/cmd_echo.c
@@ -26,7 +26,7 @@ static NTSTATUS cmd_echo_add_one(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct
int argc, const char **argv)
{
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 request = 1, response;
+ uint32_t request = 1, response;
NTSTATUS status;
if (argc > 2) {
@@ -53,7 +53,7 @@ static NTSTATUS cmd_echo_data(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
int argc, const char **argv)
{
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 size, i;
+ uint32_t size, i;
NTSTATUS status;
uint8_t *in_data = NULL, *out_data = NULL;
@@ -105,7 +105,7 @@ static NTSTATUS cmd_echo_source_data(struct rpc_pipe_client *cli,
const char **argv)
{
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 size, i;
+ uint32_t size, i;
NTSTATUS status;
uint8_t *out_data = NULL;
@@ -146,7 +146,7 @@ static NTSTATUS cmd_echo_sink_data(struct rpc_pipe_client *cli, TALLOC_CTX *mem_
int argc, const char **argv)
{
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 size, i;
+ uint32_t size, i;
NTSTATUS status;
uint8_t *in_data = NULL;
diff --git a/source3/rpcclient/cmd_lsarpc.c b/source3/rpcclient/cmd_lsarpc.c
index a6c3280c2fe..2fa04a27752 100644
--- a/source3/rpcclient/cmd_lsarpc.c
+++ b/source3/rpcclient/cmd_lsarpc.c
@@ -161,7 +161,7 @@ static NTSTATUS cmd_lsa_query_info_policy(struct rpc_pipe_client *cli,
union lsa_PolicyInformation *info = NULL;
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 info_class = 3;
+ uint32_t info_class = 3;
if (argc > 2) {
printf("Usage: %s [info_class]\n", argv[0]);
@@ -546,7 +546,7 @@ static NTSTATUS cmd_lsa_enum_trust_dom(struct rpc_pipe_client *cli,
struct dcerpc_binding_handle *b = cli->binding_handle;
/* defaults, but may be changed using params */
- uint32 enum_ctx = 0;
+ uint32_t enum_ctx = 0;
int i;
uint32_t max_size = (uint32_t)-1;
@@ -617,8 +617,8 @@ static NTSTATUS cmd_lsa_enum_privilege(struct rpc_pipe_client *cli,
struct lsa_PrivArray priv_array;
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 enum_context=0;
- uint32 pref_max_length=0x1000;
+ uint32_t enum_context=0;
+ uint32_t pref_max_length=0x1000;
int i;
if (argc > 3) {
@@ -679,9 +679,9 @@ static NTSTATUS cmd_lsa_get_dispname(struct rpc_pipe_client *cli,
NTSTATUS status, result;
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint16 lang_id=0;
- uint16 lang_id_sys=0;
- uint16 lang_id_desc;
+ uint16_t lang_id=0;
+ uint16_t lang_id_sys=0;
+ uint16_t lang_id_desc;
struct lsa_String lsa_name;
struct lsa_StringLarge *description = NULL;
@@ -732,8 +732,8 @@ static NTSTATUS cmd_lsa_enum_sids(struct rpc_pipe_client *cli,
NTSTATUS status, result;
struct dcerpc_binding_handle *b = cli->binding_handle;
- uint32 enum_context=0;
- uint32 pref_max_length=0x1000;
+ uint32_t enum_context=0;
+ uint32_t pref_max_length=0x1000;
struct lsa_SidArray sid_array;
int i;
@@ -792,7 +792,7 @@ static NTSTATUS cmd_lsa_create_account(struct rpc_pipe_client *cli,
struct policy_handle dom_pol;
struct policy_handle user_pol;
NTSTATUS status, result;
- uint32 des_access = 0x000f000f;
+ uint32_t des_access = 0x000f000f;
struct dcerpc_binding_handle *b = cli->binding_handle;
struct dom_sid sid;
@@ -844,7 +844,7 @@ static NTSTATUS cmd_lsa_enum_privsaccounts(struct rpc_pipe_client *cli,
struct policy_handle dom_pol;
struct policy_handle user_pol;
NTSTATUS status, result;
- uint32 access_desired = 0x000f000f;
+ uint32_t access_desired = 0x000f000f;
struct dom_sid sid;
struct lsa_PrivilegeSet *privs = NULL;
int i;
@@ -1136,7 +1136,7 @@ static NTSTATUS cmd_lsa_query_secobj(struct rpc_pipe_client *cli,
struct policy_handle pol;
NTSTATUS status, result;
struct sec_desc_buf *sdb;
- uint32 sec_info = SECINFO_DACL;
+ uint32_t sec_info = SECINFO_DACL;
struct dcerpc_binding_handle *b = cli->binding_handle;
if (argc < 1 || argc > 2) {
@@ -1222,7 +1222,7 @@ static NTSTATUS cmd_lsa_query_trustdominfobysid(struct rpc_pipe_client *cli,
struct policy_handle pol;
NTSTATUS status, result;
struct dom_sid dom_sid;
- uint32 access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
union lsa_TrustedDomainInfo *info = NULL;
enum lsa_TrustDomInfoEnum info_class = 1;
DATA_BLOB session_key;
@@ -1277,7 +1277,7 @@ static NTSTATUS cmd_lsa_query_trustdominfobyname(struct rpc_pipe_client *cli,
{
struct policy_handle pol;
NTSTATUS status, result;
- uint32 access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
union lsa_TrustedDomainInfo *info = NULL;
enum lsa_TrustDomInfoEnum info_class = 1;
struct lsa_String trusted_domain;
@@ -1332,7 +1332,7 @@ static NTSTATUS cmd_lsa_set_trustdominfo(struct rpc_pipe_client *cli,
{
struct policy_handle pol, trustdom_pol;
NTSTATUS status, result;
- uint32 access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
union lsa_TrustedDomainInfo info;
struct dom_sid dom_sid;
enum lsa_TrustDomInfoEnum info_class = 1;
@@ -1402,7 +1402,7 @@ static NTSTATUS cmd_lsa_query_trustdominfo(struct rpc_pipe_client *cli,
{
struct policy_handle pol, trustdom_pol;
NTSTATUS status, result;
- uint32 access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
union lsa_TrustedDomainInfo *info = NULL;
struct dom_sid dom_sid;
enum lsa_TrustDomInfoEnum info_class = 1;
diff --git a/source3/rpcclient/cmd_netlogon.c b/source3/rpcclient/cmd_netlogon.c
index 1af68f98681..0a8ab205f8a 100644
--- a/source3/rpcclient/cmd_netlogon.c
+++ b/source3/rpcclient/cmd_netlogon.c
@@ -213,7 +213,7 @@ static WERROR cmd_netlogon_dsr_getdcname(struct rpc_pipe_client *cli,
{
NTSTATUS result;
WERROR werr = WERR_OK;
- uint32 flags = DS_RETURN_DNS_NAME;
+ uint32_t flags = DS_RETURN_DNS_NAME;
const char *server_name = cli->desthost;
const char *domain_name;
struct GUID domain_guid = GUID_zero();
@@ -776,7 +776,7 @@ static NTSTATUS cmd_netlogon_sam_logon(struct rpc_pipe_client *cli,
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
int logon_type = NetlogonNetworkInformation;
const char *username, *password;
- uint32 logon_param = 0;
+ uint32_t logon_param = 0;
const char *workstation = NULL;
struct netr_SamInfo3 *info3 = NULL;
diff --git a/source3/rpcclient/cmd_samr.c b/source3/rpcclient/cmd_samr.c
index 87882c3ce4e..19ae0aa30ea 100644
--- a/source3/rpcclient/cmd_samr.c
+++ b/source3/rpcclient/cmd_samr.c
@@ -316,10 +316,10 @@ static NTSTATUS cmd_samr_query_user(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol, user_pol;
NTSTATUS status, result;
- uint32 info_level = 21;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t info_level = 21;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
union samr_UserInfo *info = NULL;
- uint32 user_rid = 0;
+ uint32_t user_rid = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;
if ((argc < 2) || (argc > 4)) {
@@ -539,9 +539,9 @@ static NTSTATUS cmd_samr_query_group(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol, group_pol;
NTSTATUS status, result;
enum samr_GroupInfoEnum info_level = GROUPINFOALL;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
union samr_GroupInfo *group_info = NULL;
- uint32 group_rid;
+ uint32_t group_rid;
struct dcerpc_binding_handle *b = cli->binding_handle;
if ((argc < 2) || (argc > 4)) {
@@ -624,8 +624,8 @@ static NTSTATUS cmd_samr_query_usergroups(struct rpc_pipe_client *cli,
domain_pol,
user_pol;
NTSTATUS status, result;
- uint32 user_rid;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t user_rid;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
int i;
struct samr_RidWithAttributeArray *rid_array = NULL;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -710,8 +710,8 @@ static NTSTATUS cmd_samr_query_useraliases(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
struct dom_sid *sids;
- uint32_t num_sids;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t num_sids;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
int i;
struct lsa_SidArray sid_array;
struct samr_Ids alias_rids;
@@ -801,8 +801,8 @@ static NTSTATUS cmd_samr_query_groupmem(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol, group_pol;
NTSTATUS status, result;
- uint32 group_rid;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t group_rid;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
int i;
unsigned int old_timeout;
struct samr_RidAttrArray *rids = NULL;
@@ -893,10 +893,10 @@ static NTSTATUS cmd_samr_enum_dom_users(struct rpc_pipe_client *cli,
struct policy_handle connect_pol;
struct policy_handle domain_pol = { 0, };
NTSTATUS status, result;
- uint32 start_idx, num_dom_users, i;
+ uint32_t start_idx, num_dom_users, i;
struct samr_SamArray *dom_users = NULL;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
- uint32 acb_mask = ACB_NORMAL;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t acb_mask = ACB_NORMAL;
uint32_t size = 0xffff;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -983,8 +983,8 @@ static NTSTATUS cmd_samr_enum_dom_groups(struct rpc_pipe_client *cli,
struct policy_handle connect_pol;
struct policy_handle domain_pol = { 0, };
NTSTATUS status, result;
- uint32 start_idx, num_dom_groups, i;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t start_idx, num_dom_groups, i;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct samr_SamArray *dom_groups = NULL;
uint32_t size = 0xffff;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1067,8 +1067,8 @@ static NTSTATUS cmd_samr_enum_als_groups(struct rpc_pipe_client *cli,
struct policy_handle connect_pol;
struct policy_handle domain_pol = { 0, };
NTSTATUS status, result;
- uint32 start_idx, num_als_groups, i;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t start_idx, num_als_groups, i;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct samr_SamArray *als_groups = NULL;
uint32_t size = 0xffff;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1149,8 +1149,8 @@ static NTSTATUS cmd_samr_enum_domains(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol;
NTSTATUS status, result;
- uint32 start_idx, size, num_entries, i;
- uint32 access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ uint32_t start_idx, size, num_entries, i;
+ uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
struct samr_SamArray *sam = NULL;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1215,8 +1215,8 @@ static NTSTATUS cmd_samr_query_aliasmem(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol, alias_pol;
NTSTATUS status, result;
- uint32 alias_rid, i;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t alias_rid, i;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct lsa_SidArray sid_array;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1403,8 +1403,8 @@ static NTSTATUS cmd_samr_delete_alias(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol, alias_pol;
NTSTATUS status, result;
- uint32 alias_rid;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t alias_rid;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct dcerpc_binding_handle *b = cli->binding_handle;
if (argc != 3) {
@@ -1510,9 +1510,9 @@ static NTSTATUS cmd_samr_query_dispinfo_internal(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
- uint32 start_idx=0, max_entries=250, max_size = 0xffff, num_entries = 0, i;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
- uint32 info_level = 1;
+ uint32_t start_idx=0, max_entries=250, max_size = 0xffff, num_entries = 0, i;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t info_level = 1;
union samr_DispInfo info;
int loop_count = 0;
bool got_params = False; /* Use get_query_dispinfo_params() or not? */
@@ -1715,8 +1715,8 @@ static NTSTATUS cmd_samr_query_dominfo(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
- uint32 switch_level = 2;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t switch_level = 2;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
union samr_DomainInfo *info = NULL;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1830,9 +1830,9 @@ static NTSTATUS cmd_samr_create_dom_user(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol, user_pol;
NTSTATUS status, result;
struct lsa_String acct_name;
- uint32 acb_info;
- uint32 acct_flags, user_rid;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t acb_info;
+ uint32_t acct_flags, user_rid;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
uint32_t access_granted = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1919,7 +1919,7 @@ static NTSTATUS cmd_samr_create_dom_group(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol, group_pol;
NTSTATUS status, result;
struct lsa_String grp_name;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
uint32_t rid = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -1996,7 +1996,7 @@ static NTSTATUS cmd_samr_create_dom_alias(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol, alias_pol;
NTSTATUS status, result;
struct lsa_String alias_name;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
uint32_t rid = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -2074,7 +2074,7 @@ static NTSTATUS cmd_samr_lookup_names(struct rpc_pipe_client *cli,
{
NTSTATUS status, result;
struct policy_handle connect_pol, domain_pol;
- uint32 num_names;
+ uint32_t num_names;
struct samr_Ids rids, name_types;
int i;
struct lsa_String *names = NULL;
@@ -2197,7 +2197,7 @@ static NTSTATUS cmd_samr_lookup_rids(struct rpc_pipe_client *cli,
num_rids = argc - 2;
- if ((rids = talloc_array(mem_ctx, uint32, num_rids)) == NULL) {
+ if ((rids = talloc_array(mem_ctx, uint32_t, num_rids)) == NULL) {
dcerpc_samr_Close(b, mem_ctx, &domain_pol, &result);
dcerpc_samr_Close(b, mem_ctx, &connect_pol, &result);
status = NT_STATUS_NO_MEMORY;
@@ -2251,7 +2251,7 @@ static NTSTATUS cmd_samr_delete_dom_group(struct rpc_pipe_client *cli,
{
NTSTATUS status, result;
struct policy_handle connect_pol, domain_pol, group_pol;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct dcerpc_binding_handle *b = cli->binding_handle;
if ((argc < 2) || (argc > 3)) {
@@ -2362,7 +2362,7 @@ static NTSTATUS cmd_samr_delete_dom_user(struct rpc_pipe_client *cli,
{
NTSTATUS status, result;
struct policy_handle connect_pol, domain_pol, user_pol;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct dcerpc_binding_handle *b = cli->binding_handle;
if ((argc < 2) || (argc > 3)) {
@@ -2474,8 +2474,8 @@ static NTSTATUS cmd_samr_query_sec_obj(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol, user_pol, *pol;
NTSTATUS status, result;
- uint32 sec_info = SECINFO_DACL;
- uint32 user_rid = 0;
+ uint32_t sec_info = SECINFO_DACL;
+ uint32_t user_rid = 0;
TALLOC_CTX *ctx = NULL;
struct sec_desc_buf *sec_desc_buf=NULL;
bool domain = False;
@@ -2689,7 +2689,7 @@ static NTSTATUS cmd_samr_lookup_domain(struct rpc_pipe_client *cli,
{
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
fstring sid_string;
struct lsa_String domain_name;
struct dom_sid *sid = NULL;
@@ -2759,7 +2759,7 @@ static NTSTATUS cmd_samr_chgpasswd(struct rpc_pipe_client *cli,
struct policy_handle user_pol = { 0, };
NTSTATUS status, result;
const char *user, *oldpass, *newpass;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct samr_Ids rids, types;
struct lsa_String lsa_acct_name;
struct dcerpc_binding_handle *b = cli->binding_handle;
@@ -2870,7 +2870,7 @@ static NTSTATUS cmd_samr_chgpasswd2(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
const char *user, *oldpass, *newpass;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct dcerpc_binding_handle *b = cli->binding_handle;
if (argc < 3) {
@@ -2934,7 +2934,7 @@ static NTSTATUS cmd_samr_chgpasswd3(struct rpc_pipe_client *cli,
struct policy_handle connect_pol, domain_pol;
NTSTATUS status, result;
const char *user, *oldpass, *newpass;
- uint32 access_mask = MAXIMUM_ALLOWED_ACCESS;
+ uint32_t access_mask = MAXIMUM_ALLOWED_ACCESS;
struct samr_DomInfo1 *info = NULL;
struct userPwdChangeFailureInformation *reject = NULL;
struct dcerpc_binding_handle *b = cli->binding_handle;
diff --git a/source3/rpcclient/cmd_shutdown.c b/source3/rpcclient/cmd_shutdown.c
index 8db09fef2df..7cf4a30c575 100644
--- a/source3/rpcclient/cmd_shutdown.c
+++ b/source3/rpcclient/cmd_shutdown.c
@@ -34,7 +34,7 @@ static NTSTATUS cmd_shutdown_init(struct cli_state *cli, TALLOC_CTX *mem_ctx,
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
fstring msg;
- uint32 timeout = 20;
+ uint32_t timeout = 20;
bool force = False;
bool reboot = False;
int opt;
diff --git a/source3/rpcclient/cmd_spoolss.c b/source3/rpcclient/cmd_spoolss.c
index e2b9fc46686..3191e80ffac 100644
--- a/source3/rpcclient/cmd_spoolss.c
+++ b/source3/rpcclient/cmd_spoolss.c
@@ -770,7 +770,7 @@ static void display_reg_value(const char *name, enum winreg_Type type, DATA_BLOB
switch(type) {
case REG_DWORD:
- if (blob.length == sizeof(uint32)) {
+ if (blob.length == sizeof(uint32_t)) {
printf("%s: REG_DWORD: 0x%08x\n", name, IVAL(blob.data,0));
} else {
printf("%s: REG_DWORD: <invalid>\n", name);
diff --git a/source3/rpcclient/cmd_srvsvc.c b/source3/rpcclient/cmd_srvsvc.c
index e5fa0656737..6ad03d17a5c 100644
--- a/source3/rpcclient/cmd_srvsvc.c
+++ b/source3/rpcclient/cmd_srvsvc.c
@@ -28,7 +28,7 @@
/* Display server query info */
-static char *get_server_type_str(uint32 type)
+static char *get_server_type_str(uint32_t type)
{
static fstring typestr;
int i;
@@ -133,7 +133,7 @@ static char *get_server_type_str(uint32 type)
return typestr;
}
-static void display_server(const char *sname, uint32 type, const char *comment)
+static void display_server(const char *sname, uint32_t type, const char *comment)
{
printf("\t%-15.15s%-20s %s\n", sname, get_server_type_str(type),
comment);
@@ -171,7 +171,7 @@ static WERROR cmd_srvsvc_srv_query_info(struct rpc_pipe_client *cli,
TALLOC_CTX *mem_ctx,
int argc, const char **argv)
{
- uint32 info_level = 101;
+ uint32_t info_level = 101;
union srvsvc_NetSrvInfo info;
WERROR result;
NTSTATUS status;
@@ -258,7 +258,7 @@ static WERROR cmd_srvsvc_net_share_enum_int(struct rpc_pipe_client *cli,
int argc, const char **argv,
uint32_t opcode)
{
- uint32 info_level = 2;
+ uint32_t info_level = 2;
struct srvsvc_NetShareInfoCtr info_ctr;
struct srvsvc_NetShareCtr0 ctr0;
struct srvsvc_NetShareCtr1 ctr1;
@@ -276,7 +276,7 @@ static WERROR cmd_srvsvc_net_share_enum_int(struct rpc_pipe_client *cli,
uint32_t count = 0;
uint32_t resume_handle = 0;
uint32_t *resume_handle_p = NULL;
- uint32 preferred_len = 0xffffffff, i;
+ uint32_t preferred_len = 0xffffffff, i;
struct dcerpc_binding_handle *b = cli->binding_handle;
if (argc > 3) {
@@ -420,7 +420,7 @@ static WERROR cmd_srvsvc_net_share_get_info(struct rpc_pipe_client *cli,
TALLOC_CTX *mem_ctx,
int argc, const char **argv)
{
- uint32 info_level = 502;
+ uint32_t info_level = 502;
union srvsvc_NetShareInfo info;
WERROR result;
NTSTATUS status;
@@ -474,7 +474,7 @@ static WERROR cmd_srvsvc_net_share_set_info(struct rpc_pipe_client *cli,
TALLOC_CTX *mem_ctx,
int argc, const char **argv)
{
- uint32 info_level = 502;
+ uint32_t info_level = 502;
union srvsvc_NetShareInfo info_get;
WERROR result;
NTSTATUS status;
@@ -576,12 +576,12 @@ static WERROR cmd_srvsvc_net_file_enum(struct rpc_pipe_client *cli,
TALLOC_CTX *mem_ctx,
int argc, const char **argv)
{
- uint32 info_level = 3;
+ uint32_t info_level = 3;
struct srvsvc_NetFileInfoCtr info_ctr;
struct srvsvc_NetFileCtr3 ctr3;
WERROR result;
NTSTATUS status;
- uint32 preferred_len = 0xffff;
+ uint32_t preferred_len = 0xffff;
uint32_t total_entries = 0;
uint32_t resume_handle = 0;
struct dcerpc_binding_handle *b = cli->binding_handle;