summaryrefslogtreecommitdiff
path: root/source4/torture/rpc/forest_trust.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2014-02-12 12:09:53 +0100
committerGünther Deschner <gd@samba.org>2014-02-13 11:54:13 +0100
commitb51cc6ea37caabb027b5302924055fe99745b9da (patch)
tree269341d574e1a64427741713bfcc9056d9505e31 /source4/torture/rpc/forest_trust.c
parent83bd478c9bfe7a8a2970531ea05af8cca0bd7ca3 (diff)
downloadsamba-b51cc6ea37caabb027b5302924055fe99745b9da.tar.gz
s4:torture/rpc: s/pipe/p/ in order to avoid compiler warnings
Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Guenther Deschner <gd@samba.org>
Diffstat (limited to 'source4/torture/rpc/forest_trust.c')
-rw-r--r--source4/torture/rpc/forest_trust.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/source4/torture/rpc/forest_trust.c b/source4/torture/rpc/forest_trust.c
index 220828083a7..47940e05277 100644
--- a/source4/torture/rpc/forest_trust.c
+++ b/source4/torture/rpc/forest_trust.c
@@ -592,7 +592,7 @@ static bool test_validate_trust(struct torture_context *tctx,
NTSTATUS status;
struct cli_credentials *credentials;
struct dcerpc_binding *b;
- struct dcerpc_pipe *pipe;
+ struct dcerpc_pipe *p;
struct netr_GetForestTrustInformation fr;
struct lsa_ForestTrustInformation *forest_trust_info;
@@ -619,7 +619,7 @@ static bool test_validate_trust(struct torture_context *tctx,
trusted_dom_name, CRED_SPECIFIED);
cli_credentials_set_secure_channel_type(credentials, SEC_CHAN_DOMAIN);
- status = dcerpc_pipe_connect_b(tctx, &pipe, b,
+ status = dcerpc_pipe_connect_b(tctx, &p, b,
&ndr_table_netlogon, credentials,
tctx->ev, tctx->lp_ctx);
@@ -631,7 +631,7 @@ static bool test_validate_trust(struct torture_context *tctx,
return false;
}
- if (!test_SetupCredentials3(pipe, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS | NETLOGON_NEG_SUPPORTS_AES,
+ if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS | NETLOGON_NEG_SUPPORTS_AES,
credentials, &creds)) {
torture_comment(tctx, "test_SetupCredentials3 failed.\n");
return false;
@@ -640,7 +640,7 @@ static bool test_validate_trust(struct torture_context *tctx,
netlogon_creds_client_authenticator(creds, &a);
r.in.server_name = talloc_asprintf(tctx, "\\\\%s",
- dcerpc_server_name(pipe));
+ dcerpc_server_name(p));
r.in.account_name = talloc_asprintf(tctx, "%s$", trusted_dom_name);
r.in.secure_channel_type = cli_credentials_get_secure_channel_type(credentials);
r.in.computer_name = trusted_dom_name;
@@ -652,7 +652,7 @@ static bool test_validate_trust(struct torture_context *tctx,
r.out.trust_info = &trust_info;
torture_assert_ntstatus_ok(tctx,
- dcerpc_netr_ServerGetTrustInfo_r(pipe->binding_handle, tctx, &r),
+ dcerpc_netr_ServerGetTrustInfo_r(p->binding_handle, tctx, &r),
"ServerGetTrustInfo failed");
torture_assert_ntstatus_ok(tctx, r.out.result,
"ServerGetTrustInfo failed");
@@ -684,7 +684,7 @@ static bool test_validate_trust(struct torture_context *tctx,
netlogon_creds_client_authenticator(creds, &a);
fr.in.server_name = talloc_asprintf(tctx, "\\\\%s",
- dcerpc_server_name(pipe));
+ dcerpc_server_name(p));
fr.in.computer_name = trusted_dom_name;
fr.in.credential = &a;
fr.in.flags = 0;
@@ -692,7 +692,7 @@ static bool test_validate_trust(struct torture_context *tctx,
fr.out.forest_trust_info = &forest_trust_info;
torture_assert_ntstatus_ok(tctx,
- dcerpc_netr_GetForestTrustInformation_r(pipe->binding_handle, tctx, &fr),
+ dcerpc_netr_GetForestTrustInformation_r(p->binding_handle, tctx, &fr),
"netr_GetForestTrustInformation failed");
if (NT_STATUS_IS_ERR(fr.out.result)) {
torture_comment(tctx,