diff options
author | Stefan Metzmacher <metze@samba.org> | 2014-02-12 12:09:53 +0100 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2014-02-13 11:54:13 +0100 |
commit | b51cc6ea37caabb027b5302924055fe99745b9da (patch) | |
tree | 269341d574e1a64427741713bfcc9056d9505e31 /source4/torture | |
parent | 83bd478c9bfe7a8a2970531ea05af8cca0bd7ca3 (diff) | |
download | samba-b51cc6ea37caabb027b5302924055fe99745b9da.tar.gz samba-b51cc6ea37caabb027b5302924055fe99745b9da.tar.xz samba-b51cc6ea37caabb027b5302924055fe99745b9da.zip |
s4:torture/rpc: s/pipe/p/ in order to avoid compiler warnings
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Guenther Deschner <gd@samba.org>
Diffstat (limited to 'source4/torture')
-rw-r--r-- | source4/torture/rpc/forest_trust.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/source4/torture/rpc/forest_trust.c b/source4/torture/rpc/forest_trust.c index 220828083a7..47940e05277 100644 --- a/source4/torture/rpc/forest_trust.c +++ b/source4/torture/rpc/forest_trust.c @@ -592,7 +592,7 @@ static bool test_validate_trust(struct torture_context *tctx, NTSTATUS status; struct cli_credentials *credentials; struct dcerpc_binding *b; - struct dcerpc_pipe *pipe; + struct dcerpc_pipe *p; struct netr_GetForestTrustInformation fr; struct lsa_ForestTrustInformation *forest_trust_info; @@ -619,7 +619,7 @@ static bool test_validate_trust(struct torture_context *tctx, trusted_dom_name, CRED_SPECIFIED); cli_credentials_set_secure_channel_type(credentials, SEC_CHAN_DOMAIN); - status = dcerpc_pipe_connect_b(tctx, &pipe, b, + status = dcerpc_pipe_connect_b(tctx, &p, b, &ndr_table_netlogon, credentials, tctx->ev, tctx->lp_ctx); @@ -631,7 +631,7 @@ static bool test_validate_trust(struct torture_context *tctx, return false; } - if (!test_SetupCredentials3(pipe, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS | NETLOGON_NEG_SUPPORTS_AES, + if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS | NETLOGON_NEG_SUPPORTS_AES, credentials, &creds)) { torture_comment(tctx, "test_SetupCredentials3 failed.\n"); return false; @@ -640,7 +640,7 @@ static bool test_validate_trust(struct torture_context *tctx, netlogon_creds_client_authenticator(creds, &a); r.in.server_name = talloc_asprintf(tctx, "\\\\%s", - dcerpc_server_name(pipe)); + dcerpc_server_name(p)); r.in.account_name = talloc_asprintf(tctx, "%s$", trusted_dom_name); r.in.secure_channel_type = cli_credentials_get_secure_channel_type(credentials); r.in.computer_name = trusted_dom_name; @@ -652,7 +652,7 @@ static bool test_validate_trust(struct torture_context *tctx, r.out.trust_info = &trust_info; torture_assert_ntstatus_ok(tctx, - dcerpc_netr_ServerGetTrustInfo_r(pipe->binding_handle, tctx, &r), + dcerpc_netr_ServerGetTrustInfo_r(p->binding_handle, tctx, &r), "ServerGetTrustInfo failed"); torture_assert_ntstatus_ok(tctx, r.out.result, "ServerGetTrustInfo failed"); @@ -684,7 +684,7 @@ static bool test_validate_trust(struct torture_context *tctx, netlogon_creds_client_authenticator(creds, &a); fr.in.server_name = talloc_asprintf(tctx, "\\\\%s", - dcerpc_server_name(pipe)); + dcerpc_server_name(p)); fr.in.computer_name = trusted_dom_name; fr.in.credential = &a; fr.in.flags = 0; @@ -692,7 +692,7 @@ static bool test_validate_trust(struct torture_context *tctx, fr.out.forest_trust_info = &forest_trust_info; torture_assert_ntstatus_ok(tctx, - dcerpc_netr_GetForestTrustInformation_r(pipe->binding_handle, tctx, &fr), + dcerpc_netr_GetForestTrustInformation_r(p->binding_handle, tctx, &fr), "netr_GetForestTrustInformation failed"); if (NT_STATUS_IS_ERR(fr.out.result)) { torture_comment(tctx, |