diff options
author | Herb Lewis <herb@samba.org> | 2001-08-24 20:32:01 +0000 |
---|---|---|
committer | Herb Lewis <herb@samba.org> | 2001-08-24 20:32:01 +0000 |
commit | 717533483b41ef975953f58e0c6be04828a3d467 (patch) | |
tree | 1eba76475bd03c51e9d2d2f840634517297d0024 /source3/auth | |
parent | b9e7eeaf4fc13fb9e2dbee69e07bc6800f6e427a (diff) | |
download | samba-717533483b41ef975953f58e0c6be04828a3d467.tar.gz samba-717533483b41ef975953f58e0c6be04828a3d467.tar.bz2 samba-717533483b41ef975953f58e0c6be04828a3d467.zip |
get rid of compiler warnings
(This used to be commit 0768991d04ea03e774ca8662c9cae5e1951b88e0)
Diffstat (limited to 'source3/auth')
-rw-r--r-- | source3/auth/auth.c | 6 | ||||
-rw-r--r-- | source3/auth/auth_sam.c | 6 | ||||
-rw-r--r-- | source3/auth/auth_server.c | 4 |
3 files changed, 8 insertions, 8 deletions
diff --git a/source3/auth/auth.c b/source3/auth/auth.c index d33bc225e6..8ea867fe8c 100644 --- a/source3/auth/auth.c +++ b/source3/auth/auth.c @@ -188,7 +188,7 @@ uint32 pass_check_smb_with_chal(char *user, char *domain, uchar chal[8], user_info.nt_resp.len = 24; } - user_info.plaintext_password.str = lm_pwd; + user_info.plaintext_password.str = (char *)lm_pwd; user_info.plaintext_password.len = lm_pwd_len; } @@ -232,11 +232,11 @@ BOOL password_ok(char *user, char *password, int pwlen) /* The password could be either NTLM or plain LM. Try NTLM first, but fall-through as required. */ - if (pass_check_smb(user, lp_workgroup(), NULL, 0, password, pwlen) == NT_STATUS_NOPROBLEMO) { + if (pass_check_smb(user, lp_workgroup(), NULL, 0, (unsigned char *)password, pwlen) == NT_STATUS_NOPROBLEMO) { return True; } - if (pass_check_smb(user, lp_workgroup(), password, pwlen, NULL, 0) == NT_STATUS_NOPROBLEMO) { + if (pass_check_smb(user, lp_workgroup(), (unsigned char *)password, pwlen, NULL, 0) == NT_STATUS_NOPROBLEMO) { return True; } diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c index 27cb801c33..1a5d02e4a4 100644 --- a/source3/auth/auth_sam.c +++ b/source3/auth/auth_sam.c @@ -45,7 +45,7 @@ static BOOL smb_pwd_check_ntlmv1(const uchar *password, SMBOWFencrypt(part_passwd, c8, p24); if (user_sess_key != NULL) { - SMBsesskeygen_ntv1(part_passwd, NULL, user_sess_key); + SMBsesskeygen_ntv1(part_passwd, NULL, (char *)user_sess_key); } @@ -84,7 +84,7 @@ static BOOL smb_pwd_check_ntlmv2(const uchar *password, size_t pwd_len, } ntv2_owf_gen(part_passwd, user, domain, kr); - SMBOWFencrypt_ntv2(kr, c8, 8, password+16, pwd_len-16, resp); + SMBOWFencrypt_ntv2(kr, c8, 8, password+16, pwd_len-16, (char *)resp); if (user_sess_key != NULL) { SMBsesskeygen_ntv2(kr, resp, user_sess_key); @@ -154,7 +154,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_ nt_pw, user_info->chal, user_info->requested_username.str, user_info->requested_domain.str, - server_info->session_key)) + (char *)server_info->session_key)) { return NT_STATUS_NOPROBLEMO; } diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c index 0711b056bd..ad66f0c4ac 100644 --- a/source3/auth/auth_server.c +++ b/source3/auth/auth_server.c @@ -205,9 +205,9 @@ use this machine as the password server.\n")); */ if (!cli_session_setup(cli, user_info->smb_username.str, - user_info->lm_resp.buffer, + (char *)user_info->lm_resp.buffer, user_info->lm_resp.len, - user_info->nt_resp.buffer, + (char *)user_info->nt_resp.buffer, user_info->nt_resp.len, user_info->domain.str)) { DEBUG(1,("password server %s rejected the password\n", cli->desthost)); |