summaryrefslogtreecommitdiff
path: root/source3/auth
diff options
context:
space:
mode:
authorHerb Lewis <herb@samba.org>2001-08-24 20:32:01 +0000
committerHerb Lewis <herb@samba.org>2001-08-24 20:32:01 +0000
commit717533483b41ef975953f58e0c6be04828a3d467 (patch)
tree1eba76475bd03c51e9d2d2f840634517297d0024 /source3/auth
parentb9e7eeaf4fc13fb9e2dbee69e07bc6800f6e427a (diff)
downloadsamba-717533483b41ef975953f58e0c6be04828a3d467.tar.gz
samba-717533483b41ef975953f58e0c6be04828a3d467.tar.bz2
samba-717533483b41ef975953f58e0c6be04828a3d467.zip
get rid of compiler warnings
(This used to be commit 0768991d04ea03e774ca8662c9cae5e1951b88e0)
Diffstat (limited to 'source3/auth')
-rw-r--r--source3/auth/auth.c6
-rw-r--r--source3/auth/auth_sam.c6
-rw-r--r--source3/auth/auth_server.c4
3 files changed, 8 insertions, 8 deletions
diff --git a/source3/auth/auth.c b/source3/auth/auth.c
index d33bc225e6..8ea867fe8c 100644
--- a/source3/auth/auth.c
+++ b/source3/auth/auth.c
@@ -188,7 +188,7 @@ uint32 pass_check_smb_with_chal(char *user, char *domain, uchar chal[8],
user_info.nt_resp.len = 24;
}
- user_info.plaintext_password.str = lm_pwd;
+ user_info.plaintext_password.str = (char *)lm_pwd;
user_info.plaintext_password.len = lm_pwd_len;
}
@@ -232,11 +232,11 @@ BOOL password_ok(char *user, char *password, int pwlen)
/* The password could be either NTLM or plain LM. Try NTLM first, but fall-through as
required. */
- if (pass_check_smb(user, lp_workgroup(), NULL, 0, password, pwlen) == NT_STATUS_NOPROBLEMO) {
+ if (pass_check_smb(user, lp_workgroup(), NULL, 0, (unsigned char *)password, pwlen) == NT_STATUS_NOPROBLEMO) {
return True;
}
- if (pass_check_smb(user, lp_workgroup(), password, pwlen, NULL, 0) == NT_STATUS_NOPROBLEMO) {
+ if (pass_check_smb(user, lp_workgroup(), (unsigned char *)password, pwlen, NULL, 0) == NT_STATUS_NOPROBLEMO) {
return True;
}
diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c
index 27cb801c33..1a5d02e4a4 100644
--- a/source3/auth/auth_sam.c
+++ b/source3/auth/auth_sam.c
@@ -45,7 +45,7 @@ static BOOL smb_pwd_check_ntlmv1(const uchar *password,
SMBOWFencrypt(part_passwd, c8, p24);
if (user_sess_key != NULL)
{
- SMBsesskeygen_ntv1(part_passwd, NULL, user_sess_key);
+ SMBsesskeygen_ntv1(part_passwd, NULL, (char *)user_sess_key);
}
@@ -84,7 +84,7 @@ static BOOL smb_pwd_check_ntlmv2(const uchar *password, size_t pwd_len,
}
ntv2_owf_gen(part_passwd, user, domain, kr);
- SMBOWFencrypt_ntv2(kr, c8, 8, password+16, pwd_len-16, resp);
+ SMBOWFencrypt_ntv2(kr, c8, 8, password+16, pwd_len-16, (char *)resp);
if (user_sess_key != NULL)
{
SMBsesskeygen_ntv2(kr, resp, user_sess_key);
@@ -154,7 +154,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_
nt_pw,
user_info->chal, user_info->requested_username.str,
user_info->requested_domain.str,
- server_info->session_key))
+ (char *)server_info->session_key))
{
return NT_STATUS_NOPROBLEMO;
}
diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c
index 0711b056bd..ad66f0c4ac 100644
--- a/source3/auth/auth_server.c
+++ b/source3/auth/auth_server.c
@@ -205,9 +205,9 @@ use this machine as the password server.\n"));
*/
if (!cli_session_setup(cli, user_info->smb_username.str,
- user_info->lm_resp.buffer,
+ (char *)user_info->lm_resp.buffer,
user_info->lm_resp.len,
- user_info->nt_resp.buffer,
+ (char *)user_info->nt_resp.buffer,
user_info->nt_resp.len,
user_info->domain.str)) {
DEBUG(1,("password server %s rejected the password\n", cli->desthost));