summaryrefslogtreecommitdiff
path: root/source3/libsmb/ntlm_check.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2007-03-28 13:34:59 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 12:18:59 -0500
commit56ba44766854ed7cda265bdaf85913f2a1008282 (patch)
treeab942a31d2bca6bd228fae1c996e5d498bb0cf7e /source3/libsmb/ntlm_check.c
parent9bb40d7c6158090712d774e98654d80c888ca4f3 (diff)
downloadsamba-56ba44766854ed7cda265bdaf85913f2a1008282.tar.gz
samba-56ba44766854ed7cda265bdaf85913f2a1008282.tar.bz2
samba-56ba44766854ed7cda265bdaf85913f2a1008282.zip
r22001: change prototype of dump_data(), so that it takes unsigned char * now,
which matches what samba4 has. also fix all the callers to prevent compiler warnings metze (This used to be commit fa322f0cc9c26a9537ba3f0a7d4e4a25941317e7)
Diffstat (limited to 'source3/libsmb/ntlm_check.c')
-rw-r--r--source3/libsmb/ntlm_check.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/source3/libsmb/ntlm_check.c b/source3/libsmb/ntlm_check.c
index e1fc92e344..1ce5d5e424 100644
--- a/source3/libsmb/ntlm_check.c
+++ b/source3/libsmb/ntlm_check.c
@@ -65,13 +65,13 @@ static BOOL smb_pwd_check_ntlmv1(const DATA_BLOB *nt_response,
#ifdef DEBUG_PASSWORD
DEBUG(100,("Part password (P16) was |\n"));
- dump_data(100, (const char *)part_passwd, 16);
+ dump_data(100, part_passwd, 16);
DEBUGADD(100,("Password from client was |\n"));
- dump_data(100, (const char *)nt_response->data, nt_response->length);
+ dump_data(100, nt_response->data, nt_response->length);
DEBUGADD(100,("Given challenge was |\n"));
- dump_data(100, (const char *)sec_blob->data, sec_blob->length);
+ dump_data(100, sec_blob->data, sec_blob->length);
DEBUGADD(100,("Value from encryption was |\n"));
- dump_data(100, (const char *)p24, 24);
+ dump_data(100, p24, 24);
#endif
return (memcmp(p24, nt_response->data, 24) == 0);
}
@@ -136,15 +136,15 @@ static BOOL smb_pwd_check_ntlmv2(const DATA_BLOB *ntv2_response,
#if DEBUG_PASSWORD
DEBUG(100,("Part password (P16) was |\n"));
- dump_data(100, (const char *)part_passwd, 16);
+ dump_data(100, part_passwd, 16);
DEBUGADD(100,("Password from client was |\n"));
- dump_data(100, (const char *)ntv2_response->data, ntv2_response->length);
+ dump_data(100, ntv2_response->data, ntv2_response->length);
DEBUGADD(100,("Variable data from client was |\n"));
- dump_data(100, (const char *)client_key_data.data, client_key_data.length);
+ dump_data(100, client_key_data.data, client_key_data.length);
DEBUGADD(100,("Given challenge was |\n"));
- dump_data(100, (const char *)sec_blob->data, sec_blob->length);
+ dump_data(100, sec_blob->data, sec_blob->length);
DEBUGADD(100,("Value from encryption was |\n"));
- dump_data(100, (const char *)value_from_encryption, 16);
+ dump_data(100, value_from_encryption, 16);
#endif
data_blob_clear_free(&client_key_data);
res = (memcmp(value_from_encryption, client_response, 16) == 0);