summaryrefslogtreecommitdiff
path: root/source3/smbd/password.c
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>1998-10-21 16:58:34 +0000
committerJeremy Allison <jra@samba.org>1998-10-21 16:58:34 +0000
commit6e3af45afe237790f1d7cd94ab2b22e1ca772157 (patch)
treec0870e0739564cff7c19e2a900d3c701e1ebb33a /source3/smbd/password.c
parentac9be4ddca99c5efae518a985b97fb1fb6374289 (diff)
downloadsamba-6e3af45afe237790f1d7cd94ab2b22e1ca772157.tar.gz
samba-6e3af45afe237790f1d7cd94ab2b22e1ca772157.tar.bz2
samba-6e3af45afe237790f1d7cd94ab2b22e1ca772157.zip
Fixed mainly signed/unsigned issues found by SGI cc in -fullwarn mode.
smbd/chgpasswd.c: Fixed (my) stupid bug where I was returning stack based variables. Doh ! smbd/trans2.c: Allows SETFILEINFO as well as QFILEINFO on directory handles. Jeremy. (This used to be commit 0b44d27d0b5cc3948a6c2d78370ccddf1a84cd80)
Diffstat (limited to 'source3/smbd/password.c')
-rw-r--r--source3/smbd/password.c7
1 files changed, 4 insertions, 3 deletions
diff --git a/source3/smbd/password.c b/source3/smbd/password.c
index eac8c9cd65..95560df66b 100644
--- a/source3/smbd/password.c
+++ b/source3/smbd/password.c
@@ -458,8 +458,9 @@ check if a username/password is OK assuming the password is a 24 byte
SMB hash
return True if the password is correct, False otherwise
****************************************************************************/
+
BOOL pass_check_smb(char *user, char *domain,
- uchar *chal, char *lm_pwd, char *nt_pwd,
+ uchar *chal, uchar *lm_pwd, uchar *nt_pwd,
struct passwd *pwd)
{
struct passwd *pass;
@@ -513,7 +514,7 @@ BOOL pass_check_smb(char *user, char *domain,
return(True);
}
- if (smb_password_ok(smb_pass, chal, (uchar *)lm_pwd, (uchar *)nt_pwd))
+ if (smb_password_ok(smb_pass, chal, lm_pwd, nt_pwd))
{
return(True);
}
@@ -541,7 +542,7 @@ BOOL password_ok(char *user, char *password, int pwlen, struct passwd *pwd)
}
return pass_check_smb(user, global_myworkgroup,
- challenge, password, password, pwd);
+ challenge, (uchar *)password, (uchar *)password, pwd);
}
return pass_check(user, password, pwlen, pwd,