diff options
author | Stefan Metzmacher <metze@samba.org> | 2004-11-22 07:54:16 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:06:03 -0500 |
commit | 2877f415ae1da30e5971840c124f6ca60813b93d (patch) | |
tree | f82c301b0cf4fb80cf17d53e1d788f6aa2982315 /source4 | |
parent | cc368fa69e6a205516c64712aee701fe0cf6d20b (diff) | |
download | samba-2877f415ae1da30e5971840c124f6ca60813b93d.tar.gz samba-2877f415ae1da30e5971840c124f6ca60813b93d.tar.bz2 samba-2877f415ae1da30e5971840c124f6ca60813b93d.zip |
r3899: fix compiler warnings
metze
(This used to be commit b1b47bda0177c42687b9c291e4e28ae123fb4eac)
Diffstat (limited to 'source4')
-rw-r--r-- | source4/libcli/util/smbencrypt.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/source4/libcli/util/smbencrypt.c b/source4/libcli/util/smbencrypt.c index 1218de1fe7..ba89000c6c 100644 --- a/source4/libcli/util/smbencrypt.c +++ b/source4/libcli/util/smbencrypt.c @@ -435,7 +435,7 @@ BOOL SMBNTLMv2encrypt(const char *user, const char *domain, const char *password encode a password buffer with a unicode password. The buffer is filled with random data to make it harder to attack. ************************************************************/ -BOOL encode_pw_buffer(char buffer[516], const char *password, int string_flags) +BOOL encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flags) { uint8_t new_pw[512]; size_t new_pw_len; @@ -446,7 +446,7 @@ BOOL encode_pw_buffer(char buffer[516], const char *password, int string_flags) memcpy(&buffer[512 - new_pw_len], new_pw, new_pw_len); - generate_random_buffer((uint8_t *)buffer, 512 - new_pw_len); + generate_random_buffer(buffer, 512 - new_pw_len); /* * The length of the new password is in the last 4 bytes of |