diff options
author | Stefan Metzmacher <metze@samba.org> | 2017-06-13 11:17:03 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2017-06-27 16:57:46 +0200 |
commit | 1b48c8515ed8fd29204c82cc47f958f4636cd494 (patch) | |
tree | 88f685c850e5f2f57c5c28d1afa77089905dec76 /libcli/auth | |
parent | ddd7ac68ccae8b4df6c6a65b3dad20e21924f538 (diff) | |
download | samba-1b48c8515ed8fd29204c82cc47f958f4636cd494.tar.gz |
libcli/auth: add const to set_pw_in_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12782
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
Diffstat (limited to 'libcli/auth')
-rw-r--r-- | libcli/auth/proto.h | 2 | ||||
-rw-r--r-- | libcli/auth/smbencrypt.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/libcli/auth/proto.h b/libcli/auth/proto.h index cc9ae336685..a03f45ed7f3 100644 --- a/libcli/auth/proto.h +++ b/libcli/auth/proto.h @@ -187,7 +187,7 @@ void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf[532], const DATA_B encode a password buffer with an already unicode password. The rest of the buffer is filled with random data to make it harder to attack. ************************************************************/ -bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password); +bool set_pw_in_buffer(uint8_t buffer[516], const DATA_BLOB *password); /*********************************************************** decode a password buffer diff --git a/libcli/auth/smbencrypt.c b/libcli/auth/smbencrypt.c index ebf6812fabe..afd9286b701 100644 --- a/libcli/auth/smbencrypt.c +++ b/libcli/auth/smbencrypt.c @@ -804,7 +804,7 @@ void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf[532], const DATA_B encode a password buffer with an already unicode password. The rest of the buffer is filled with random data to make it harder to attack. ************************************************************/ -bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password) +bool set_pw_in_buffer(uint8_t buffer[516], const DATA_BLOB *password) { if (password->length > 512) { return false; |