summaryrefslogtreecommitdiff
path: root/libcli
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2017-06-13 11:17:03 +0200
committerStefan Metzmacher <metze@samba.org>2017-06-27 16:57:46 +0200
commit1b48c8515ed8fd29204c82cc47f958f4636cd494 (patch)
tree88f685c850e5f2f57c5c28d1afa77089905dec76 /libcli
parentddd7ac68ccae8b4df6c6a65b3dad20e21924f538 (diff)
downloadsamba-1b48c8515ed8fd29204c82cc47f958f4636cd494.tar.gz
libcli/auth: add const to set_pw_in_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12782 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
Diffstat (limited to 'libcli')
-rw-r--r--libcli/auth/proto.h2
-rw-r--r--libcli/auth/smbencrypt.c2
2 files changed, 2 insertions, 2 deletions
diff --git a/libcli/auth/proto.h b/libcli/auth/proto.h
index cc9ae336685..a03f45ed7f3 100644
--- a/libcli/auth/proto.h
+++ b/libcli/auth/proto.h
@@ -187,7 +187,7 @@ void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf[532], const DATA_B
encode a password buffer with an already unicode password. The
rest of the buffer is filled with random data to make it harder to attack.
************************************************************/
-bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password);
+bool set_pw_in_buffer(uint8_t buffer[516], const DATA_BLOB *password);
/***********************************************************
decode a password buffer
diff --git a/libcli/auth/smbencrypt.c b/libcli/auth/smbencrypt.c
index ebf6812fabe..afd9286b701 100644
--- a/libcli/auth/smbencrypt.c
+++ b/libcli/auth/smbencrypt.c
@@ -804,7 +804,7 @@ void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf[532], const DATA_B
encode a password buffer with an already unicode password. The
rest of the buffer is filled with random data to make it harder to attack.
************************************************************/
-bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password)
+bool set_pw_in_buffer(uint8_t buffer[516], const DATA_BLOB *password)
{
if (password->length > 512) {
return false;