Some callers of pam_get_item et al were just casting their argument to
a const void **. Some PAM implementations (Linux) want a const void**,
but others (Solaris) do not. Use the PAM_CONST symbol already defined
by autoconf to declare or cast the relevant variable const or not as
appropriate.
Reviewed-on: http://gerrit.openafs.org/4470
Tested-by: BuildBot <buildbot@rampaginggeek.com>
Reviewed-by: Derrick Brashear <shadow@dementia.org>
(cherry picked from commit
78d1f8d88334f711eaaf6555d3a962a504d3e80e)
Change-Id: I831fa52c238a6cf7ef211e8198815c4420ae7dce
Reviewed-on: http://gerrit.openafs.org/6291
Tested-by: Derrick Brashear <shadow@dementix.org>
Reviewed-by: Derrick Brashear <shadow@dementix.org>
int use_klog = 0;
int set_expires = 0; /* This option is only used in pam_set_cred() */
int got_authtok = 0; /* got PAM_AUTHTOK upon entry */
- char *user = NULL, *password = NULL;
+ PAM_CONST char *user = NULL, *password = NULL;
afs_int32 password_expires = -1;
int torch_password = 1;
int i;
- struct pam_conv *pam_convp = NULL;
+ PAM_CONST struct pam_conv *pam_convp = NULL;
int auth_ok;
struct passwd unix_pwd, *upwd = NULL;
char upwd_buf[2048]; /* size is a guess. */
refresh_token, set_token, dont_fork, use_klog);
/* Try to get the user-interaction info, if available. */
- errcode = pam_get_item(pamh, PAM_CONV, (const void **)&pam_convp);
+ errcode = pam_get_item(pamh, PAM_CONV, (PAM_CONST void **)&pam_convp);
if (errcode != PAM_SUCCESS) {
pam_afs_syslog(LOG_WARNING, PAMAFS_NO_USER_INT);
pam_convp = NULL;
/* Who are we trying to authenticate here? */
if ((errcode =
- pam_get_user(pamh, (const char **)&user,
+ pam_get_user(pamh, &user,
"login: ")) != PAM_SUCCESS) {
pam_afs_syslog(LOG_ERR, PAMAFS_NOUSER, errcode);
RET(PAM_USER_UNKNOWN);
RET(PAM_AUTH_ERR);
}
#endif
- errcode = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password);
+ errcode = pam_get_item(pamh, PAM_AUTHTOK, (PAM_CONST void **)&password);
if (errcode != PAM_SUCCESS || password == NULL) {
if (use_first_pass) {
pam_afs_syslog(LOG_ERR, PAMAFS_PASSWD_REQ, user);
char realm[256];
char cell[256];
char *localcell;
- char *user = NULL, *password = NULL;
+ PAM_CONST char *user = NULL, *password = NULL;
char *new_password = NULL, *verify_password = NULL;
char upwd_buf[2048]; /* size is a guess. */
char *reason = NULL;
struct ktc_encryptionKey oldkey, newkey;
struct ktc_token token;
struct ubik_client *conn = 0;
- struct pam_conv *pam_convp = NULL;
+ PAM_CONST struct pam_conv *pam_convp = NULL;
struct passwd unix_pwd, *upwd = NULL;
#ifndef AFS_SUN56_ENV
}
/* Try to get the user-interaction info, if available. */
- errcode = pam_get_item(pamh, PAM_CONV, (const void **)&pam_convp);
+ errcode = pam_get_item(pamh, PAM_CONV, (PAM_CONST void **)&pam_convp);
if (errcode != PAM_SUCCESS) {
pam_afs_syslog(LOG_WARNING, PAMAFS_NO_USER_INT);
pam_convp = NULL;
/* Who are we trying to authenticate here? */
if ((errcode =
- pam_get_user(pamh, (const char **)&user,
+ pam_get_user(pamh, &user,
"AFS username: ")) != PAM_SUCCESS) {
pam_afs_syslog(LOG_ERR, PAMAFS_NOUSER, errcode);
RET(PAM_USER_UNKNOWN);
}
#endif
- errcode = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password);
+ errcode = pam_get_item(pamh, PAM_AUTHTOK, (PAM_CONST void **)&password);
if (errcode != PAM_SUCCESS || password == NULL) {
if (use_first_pass) {
pam_afs_syslog(LOG_ERR, PAMAFS_PASSWD_REQ, user);
int set_expires = 0; /* the default is to not to set the env variable */
int use_klog = 0;
int i;
- struct pam_conv *pam_convp = NULL;
+ PAM_CONST struct pam_conv *pam_convp = NULL;
char my_password_buf[256];
char *cell_ptr = NULL;
char sbuffer[100];
int torch_password = 1;
int auth_ok = 0;
char *lh;
- char *user = NULL;
+ PAM_CONST char *user = NULL;
int password_expires = -1;
char *reason = NULL;
struct passwd unix_pwd, *upwd = NULL;
pam_afs_syslog(LOG_DEBUG, PAMAFS_OPTIONS, nowarn, use_first_pass,
try_first_pass, ignore_uid, ignore_uid_id, 8, 8, 8, 8);
/* Try to get the user-interaction info, if available. */
- errcode = pam_get_item(pamh, PAM_CONV, (const void **)&pam_convp);
+ errcode = pam_get_item(pamh, PAM_CONV, (PAM_CONST void **)&pam_convp);
if (errcode != PAM_SUCCESS) {
if (logmask && LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NO_USER_INT);
/* Who are we trying to authenticate here? */
if ((errcode =
- pam_get_user(pamh, (const char **)&user,
+ pam_get_user(pamh, (PAM_CONST char **)&user,
"AFS username:")) != PAM_SUCCESS) {
pam_afs_syslog(LOG_ERR, PAMAFS_NOUSER, errcode);
RET(PAM_USER_UNKNOWN);