diff options
author | Thorsten Kukuk <kukuk@thkukuk.de> | 2005-06-09 17:29:18 +0000 |
---|---|---|
committer | Thorsten Kukuk <kukuk@thkukuk.de> | 2005-06-09 17:29:18 +0000 |
commit | 0a7fe016a03184815b03fe92d50c58e67c8c05fc (patch) | |
tree | b9c25dd0fbbb71e08b2826e046b763facdcff8df /modules/pam_userdb/pam_userdb.c | |
parent | fa433b9e2fa1a00e13df36a8b709ffda9e3e715b (diff) | |
download | pam-0a7fe016a03184815b03fe92d50c58e67c8c05fc.tar.gz pam-0a7fe016a03184815b03fe92d50c58e67c8c05fc.tar.bz2 pam-0a7fe016a03184815b03fe92d50c58e67c8c05fc.zip |
Relevant BUGIDs: none
Purpose of commit: cleanup
Commit summary:
---------------
Fix all occurrence of dereferencing type-punned pointer will break
strict-aliasing rules warnings
Diffstat (limited to 'modules/pam_userdb/pam_userdb.c')
-rw-r--r-- | modules/pam_userdb/pam_userdb.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/modules/pam_userdb/pam_userdb.c b/modules/pam_userdb/pam_userdb.c index a0a5b8b5..f019c67a 100644 --- a/modules/pam_userdb/pam_userdb.c +++ b/modules/pam_userdb/pam_userdb.c @@ -295,7 +295,7 @@ int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) { const char *username; - const char *password; + const void *password; char *database = NULL; char *cryptmode = NULL; int retval = PAM_AUTH_ERR, ctrl; @@ -329,7 +329,7 @@ int pam_sm_authenticate(pam_handle_t *pamh, int flags, * user anyway, so check for one and handle a failure for that case. If * use_authtok wasn't specified, then we've already asked once and needn't * do so again. */ - retval = pam_get_item(pamh, PAM_AUTHTOK, (const void **) &password); + retval = pam_get_item(pamh, PAM_AUTHTOK, &password); if ((retval != PAM_SUCCESS) && ((ctrl & PAM_USE_AUTHTOK_ARG) != 0)) { retval = conversation(pamh); if (retval != PAM_SUCCESS) { @@ -340,7 +340,7 @@ int pam_sm_authenticate(pam_handle_t *pamh, int flags, } /* Get the password */ - retval = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); + retval = pam_get_item(pamh, PAM_AUTHTOK, &password); if (retval != PAM_SUCCESS) { _pam_log(LOG_ERR, "Could not retrieve user's password"); return -2; |