s3: Fix up various string "const" warnings
authorMatthias Dieter Wallnöfer <mwallnoefer@yahoo.de>
Thu, 24 Sep 2009 21:52:19 +0000 (23:52 +0200)
committerMatthias Dieter Wallnöfer <mwallnoefer@yahoo.de>
Thu, 24 Sep 2009 21:58:36 +0000 (23:58 +0200)
My changed introduced some warnings. Fix them.

source3/auth/auth.c
source3/param/loadparm.c
source3/smbd/map_username.c
source3/smbd/password.c

index ce8722a1b48d5cd0e88399d750ffcdbb11cdedcd..b445987ee291e28edb88cb56316d593a7c25b202 100644 (file)
@@ -455,7 +455,7 @@ NTSTATUS make_auth_context_subsystem(struct auth_context **auth_context)
        NTSTATUS nt_status;
 
        if (lp_auth_methods()
-           && !(auth_method_list = str_list_copy(talloc_tos(), 
+           && !(auth_method_list = (char **) str_list_copy(talloc_tos(), 
                              lp_auth_methods()))) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -465,13 +465,13 @@ NTSTATUS make_auth_context_subsystem(struct auth_context **auth_context)
                {
                case SEC_DOMAIN:
                        DEBUG(5,("Making default auth method list for security=domain\n"));
-                       auth_method_list = str_list_make_v3(
+                       auth_method_list = (char **) str_list_make_v3(
                                talloc_tos(), "guest sam winbind:ntdomain",
                                NULL);
                        break;
                case SEC_SERVER:
                        DEBUG(5,("Making default auth method list for security=server\n"));
-                       auth_method_list = str_list_make_v3(
+                       auth_method_list = (char **) str_list_make_v3(
                                talloc_tos(), "guest sam smbserver",
                                NULL);
                        break;
@@ -479,36 +479,36 @@ NTSTATUS make_auth_context_subsystem(struct auth_context **auth_context)
                        if (lp_encrypted_passwords()) { 
                                if ((lp_server_role() == ROLE_DOMAIN_PDC) || (lp_server_role() == ROLE_DOMAIN_BDC)) {
                                        DEBUG(5,("Making default auth method list for DC, security=user, encrypt passwords = yes\n"));
-                                       auth_method_list = str_list_make_v3(
+                                       auth_method_list = (char **) str_list_make_v3(
                                                talloc_tos(),
                                                "guest sam winbind:trustdomain",
                                                NULL);
                                } else {
                                        DEBUG(5,("Making default auth method list for standalone security=user, encrypt passwords = yes\n"));
-                                       auth_method_list = str_list_make_v3(
+                                       auth_method_list = (char **) str_list_make_v3(
                                                talloc_tos(), "guest sam",
                                                NULL);
                                }
                        } else {
                                DEBUG(5,("Making default auth method list for security=user, encrypt passwords = no\n"));
-                               auth_method_list = str_list_make_v3(
+                               auth_method_list = (char **) str_list_make_v3(
                                        talloc_tos(), "guest unix", NULL);
                        }
                        break;
                case SEC_SHARE:
                        if (lp_encrypted_passwords()) {
                                DEBUG(5,("Making default auth method list for security=share, encrypt passwords = yes\n"));
-                               auth_method_list = str_list_make_v3(
+                               auth_method_list = (char **) str_list_make_v3(
                                        talloc_tos(), "guest sam", NULL);
                        } else {
                                DEBUG(5,("Making default auth method list for security=share, encrypt passwords = no\n"));
-                               auth_method_list = str_list_make_v3(
+                               auth_method_list = (char **) str_list_make_v3(
                                        talloc_tos(), "guest unix", NULL);
                        }
                        break;
                case SEC_ADS:
                        DEBUG(5,("Making default auth method list for security=ADS\n"));
-                       auth_method_list = str_list_make_v3(
+                       auth_method_list = (char **) str_list_make_v3(
                                talloc_tos(), "guest sam winbind:ntdomain",
                                NULL);
                        break;
index b278b9616d0857cb0a4eaa43319d87737174cada..c93787e638d3068f31ccc34b1ac84cd8b773322f 100644 (file)
@@ -6745,7 +6745,7 @@ static void copy_service(struct service *pserviceDest, struct service *pserviceS
                                        break;
                                case P_LIST:
                                        TALLOC_FREE(*((char ***)dest_ptr));
-                                       *((char ***)dest_ptr) = str_list_copy(NULL, 
+                                       *((const char ***)dest_ptr) = str_list_copy(NULL, 
                                                      *(const char ***)src_ptr);
                                        break;
                                default:
@@ -8218,8 +8218,8 @@ static void lp_save_defaults(void)
                        continue;
                switch (parm_table[i].type) {
                        case P_LIST:
-                               parm_table[i].def.lvalue = str_list_copy(
-                                       NULL, *(const char ***)parm_table[i].ptr);
+                               parm_table[i].def.lvalue = (char **)
+                                       str_list_copy(NULL, *(const char ***)parm_table[i].ptr);
                                break;
                        case P_STRING:
                        case P_USTRING:
index 24b4ddd2718f027b2feb24f2fa37d10f3e2f3e63..e9ef74cf25f90259b54330040cacb75851794afa 100644 (file)
@@ -146,7 +146,7 @@ bool map_username(struct smbd_server_connection *sconn, fstring user)
        while((s=fgets_slash(buf,sizeof(buf),f))!=NULL) {
                char *unixname = s;
                char *dosname = strchr_m(unixname,'=');
-               char **dosuserlist;
+               const char **dosuserlist;
                bool return_if_mapped = False;
 
                if (!dosname)
index 4c1cef45cc77b8f15c78359919c15b23df65da80..d6a84470e119c9eb9e50b0796819b03c7b49b3d7 100644 (file)
@@ -551,14 +551,13 @@ bool user_in_list(struct smbd_server_connection *sconn,
 static bool user_ok(struct smbd_server_connection *sconn,
                    const char *user, int snum)
 {
-       char **valid, **invalid;
        bool ret;
 
-       valid = invalid = NULL;
        ret = True;
 
        if (lp_invalid_users(snum)) {
-               invalid = str_list_copy(talloc_tos(), lp_invalid_users(snum));
+               char **invalid = (char **) str_list_copy(talloc_tos(),
+                       lp_invalid_users(snum));
                if (invalid &&
                    str_list_substitute(invalid, "%S", lp_servicename(snum))) {
 
@@ -567,36 +566,37 @@ static bool user_ok(struct smbd_server_connection *sconn,
 
                        if ( invalid && str_list_sub_basic(invalid, "", "") ) {
                                ret = !user_in_list(sconn, user,
-                                                   (const char **)invalid);
+                                               (const char **)invalid);
                        }
                }
+               TALLOC_FREE(invalid);
        }
-       TALLOC_FREE(invalid);
 
        if (ret && lp_valid_users(snum)) {
-               valid = str_list_copy(talloc_tos(), lp_valid_users(snum));
-               if ( valid &&
-                    str_list_substitute(valid, "%S", lp_servicename(snum)) ) {
+               char **valid = (char **) str_list_copy(talloc_tos(),
+                       lp_valid_users(snum));
+               if (valid &&
+                    str_list_substitute(valid, "%S", lp_servicename(snum))) {
 
                        /* This is used in sec=share only, so no current user
                         * around to pass to str_list_sub_basic() */
 
                        if ( valid && str_list_sub_basic(valid, "", "") ) {
                                ret = user_in_list(sconn, user,
-                                                  (const char **)valid);
+                                               (const char **)valid);
                        }
                }
+               TALLOC_FREE(valid);
        }
-       TALLOC_FREE(valid);
 
        if (ret && lp_onlyuser(snum)) {
-               char **user_list = str_list_make_v3(
+               char **user_list = (char **) str_list_make_v3(
                        talloc_tos(), lp_username(snum), NULL);
                if (user_list &&
                    str_list_substitute(user_list, "%S",
                                        lp_servicename(snum))) {
                        ret = user_in_list(sconn, user,
-                                          (const char **)user_list);
+                                               (const char **)user_list);
                }
                TALLOC_FREE(user_list);
        }