ports/net/samba3/files/patch-nsswitch_pam_winbind.c
Renato Botelho a8c167b565 *** net/samba3:
- Update to 3.0.23c

Common bugs fixed in 3.0.23c include: [1]

  o Authentication failures in pam_winbind when the AD domain
    policy is set to not expire passwords.
  o Authorization failures when using smb.conf options such
    as "valid users" with the smbpasswd passdb backend.

*** net/samba-libsmbclient: [2]
- Small cosmetic changes

*** net/py-samba: [3]
- Reset PORTREVISION back, as master port version bumped

PR:		ports/102805 [1]
		ports/102806 [2]
		ports/102807 [3]
Submitted by:	Timur I. Bakeyev <timur@gnu.org> (maintainer)
2006-09-04 19:00:17 +00:00

20 lines
803 B
C

--- nsswitch/pam_winbind.c.orig Mon Aug 7 18:46:33 2006
+++ nsswitch/pam_winbind.c Thu Aug 24 01:30:57 2006
@@ -1016,7 +1016,7 @@
}
return PAM_USER_UNKNOWN;
case 0:
- pam_get_data( pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, (const void **)&tmp);
+ pam_get_data( pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, (void **)&tmp);
if (tmp != NULL) {
retval = atoi(tmp);
switch (retval) {
@@ -1319,7 +1319,7 @@
* By reaching here we have approved the passwords and must now
* rebuild the password database file.
*/
- pam_get_data( pamh, PAM_WINBIND_PWD_LAST_SET, (const void **)&pwdlastset_update);
+ pam_get_data( pamh, PAM_WINBIND_PWD_LAST_SET, (void **)&pwdlastset_update);
retval = winbind_chauthtok_request(pamh, ctrl, user, pass_old, pass_new, pwdlastset_update);
if (retval) {