diff options
author | Sumit Bose <sbose@redhat.com> | 2010-11-05 14:57:13 +0100 |
---|---|---|
committer | Stephen Gallagher <sgallagh@redhat.com> | 2010-11-15 15:37:30 -0500 |
commit | 4b498111c49b254e9aa5e2b0d4fcc1ba24a04236 (patch) | |
tree | 475ee706a527c23ba502af6f820c2c83ba128eae /src/responder | |
parent | be434625437ff3dd4cce83a655226c67943e5ceb (diff) | |
download | sssd-4b498111c49b254e9aa5e2b0d4fcc1ba24a04236.tar.gz sssd-4b498111c49b254e9aa5e2b0d4fcc1ba24a04236.tar.xz sssd-4b498111c49b254e9aa5e2b0d4fcc1ba24a04236.zip |
Avoid long long in messages to PAM client use int64_t
Diffstat (limited to 'src/responder')
-rw-r--r-- | src/responder/pam/pamsrv_cmd.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/responder/pam/pamsrv_cmd.c b/src/responder/pam/pamsrv_cmd.c index 7bfd0f24..1ba6f17f 100644 --- a/src/responder/pam/pamsrv_cmd.c +++ b/src/responder/pam/pamsrv_cmd.c @@ -507,21 +507,21 @@ static void pam_cache_auth_done(struct pam_auth_req *preq, int ret, uint32_t resp_type; size_t resp_len; uint8_t *resp; - long long dummy; + int64_t dummy; switch (ret) { case EOK: preq->pd->pam_status = PAM_SUCCESS; resp_type = SSS_PAM_USER_INFO_OFFLINE_AUTH; - resp_len = sizeof(uint32_t) + sizeof(long long); + resp_len = sizeof(uint32_t) + sizeof(int64_t); resp = talloc_size(preq->pd, resp_len); if (resp == NULL) { DEBUG(1, ("talloc_size failed, cannot prepare user info.\n")); } else { memcpy(resp, &resp_type, sizeof(uint32_t)); - dummy = (long long) expire_date; - memcpy(resp+sizeof(uint32_t), &dummy, sizeof(long long)); + dummy = (int64_t) expire_date; + memcpy(resp+sizeof(uint32_t), &dummy, sizeof(int64_t)); ret = pam_add_response(preq->pd, SSS_PAM_USER_INFO, resp_len, (const uint8_t *) resp); if (ret != EOK) { @@ -539,14 +539,14 @@ static void pam_cache_auth_done(struct pam_auth_req *preq, int ret, preq->pd->pam_status = PAM_PERM_DENIED; if (delayed_until >= 0) { resp_type = SSS_PAM_USER_INFO_OFFLINE_AUTH_DELAYED; - resp_len = sizeof(uint32_t) + sizeof(long long); + resp_len = sizeof(uint32_t) + sizeof(int64_t); resp = talloc_size(preq->pd, resp_len); if (resp == NULL) { DEBUG(1, ("talloc_size failed, cannot prepare user info.\n")); } else { memcpy(resp, &resp_type, sizeof(uint32_t)); - dummy = (long long) delayed_until; - memcpy(resp+sizeof(uint32_t), &dummy, sizeof(long long)); + dummy = (int64_t) delayed_until; + memcpy(resp+sizeof(uint32_t), &dummy, sizeof(int64_t)); ret = pam_add_response(preq->pd, SSS_PAM_USER_INFO, resp_len, (const uint8_t *) resp); if (ret != EOK) { |