diff options
author | peter@mysql.com <> | 2002-11-29 21:34:13 +0300 |
---|---|---|
committer | peter@mysql.com <> | 2002-11-29 21:34:13 +0300 |
commit | 7e6977808f2d11d1e24997d110268c9f5bb818e5 (patch) | |
tree | ec4afc35d34027e775dfc7af5bb08c3174e7277e /sql/password.c | |
parent | c47ef7450f8de0fa74edd74c057f9fdd04f01a0d (diff) | |
download | mariadb-git-7e6977808f2d11d1e24997d110268c9f5bb818e5.tar.gz |
Correct bug which exposed itself in rpl000017
Commit for merge
Diffstat (limited to 'sql/password.c')
-rw-r--r-- | sql/password.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/sql/password.c b/sql/password.c index 13f8d593da6..b9eb6012354 100644 --- a/sql/password.c +++ b/sql/password.c @@ -232,7 +232,7 @@ void hash_password(ulong *result, const char *password) none */ -inline void password_hash_stage1(char *to, const char *password) +void password_hash_stage1(char *to, const char *password) { SHA1_CONTEXT context; sha1_reset(&context); @@ -259,7 +259,7 @@ inline void password_hash_stage1(char *to, const char *password) none */ -inline void password_hash_stage2(char *to,const char *salt) +void password_hash_stage2(char *to,const char *salt) { SHA1_CONTEXT context; sha1_reset(&context); @@ -398,7 +398,7 @@ my_bool validate_password(const char* password, const char* message, ulong* salt password length >0 */ -inline uint get_password_length(my_bool force_old_scramble) +inline int get_password_length(my_bool force_old_scramble) { if (force_old_scramble) return 16; @@ -418,7 +418,7 @@ inline uint get_password_length(my_bool force_old_scramble) !0 password version char for newer passwords */ -inline uint8 get_password_version(const char* password) +inline char get_password_version(const char* password) { if (password==NULL) return 0; if (password[0]==PVERSION41_CHAR) return PVERSION41_CHAR; |