summaryrefslogtreecommitdiff
path: root/ext/sqlite/libsqlite/src/auth.c
diff options
context:
space:
mode:
Diffstat (limited to 'ext/sqlite/libsqlite/src/auth.c')
-rw-r--r--ext/sqlite/libsqlite/src/auth.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/ext/sqlite/libsqlite/src/auth.c b/ext/sqlite/libsqlite/src/auth.c
index 547cd18f14..06b8126ae0 100644
--- a/ext/sqlite/libsqlite/src/auth.c
+++ b/ext/sqlite/libsqlite/src/auth.c
@@ -89,7 +89,7 @@ static void sqliteAuthBadReturnCode(Parse *pParse, int rc){
sprintf(zBuf, "(%d)", rc);
sqliteSetString(&pParse->zErrMsg, "illegal return value ", zBuf,
" from the authorization function - should be SQLITE_OK, "
- "SQLITE_IGNORE, or SQLITE_DENY", 0);
+ "SQLITE_IGNORE, or SQLITE_DENY", (char*)0);
pParse->nErr++;
pParse->rc = SQLITE_MISUSE;
}
@@ -151,10 +151,10 @@ void sqliteAuthRead(
}else if( rc==SQLITE_DENY ){
if( db->nDb>2 || pExpr->iDb!=0 ){
sqliteSetString(&pParse->zErrMsg,"access to ", zDBase, ".",
- pTab->zName, ".", zCol, " is prohibited", 0);
+ pTab->zName, ".", zCol, " is prohibited", (char*)0);
}else{
sqliteSetString(&pParse->zErrMsg,"access to ", pTab->zName, ".",
- zCol, " is prohibited", 0);
+ zCol, " is prohibited", (char*)0);
}
pParse->nErr++;
pParse->rc = SQLITE_AUTH;
@@ -184,7 +184,7 @@ int sqliteAuthCheck(
}
rc = db->xAuth(db->pAuthArg, code, zArg1, zArg2, zArg3, pParse->zAuthContext);
if( rc==SQLITE_DENY ){
- sqliteSetString(&pParse->zErrMsg, "not authorized", 0);
+ sqliteSetString(&pParse->zErrMsg, "not authorized", (char*)0);
pParse->rc = SQLITE_AUTH;
pParse->nErr++;
}else if( rc!=SQLITE_OK && rc!=SQLITE_IGNORE ){