c7ab4f8
--- freeradius-1.1.3/src/modules/rlm_ldap/rlm_ldap.c.ldap	2006-05-09 01:45:02.000000000 +0200
c7ab4f8
+++ freeradius-1.1.3/src/modules/rlm_ldap/rlm_ldap.c	2006-11-13 15:51:48.000000000 +0100
c7ab4f8
@@ -1013,7 +1013,7 @@
c7ab4f8
 		radlog(L_ERR, "rlm_ldap: Add ldap connections are in use");
c7ab4f8
 		return 1;
c7ab4f8
 	}
c7ab4f8
-	if ((res = perform_search(inst, conn, vp_user_dn->strvalue, LDAP_SCOPE_BASE,
c7ab4f8
+	if ((res = perform_search(inst, conn, (char *)vp_user_dn->strvalue, LDAP_SCOPE_BASE,
c7ab4f8
 					filter, group_attrs,&result)) != RLM_MODULE_OK){
c7ab4f8
 		DEBUG("rlm_ldap::ldap_groupcmp: Search returned error");
c7ab4f8
 		ldap_release_conn(conn_id, inst->conns);
c7ab4f8
@@ -1327,7 +1327,7 @@
c7ab4f8
 
c7ab4f8
 		strNcpy(filter,inst->base_filter,sizeof(filter));
c7ab4f8
 		if (user_profile)
c7ab4f8
-			profile = user_profile->strvalue;
c7ab4f8
+			profile = (char *)user_profile->strvalue;
c7ab4f8
 		if (profile && strlen(profile)){
c7ab4f8
 			if ((res = perform_search(instance, conn,
c7ab4f8
 				profile, LDAP_SCOPE_BASE,
c7ab4f8
@@ -1430,7 +1430,7 @@
c7ab4f8
 								return RLM_MODULE_FAIL;
c7ab4f8
 							}
c7ab4f8
 							passwd_len = strlen(passwd_val);
c7ab4f8
-							strncpy(passwd_item->strvalue,passwd_val,MAX_STRING_LEN - 1);
c7ab4f8
+							strncpy((char *)passwd_item->strvalue,passwd_val,MAX_STRING_LEN - 1);
c7ab4f8
 							passwd_item->length = (passwd_len > (MAX_STRING_LEN - 1)) ? (MAX_STRING_LEN - 1) : passwd_len;
c7ab4f8
 							pairadd(&request->config_items,passwd_item);
c7ab4f8
 							DEBUG("rlm_ldap: Added password %s in check items",passwd_item->strvalue);
c7ab4f8
@@ -1748,16 +1748,16 @@
c7ab4f8
 		ldap_msgfree(result);
c7ab4f8
 	}
c7ab4f8
 
c7ab4f8
-	user_dn = vp_user_dn->strvalue;
c7ab4f8
+	user_dn = (char *)vp_user_dn->strvalue;
c7ab4f8
 
c7ab4f8
 	DEBUG("rlm_ldap: user DN: %s", user_dn);
c7ab4f8
 
c7ab4f8
 #ifndef NOVELL
c7ab4f8
-	ld_user = ldap_connect(instance, user_dn, request->password->strvalue,
c7ab4f8
+	ld_user = ldap_connect(instance, user_dn, (char *)request->password->strvalue,
c7ab4f8
 			       1, &res, NULL);
c7ab4f8
 #else
c7ab4f8
 
c7ab4f8
-	ld_user = ldap_connect(instance, user_dn, request->password->strvalue,
c7ab4f8
+	ld_user = ldap_connect(instance, user_dn, (char *)request->password->strvalue,
c7ab4f8
 			1, &res, &err;;
c7ab4f8
 
c7ab4f8
 	if(err != NULL){
c7ab4f8
@@ -2023,7 +2023,7 @@
c7ab4f8
 
c7ab4f8
 #ifdef HAVE_LDAP_INT_TLS_CONFIG
c7ab4f8
 
c7ab4f8
-	if ( ldap_int_tls_config( NULL, LDAP_OPT_X_TLS_REQUIRE_CERT,
c7ab4f8
+	if ( ldap_set_option( NULL, LDAP_OPT_X_TLS_REQUIRE_CERT,
c7ab4f8
 							  (inst->tls_require_cert) )
c7ab4f8
 		 != LDAP_OPT_SUCCESS) {
c7ab4f8
 		radlog(L_ERR, "rlm_ldap: could not set "
c7ab4f8
@@ -2430,7 +2430,7 @@
c7ab4f8
 				}
c7ab4f8
 				if (do_xlat) {
c7ab4f8
 					newpair->flags.do_xlat = 1;
c7ab4f8
-					strNcpy(newpair->strvalue, buf,
c7ab4f8
+					strNcpy((char *)newpair->strvalue, buf,
c7ab4f8
 						sizeof(newpair->strvalue));
c7ab4f8
 					newpair->length = 0;
c7ab4f8
 				}