r3960: fix compiler warnings
authorStefan Metzmacher <metze@samba.org>
Thu, 25 Nov 2004 18:02:35 +0000 (18:02 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 18:06:08 +0000 (13:06 -0500)
metze

source/lib/crypto/crc32.c
source/lib/crypto/crc32.h
source/libcli/auth/ntlmssp_sign.c

index f2d76332f963ac41af9c95a245b1855444ccc43b..00cee243b471d456bfcabd50d890a9cdce358035 100644 (file)
@@ -55,7 +55,7 @@ static const unsigned long CRCTable[256] =
         0xB40BBE37,0xC30C8EA1,0x5A05DF1B,0x2D02EF8D
 };
 
-uint32_t crc32_calc_buffer( const char *buffer, uint32_t count)
+uint32_t crc32_calc_buffer(const uint8_t *buffer, uint32_t count)
 {
        uint32_t crc=0xffffffff, i;
         for(i=0;i<count;i++)
index a1030c14df4efda8c813fc1ccf657b98b4b4958e..5b3642ffc86ee16ca4a14301f67ccbb28dc22684 100644 (file)
@@ -1,2 +1 @@
-uint32_t crc32_calc_buffer( const char *buffer, uint32_t count);
-
+uint32_t crc32_calc_buffer(const uint8_t *buffer, uint32_t count);
index 7d193c850cbaa75e59248a694f36a56cfb84d5a0..e2f5237a882af7a93248451c4761f5a645824dfa 100644 (file)
@@ -116,7 +116,7 @@ static NTSTATUS ntlmssp_make_packet_signature(struct ntlmssp_state *ntlmssp_stat
 
        } else {
                uint32_t crc;
-               crc = crc32_calc_buffer((const char *)data, length);
+               crc = crc32_calc_buffer(data, length);
                if (!msrpc_gen(sig_mem_ctx, sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlm_seq_num)) {
                        return NT_STATUS_NO_MEMORY;
                }
@@ -202,10 +202,10 @@ NTSTATUS ntlmssp_check_packet(struct ntlmssp_state *ntlmssp_state,
                    memcmp(local_sig.data + 8, 
                           sig->data + 8, sig->length - 8) != 0) {
                        DEBUG(5, ("BAD SIG NTLM1: wanted signature of\n"));
-                       dump_data(5, (const char *)local_sig.data, local_sig.length);
+                       dump_data(5, local_sig.data, local_sig.length);
                        
                        DEBUG(5, ("BAD SIG: got signature of\n"));
-                       dump_data(5, (const char *)(sig->data), sig->length);
+                       dump_data(5, sig->data, sig->length);
                        
                        DEBUG(0, ("NTLMSSP NTLM1 packet check failed due to invalid signature!\n"));
                        return NT_STATUS_ACCESS_DENIED;
@@ -255,7 +255,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
                }
        } else {
                uint32_t crc;
-               crc = crc32_calc_buffer((const char *)data, length);
+               crc = crc32_calc_buffer(data, length);
                if (!msrpc_gen(sig_mem_ctx, sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlm_seq_num)) {
                        return NT_STATUS_NO_MEMORY;
                }