* make_checksum.c (krb5_c_make_checksum): Add cast assigning to
krb5_data data field.
* make_random_key.c (krb5_c_make_random_key): Likewise.
+ * hmac.c (krb5_hmac): Likewise.
+ * old-api_glue.c (krb5_init_random_key, krb5_decrypt_data):
+ Likewise.
+ * prng.c (krb5_c_make_random_octets): Likewise.
+ * verify_checksum.c (krb5_c_verify_checksum): Likewise.
+
+ * prng.c (krb5_c_random_seed): Cast argument to krb5_nfold.
* keyed_cksum.c (is_keyed_cksum): Use -1U to keep compiler quiet,
since return type is not signed.
krb5_nfold(concatlen*8, concat, keybytes*8, foldstring);
indata.length = keybytes;
- indata.data = foldstring;
+ indata.data = (char *) foldstring;
foldkey.length = keylength;
foldkey.contents = foldkeydata;
+2001-04-10 Ken Raeburn <raeburn@mit.edu>
+
+ * hash_md4.c (k5_md4_hash): Cast argument to krb5_MD4Update.
+ * hash_md5.c (k5_md5_hash): Cast argument to krb5_MD5Update.
+
2001-03-09 Ken Raeburn <raeburn@mit.edu>
* hash_crc32.c, hash_md4.c, hash_md5.c, hash_provider.h,
krb5_MD4Init(&ctx);
for (i=0; i<icount; i++)
- krb5_MD4Update(&ctx, input[i].data, input[i].length);
+ krb5_MD4Update(&ctx, (unsigned char *) input[i].data, input[i].length);
krb5_MD4Final(&ctx);
memcpy(output->data, ctx.digest, RSA_MD4_CKSUM_LENGTH);
krb5_MD5Init(&ctx);
for (i=0; i<icount; i++)
- krb5_MD5Update(&ctx, input[i].data, input[i].length);
+ krb5_MD5Update(&ctx, (unsigned char *) input[i].data, input[i].length);
krb5_MD5Final(&ctx);
memcpy(output->data, ctx.digest, RSA_MD5_CKSUM_LENGTH);
for (i=0; i<icount; i++) {
hashin[0].length = blocksize;
- hashin[0].data = xorkey;
+ hashin[0].data = (char *) xorkey;
hashin[i+1] = input[i];
}
hashout.length = hashsize;
- hashout.data = ihash;
+ hashout.data = (char *) ihash;
if ((ret = ((*(hash->hash))(icount+1, hashin, &hashout))))
goto cleanup;
/* compute the outer hash */
hashin[0].length = blocksize;
- hashin[0].data = xorkey;
+ hashin[0].data = (char *) xorkey;
hashin[1] = hashout;
output->length = hashsize;
krb5_data data;
data.length = keyblock->length;
- data.data = keyblock->contents;
+ data.data = (char *) keyblock->contents;
return(krb5_c_random_seed(context, &data));
}
}
data->length = enc_data->ciphertext.length;
- if ((data->data = (krb5_octet *) malloc(data->length)) == NULL)
+ if ((data->data = (char *) malloc(data->length)) == NULL)
return(ENOMEM);
if ((ret = krb5_c_decrypt(context, key, 0, ivec?&ivecd:0, enc_data, data)))
random_count = 0;
inited = 1;
- krb5_nfold(data->length*8, data->data, STATESIZE*8, STATE);
+ krb5_nfold(data->length*8, (unsigned char *) data->data,
+ STATESIZE*8, STATE);
return(0);
}
if (random_count == 0) {
/* set up random krb5_data, and key to be filled in */
data1.length = keybytes;
- data1.data = STATEKEY;
+ data1.data = (char *) STATEKEY;
key.length = keylength;
key.contents = KEYCONTENTS;
/* encrypt the block */
data1.length = blocksize;
- data1.data = STATEBLOCK;
+ data1.data = (char *) STATEBLOCK;
data2.length = blocksize;
- data2.data = RANDBLOCK;
+ data2.data = (char *) RANDBLOCK;
if ((ret = ((*(enc->encrypt))(&key, NULL, &data1, &data2))))
return(ret);
/* if there's actually a verify function, call it */
indata.length = cksum->length;
- indata.data = cksum->contents;
+ indata.data = (char *) cksum->contents;
if (krb5_cksumtypes_list[i].keyhash &&
krb5_cksumtypes_list[i].keyhash->verify)