summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormho <mho@openbsd.org>2003-05-15 05:43:52 +0000
committermho <mho@openbsd.org>2003-05-15 05:43:52 +0000
commit5e9e00d2c2cb7c22a63389e9f4b1ab7e643deb43 (patch)
treeed998961dafcb4f4f1862b3e5a6216c55639db78
parentIPv6 IPsec gateway now functions; patch by itojun, tested by myself and vincent (diff)
downloadwireguard-openbsd-5e9e00d2c2cb7c22a63389e9f4b1ab7e643deb43.tar.xz
wireguard-openbsd-5e9e00d2c2cb7c22a63389e9f4b1ab7e643deb43.zip
-Wall; ok hin@
-rw-r--r--kerberosV/src/kdc/string2key.c2
-rw-r--r--kerberosV/src/lib/krb5/crypto.c17
2 files changed, 10 insertions, 9 deletions
diff --git a/kerberosV/src/kdc/string2key.c b/kerberosV/src/kdc/string2key.c
index e1565bbd411..67f4af1a0c9 100644
--- a/kerberosV/src/kdc/string2key.c
+++ b/kerberosV/src/kdc/string2key.c
@@ -131,7 +131,7 @@ main(int argc, char **argv)
if(num == 0)
krb5_errx(context, 1, "there are no encryption types for that keytype");
etype = etypes[0];
- krb5_enctype_to_string(context, etype, &keytype_str);
+ krb5_enctype_to_string(context, etype, (char **) &keytype_str);
if(num > 1 && version5)
krb5_warnx(context, "ambiguous keytype, using %s", keytype_str);
}
diff --git a/kerberosV/src/lib/krb5/crypto.c b/kerberosV/src/lib/krb5/crypto.c
index 32b4bc8c9ec..21f26ff8163 100644
--- a/kerberosV/src/lib/krb5/crypto.c
+++ b/kerberosV/src/lib/krb5/crypto.c
@@ -293,12 +293,13 @@ krb5_DES_AFS3_Transarc_string_to_key (krb5_data pw,
memcpy(&temp_key, "kerberos", 8);
des_set_odd_parity (&temp_key);
des_set_key (&temp_key, schedule);
- des_cbc_cksum (password, &ivec, passlen, schedule, &ivec);
+ des_cbc_cksum ((des_cblock *) password, &ivec, passlen, schedule, &ivec);
memcpy(&temp_key, &ivec, 8);
des_set_odd_parity (&temp_key);
des_set_key (&temp_key, schedule);
- des_cbc_cksum (password, key, passlen, schedule, &ivec);
+ des_cbc_cksum ((des_cblock *) password, (des_cblock *) key, passlen,
+ schedule, &ivec);
memset(&schedule, 0, sizeof(schedule));
memset(&temp_key, 0, sizeof(temp_key));
memset(&ivec, 0, sizeof(ivec));
@@ -406,8 +407,8 @@ DES3_string_to_key(krb5_context context,
des_set_key(keys + i, s[i]);
}
memset(&ivec, 0, sizeof(ivec));
- des_ede3_cbc_encrypt(tmp,
- tmp, sizeof(tmp),
+ des_ede3_cbc_encrypt((des_cblock *) tmp,
+ (des_cblock *) tmp, sizeof(tmp),
s[0], s[1], s[2], &ivec, DES_ENCRYPT);
memset(s, 0, sizeof(s));
memset(&ivec, 0, sizeof(ivec));
@@ -1188,8 +1189,8 @@ RSA_MD4_DES_checksum(krb5_context context,
MD4_Update (&md4, data, len);
MD4_Final (p + 8, &md4);
memset (&ivec, 0, sizeof(ivec));
- des_cbc_encrypt(p,
- p,
+ des_cbc_encrypt((des_cblock *) p,
+ (des_cblock *) p,
24,
key->schedule->data,
&ivec,
@@ -1263,8 +1264,8 @@ RSA_MD5_DES_checksum(krb5_context context,
MD5_Update (&md5, data, len);
MD5_Final (p + 8, &md5);
memset (&ivec, 0, sizeof(ivec));
- des_cbc_encrypt(p,
- p,
+ des_cbc_encrypt((des_cblock *) p,
+ (des_cblock *) p,
24,
key->schedule->data,
&ivec,