mirror of
https://github.com/samba-team/samba.git
synced 2025-01-11 05:18:09 +03:00
parent
85811b273d
commit
8401971a87
@ -121,7 +121,8 @@ void hmac_md5_final(unsigned char *digest, HMACMD5Context *ctx)
|
||||
use the microsoft hmacmd5 init method because the key is 16 bytes.
|
||||
************************************************************/
|
||||
|
||||
void hmac_md5( unsigned char key[16], unsigned char *data, int data_len, unsigned char *digest)
|
||||
void hmac_md5( unsigned char key[16], const unsigned char *data, int data_len,
|
||||
unsigned char *digest)
|
||||
{
|
||||
HMACMD5Context ctx;
|
||||
hmac_md5_init_limK_to_64(key, 16, &ctx);
|
||||
|
@ -1551,7 +1551,7 @@ static void schannel_digest(struct schannel_auth_struct *a,
|
||||
uchar digest_final[16])
|
||||
{
|
||||
uchar whole_packet_digest[16];
|
||||
static uchar zeros[4];
|
||||
static const uchar zeros[4] = { 0, };
|
||||
struct MD5Context ctx3;
|
||||
|
||||
/* verfiy the signature on the packet by MD5 over various bits */
|
||||
@ -1580,7 +1580,7 @@ static void schannel_get_sealing_key(struct schannel_auth_struct *a,
|
||||
RPC_AUTH_SCHANNEL_CHK *verf,
|
||||
uchar sealing_key[16])
|
||||
{
|
||||
static uchar zeros[4];
|
||||
static const uchar zeros[4] = { 0, };
|
||||
uchar digest2[16];
|
||||
uchar sess_kf0[16];
|
||||
int i;
|
||||
@ -1607,7 +1607,7 @@ static void schannel_get_sealing_key(struct schannel_auth_struct *a,
|
||||
static void schannel_deal_with_seq_num(struct schannel_auth_struct *a,
|
||||
RPC_AUTH_SCHANNEL_CHK *verf)
|
||||
{
|
||||
static uchar zeros[4];
|
||||
static const uchar zeros[4] = { 0, };
|
||||
uchar sequence_key[16];
|
||||
uchar digest1[16];
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user