Navigation Menu

Skip to content

Commit

Permalink
Clean up argument types for openconnect_base64_decode()
Browse files Browse the repository at this point in the history
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
  • Loading branch information
David Woodhouse authored and David Woodhouse committed Jul 4, 2014
1 parent f4e1239 commit aa37b09
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion gssapi.c
Expand Up @@ -86,7 +86,7 @@ int gssapi_authorization(struct openconnect_info *vpninfo, struct oc_text_buf *h
}

if (vpninfo->auth[AUTH_TYPE_GSSAPI].challenge && *vpninfo->auth[AUTH_TYPE_GSSAPI].challenge) {
int len = openconnect_base64_decode((unsigned char **)&in.value, vpninfo->auth[AUTH_TYPE_GSSAPI].challenge);
int len = openconnect_base64_decode(&in.value, vpninfo->auth[AUTH_TYPE_GSSAPI].challenge);
if (len < 0)
return -EINVAL;
in.length = len;
Expand Down
2 changes: 1 addition & 1 deletion http.c
Expand Up @@ -1662,7 +1662,7 @@ static inline int b64_char(char c)
return -1;
}

int openconnect_base64_decode(unsigned char **out, char *in)
int openconnect_base64_decode(void **out, const char *in)
{
unsigned char *buf;
int b[4];
Expand Down
6 changes: 3 additions & 3 deletions ntlm.c
Expand Up @@ -43,7 +43,7 @@
#define NTLM_MANUAL_REQ 4 /* manual type1 packet sent */

#ifdef _WIN32
static int ntlm_sspi(struct openconnect_info *vpninfo, struct oc_text_buf *buf, char *challenge)
static int ntlm_sspi(struct openconnect_info *vpninfo, struct oc_text_buf *buf, const char *challenge)
{
SECURITY_STATUS status;
SecBufferDesc input_desc, output_desc;
Expand All @@ -58,7 +58,7 @@ static int ntlm_sspi(struct openconnect_info *vpninfo, struct oc_text_buf *buf,
input_desc.ulVersion = SECBUFFER_VERSION;

in_token.BufferType = SECBUFFER_TOKEN;
token_len = openconnect_base64_decode((unsigned char **)&in_token.pvBuffer, challenge);
token_len = openconnect_base64_decode(&in_token.pvBuffer, challenge);
if (token_len < 0)
return token_len;
in_token.cbBuffer = token_len;
Expand Down Expand Up @@ -947,7 +947,7 @@ static int ntlm_manual_challenge(struct openconnect_info *vpninfo, struct oc_tex
if (ntlm_nt_hash (vpninfo->proxy_pass, (char *) hash))
return -EINVAL;

token_len = openconnect_base64_decode(&token,
token_len = openconnect_base64_decode((void **)&token,
vpninfo->auth[AUTH_TYPE_NTLM].challenge);
if (token_len < 0)
return token_len;
Expand Down
2 changes: 1 addition & 1 deletion openconnect-internal.h
Expand Up @@ -606,7 +606,7 @@ void __attribute__ ((format (printf, 2, 3)))
buf_append(struct oc_text_buf *buf, const char *fmt, ...);
void buf_append_bytes(struct oc_text_buf *buf, const void *bytes, int len);
void buf_append_base64(struct oc_text_buf *buf, const void *bytes, int len);
int openconnect_base64_decode(unsigned char **out, char *in);
int openconnect_base64_decode(void **out, const char *in);
int buf_error(struct oc_text_buf *buf);
int buf_free(struct oc_text_buf *buf);
char *openconnect_create_useragent(const char *base);
Expand Down
2 changes: 1 addition & 1 deletion sspi.c
Expand Up @@ -64,7 +64,7 @@ int gssapi_authorization(struct openconnect_info *vpninfo, struct oc_text_buf *h
input_desc.ulVersion = SECBUFFER_VERSION;

in_token.BufferType = SECBUFFER_TOKEN;
token_len = openconnect_base64_decode((unsigned char **)&in_token.pvBuffer,
token_len = openconnect_base64_decode(&in_token.pvBuffer,
vpninfo->auth[AUTH_TYPE_GSSAPI].challenge);
if (token_len < 0)
return token_len;
Expand Down

0 comments on commit aa37b09

Please sign in to comment.