aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorStephen Fisher <stephenfisher-wireshark@outlook.com>2013-06-21 22:01:37 +0000
committerStephen Fisher <stephenfisher-wireshark@outlook.com>2013-06-21 22:01:37 +0000
commit0b56dc6a7ba1ec16102c33a3667eef4035959928 (patch)
tree85e2440c774cedc722134b85dbf6c1a7604ee92f
parenteb0d10c9d251a8c061782450103ced5135ee9c1e (diff)
Cast away some errors of these types:
request for implicit conversion from 'gpointer' to 'char *' not permitted in C++ [-Werror=c++-compat] and enum conversion when passing argument 3 of 'krb5_crypto_init' is invalid in C++ [-Werror=c++-compat] svn path=/trunk/; revision=50108
-rw-r--r--epan/dissectors/packet-kerberos.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/epan/dissectors/packet-kerberos.c b/epan/dissectors/packet-kerberos.c
index e99687e885..dd159a402a 100644
--- a/epan/dissectors/packet-kerberos.c
+++ b/epan/dissectors/packet-kerberos.c
@@ -638,7 +638,7 @@ read_keytab_file(const char *filename)
}
do{
- new_key=g_malloc(sizeof(enc_key_t));
+ new_key=(enc_key_t*)g_malloc(sizeof(enc_key_t));
new_key->next=enc_key_list;
ret = krb5_kt_next_entry(krb5_ctx, keytab, &key, &cursor);
if(ret==0){
@@ -658,7 +658,7 @@ read_keytab_file(const char *filename)
*pos=0;
new_key->keytype=key.keyblock.keytype;
new_key->keylength=key.keyblock.keyvalue.length;
- new_key->keyvalue=g_memdup(key.keyblock.keyvalue.data, key.keyblock.keyvalue.length);
+ new_key->keyvalue=(char*)g_memdup(key.keyblock.keyvalue.data, key.keyblock.keyvalue.length);
enc_key_list=new_key;
}
}while(ret==0);
@@ -709,7 +709,7 @@ decrypt_krb5_data(proto_tree *tree, packet_info *pinfo,
key.keyblock.keytype=ek->keytype;
key.keyblock.keyvalue.length=ek->keylength;
key.keyblock.keyvalue.data=ek->keyvalue;
- ret = krb5_crypto_init(krb5_ctx, &(key.keyblock), 0, &crypto);
+ ret = krb5_crypto_init(krb5_ctx, &(key.keyblock), (krb5_enctype)0, &crypto);
if(ret){
return NULL;
}
@@ -720,7 +720,7 @@ decrypt_krb5_data(proto_tree *tree, packet_info *pinfo,
keys. So just give it a copy of the crypto data instead.
This has been seen for RC4-HMAC blobs.
*/
- cryptocopy=g_memdup(cryptotext, length);
+ cryptocopy=(guint8*)g_memdup(cryptotext, length);
ret = krb5_decrypt_ivec(krb5_ctx, crypto, usage,
cryptocopy, length,
&data,
@@ -733,7 +733,7 @@ printf("woohoo decrypted keytype:%d in frame:%u\n", ek->keytype, pinfo->fd->num)
proto_tree_add_text(tree, NULL, 0, 0, "[Decrypted using: %s]", ek->key_origin);
krb5_crypto_destroy(krb5_ctx, crypto);
/* return a private g_malloced blob to the caller */
- user_data=g_memdup(data.data, data.length);
+ user_data=(char*)g_memdup(data.data, data.length);
if (datalen) {
*datalen = data.length;
}