aboutsummaryrefslogtreecommitdiffstats
path: root/epan/crypt
diff options
context:
space:
mode:
authorGuy Harris <guy@alum.mit.edu>2010-02-23 20:30:27 +0000
committerGuy Harris <guy@alum.mit.edu>2010-02-23 20:30:27 +0000
commite646e71d0f213f3667c6c7a05cbf75565e5388e0 (patch)
tree544617df373ff031eb542bdcc17ff10330467226 /epan/crypt
parent761414b98ed60e6ba4662cfc3db1125309f7835f (diff)
Fix some compiler warnings.
svn path=/trunk/; revision=31969
Diffstat (limited to 'epan/crypt')
-rw-r--r--epan/crypt/airpdcap.c4
-rw-r--r--epan/crypt/crypt-aes.c8
2 files changed, 6 insertions, 6 deletions
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c
index ed0934ddd9..35c3c1eff5 100644
--- a/epan/crypt/airpdcap.c
+++ b/epan/crypt/airpdcap.c
@@ -520,7 +520,7 @@ static INT AirPDcapScanForGroupKey(
/* skip EAPOL MPDU and go to the first byte of the body */
offset+=4;
- pEAPKey = (P_EAPOL_RSN_KEY) (data+offset);
+ pEAPKey = (const EAPOL_RSN_KEY *) (data+offset);
/* check if the key descriptor type is valid (IEEE 802.1X-2004, pg. 27) */
if (/*pEAPKey->type!=0x1 &&*/ /* RC4 Key Descriptor Type (deprecated) */
@@ -1406,7 +1406,7 @@ AirPDcapRsna4WHandshake(
/* If using WPA2 PSK, message 3 will contain an RSN for the group key (GTK KDE).
In order to properly support decrypting WPA2-PSK packets, we need to parse this to get the group key. */
- pEAPKey = (P_EAPOL_RSN_KEY)(&(data[offset-1]));
+ pEAPKey = (const EAPOL_RSN_KEY *)(&(data[offset-1]));
if (pEAPKey->type == AIRPDCAP_RSN_WPA2_KEY_DESCRIPTOR){
PAIRPDCAP_SEC_ASSOCIATION broadcast_sa;
AIRPDCAP_SEC_ASSOCIATION_ID id;
diff --git a/epan/crypt/crypt-aes.c b/epan/crypt/crypt-aes.c
index 71088088dd..a94cc7c7e4 100644
--- a/epan/crypt/crypt-aes.c
+++ b/epan/crypt/crypt-aes.c
@@ -723,7 +723,7 @@ static const guint32 rcon[] = {
0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
};
-gint rijndaelKeySetupEnc(
+static gint rijndaelKeySetupEnc(
guint32 rk[/*4*(Nr + 1)*/],
const guint8 cipherKey[],
gint keyBits)
@@ -811,7 +811,7 @@ gint rijndaelKeySetupEnc(
return 0;
}
-gint rijndaelKeySetupDec(
+static gint rijndaelKeySetupDec(
guint32 rk[/*4*(Nr + 1)*/],
const guint8 cipherKey[],
gint keyBits)
@@ -867,7 +867,7 @@ void rijndael_set_key(
rijndaelKeySetupDec(ctx->dk, key, bits);
}
-void rijndaelEncrypt(
+static void rijndaelEncrypt(
const guint32 rk[/*4*(Nr + 1)*/],
gint Nr,
const guint8 pt[16],
@@ -1063,7 +1063,7 @@ void rijndael_encrypt(
}
-void rijndaelDecrypt(const guint32 rk[/*4*(Nr + 1)*/], gint Nr, const guint8 ct[16], guint8 pt[16]) {
+static void rijndaelDecrypt(const guint32 rk[/*4*(Nr + 1)*/], gint Nr, const guint8 ct[16], guint8 pt[16]) {
guint32 s0, s1, s2, s3, t0, t1, t2, t3;
#ifndef FULL_UNROLL
gint r;