diff options
author | Jelmer Vernooij <jelmer@samba.org> | 2007-12-19 23:27:42 +0100 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2007-12-21 05:52:05 +0100 |
commit | 3e75f222bcdf114238cc4f2bcc61332dc059135f (patch) | |
tree | 9b1d7c25483c2819eb34e185459537b6a065e772 /source4/auth/gensec | |
parent | c2fffa8335ac68ff70de52f9fc80fb49e5d6d686 (diff) | |
download | samba-3e75f222bcdf114238cc4f2bcc61332dc059135f.tar.gz samba-3e75f222bcdf114238cc4f2bcc61332dc059135f.tar.bz2 samba-3e75f222bcdf114238cc4f2bcc61332dc059135f.zip |
r26539: Remove unnecessary statics.
(This used to be commit e53e79eebef3ece6978f0a2b4a1ee0a0814bb5d2)
Diffstat (limited to 'source4/auth/gensec')
-rw-r--r-- | source4/auth/gensec/cyrus_sasl.c | 2 | ||||
-rw-r--r-- | source4/auth/gensec/schannel_sign.c | 8 |
2 files changed, 5 insertions, 5 deletions
diff --git a/source4/auth/gensec/cyrus_sasl.c b/source4/auth/gensec/cyrus_sasl.c index 64a0b2f0c7..331499a466 100644 --- a/source4/auth/gensec/cyrus_sasl.c +++ b/source4/auth/gensec/cyrus_sasl.c @@ -365,7 +365,7 @@ NTSTATUS gensec_sasl_init(void) int sasl_ret, i; const char **sasl_mechs; - static const sasl_callback_t callbacks[] = { + const sasl_callback_t callbacks[] = { { .id = SASL_CB_LOG, .proc = gensec_sasl_log, diff --git a/source4/auth/gensec/schannel_sign.c b/source4/auth/gensec/schannel_sign.c index 1e57beba08..71ac0cc933 100644 --- a/source4/auth/gensec/schannel_sign.c +++ b/source4/auth/gensec/schannel_sign.c @@ -113,7 +113,7 @@ NTSTATUS schannel_unseal_packet(struct gensec_security *gensec_security, uint8_t confounder[8]; uint8_t seq_num[8]; uint8_t sealing_key[16]; - static const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE; + const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE; if (sig->length != 32) { return NT_STATUS_ACCESS_DENIED; @@ -162,7 +162,7 @@ NTSTATUS schannel_check_packet(struct gensec_security *gensec_security, uint8_t digest_final[16]; uint8_t seq_num[8]; - static const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE; + const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE; /* w2k sends just 24 bytes and skip the confounder */ if (sig->length != 32 && sig->length != 24) { @@ -212,7 +212,7 @@ NTSTATUS schannel_seal_packet(struct gensec_security *gensec_security, uint8_t confounder[8]; uint8_t seq_num[8]; uint8_t sealing_key[16]; - static const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE; + const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE; generate_random_buffer(confounder, 8); @@ -258,7 +258,7 @@ NTSTATUS schannel_sign_packet(struct gensec_security *gensec_security, uint8_t digest_final[16]; uint8_t seq_num[8]; - static const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE; + const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE; RSIVAL(seq_num, 0, state->seq_num); SIVAL(seq_num, 4, state->initiator?0x80:0); |