summaryrefslogtreecommitdiff
path: root/source4/auth
diff options
context:
space:
mode:
authorJelmer Vernooij <jelmer@samba.org>2007-12-19 23:27:42 +0100
committerStefan Metzmacher <metze@samba.org>2007-12-21 05:52:05 +0100
commit3e75f222bcdf114238cc4f2bcc61332dc059135f (patch)
tree9b1d7c25483c2819eb34e185459537b6a065e772 /source4/auth
parentc2fffa8335ac68ff70de52f9fc80fb49e5d6d686 (diff)
downloadsamba-3e75f222bcdf114238cc4f2bcc61332dc059135f.tar.gz
samba-3e75f222bcdf114238cc4f2bcc61332dc059135f.tar.bz2
samba-3e75f222bcdf114238cc4f2bcc61332dc059135f.zip
r26539: Remove unnecessary statics.
(This used to be commit e53e79eebef3ece6978f0a2b4a1ee0a0814bb5d2)
Diffstat (limited to 'source4/auth')
-rw-r--r--source4/auth/auth.c2
-rw-r--r--source4/auth/gensec/cyrus_sasl.c2
-rw-r--r--source4/auth/gensec/schannel_sign.c8
3 files changed, 6 insertions, 6 deletions
diff --git a/source4/auth/auth.c b/source4/auth/auth.c
index 918890b3f6..708e2f8d73 100644
--- a/source4/auth/auth.c
+++ b/source4/auth/auth.c
@@ -500,7 +500,7 @@ const struct auth_operations *auth_backend_byname(const char *name)
*/
const struct auth_critical_sizes *auth_interface_version(void)
{
- static const struct auth_critical_sizes critical_sizes = {
+ const static struct auth_critical_sizes critical_sizes = {
AUTH_INTERFACE_VERSION,
sizeof(struct auth_operations),
sizeof(struct auth_method_context),
diff --git a/source4/auth/gensec/cyrus_sasl.c b/source4/auth/gensec/cyrus_sasl.c
index 64a0b2f0c7..331499a466 100644
--- a/source4/auth/gensec/cyrus_sasl.c
+++ b/source4/auth/gensec/cyrus_sasl.c
@@ -365,7 +365,7 @@ NTSTATUS gensec_sasl_init(void)
int sasl_ret, i;
const char **sasl_mechs;
- static const sasl_callback_t callbacks[] = {
+ const sasl_callback_t callbacks[] = {
{
.id = SASL_CB_LOG,
.proc = gensec_sasl_log,
diff --git a/source4/auth/gensec/schannel_sign.c b/source4/auth/gensec/schannel_sign.c
index 1e57beba08..71ac0cc933 100644
--- a/source4/auth/gensec/schannel_sign.c
+++ b/source4/auth/gensec/schannel_sign.c
@@ -113,7 +113,7 @@ NTSTATUS schannel_unseal_packet(struct gensec_security *gensec_security,
uint8_t confounder[8];
uint8_t seq_num[8];
uint8_t sealing_key[16];
- static const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE;
+ const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE;
if (sig->length != 32) {
return NT_STATUS_ACCESS_DENIED;
@@ -162,7 +162,7 @@ NTSTATUS schannel_check_packet(struct gensec_security *gensec_security,
uint8_t digest_final[16];
uint8_t seq_num[8];
- static const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE;
+ const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE;
/* w2k sends just 24 bytes and skip the confounder */
if (sig->length != 32 && sig->length != 24) {
@@ -212,7 +212,7 @@ NTSTATUS schannel_seal_packet(struct gensec_security *gensec_security,
uint8_t confounder[8];
uint8_t seq_num[8];
uint8_t sealing_key[16];
- static const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE;
+ const uint8_t netsec_sig[8] = NETSEC_SEAL_SIGNATURE;
generate_random_buffer(confounder, 8);
@@ -258,7 +258,7 @@ NTSTATUS schannel_sign_packet(struct gensec_security *gensec_security,
uint8_t digest_final[16];
uint8_t seq_num[8];
- static const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE;
+ const uint8_t netsec_sig[8] = NETSEC_SIGN_SIGNATURE;
RSIVAL(seq_num, 0, state->seq_num);
SIVAL(seq_num, 4, state->initiator?0x80:0);