From: Florian Forster Date: Fri, 17 Apr 2009 16:17:54 +0000 (+0200) Subject: network plugin: Compatibility fixes with old versions of libgcrypt. X-Git-Tag: collectd-4.7.0~49 X-Git-Url: https://git.tokkee.org/?a=commitdiff_plain;h=5f2f461a0a08fb6f36762b59423c38b9315755b8;p=collectd.git network plugin: Compatibility fixes with old versions of libgcrypt. --- diff --git a/src/network.c b/src/network.c index d6c5a4bc..7023eaa3 100644 --- a/src/network.c +++ b/src/network.c @@ -2084,7 +2084,7 @@ static void networt_send_buffer_encrypted (sockent_t *se, /* {{{ */ pea.orig_length = htons ((uint16_t) in_buffer_size); /* Chose a random initialization vector. */ - gcry_randomize (&pea.iv, sizeof (pea.iv), GCRY_STRONG_RANDOM); + gcry_randomize ((void *) &pea.iv, sizeof (pea.iv), GCRY_STRONG_RANDOM); /* Create hash of the payload */ gcry_md_hash_buffer (GCRY_MD_SHA1, pea.hash, in_buffer, in_buffer_size); @@ -2092,7 +2092,7 @@ static void networt_send_buffer_encrypted (sockent_t *se, /* {{{ */ /* Fill the extra field with random values. Some entropy in the encrypted * data is usually not a bad thing, I hope. */ if (padding_size > 0) - gcry_randomize (&pea.padding, padding_size, GCRY_STRONG_RANDOM); + gcry_randomize ((void *) &pea.padding, padding_size, GCRY_STRONG_RANDOM); /* Initialize the buffer */ buffer_offset = 0;