summaryrefslogtreecommitdiffstats
path: root/compat/zlib/contrib/minizip/crypt.h
diff options
context:
space:
mode:
authorjan.nijtmans <nijtmans@users.sourceforge.net>2013-05-13 14:07:56 (GMT)
committerjan.nijtmans <nijtmans@users.sourceforge.net>2013-05-13 14:07:56 (GMT)
commit9116440cfe8bf52e4ef8174ab27f688247156c00 (patch)
tree3049d1611ed52b83d19fcb4a6a67338bd98ce56e /compat/zlib/contrib/minizip/crypt.h
parent1ca1aefb24495d43ae986af6c1a2ad1fa5bf22ce (diff)
downloadtcl-9116440cfe8bf52e4ef8174ab27f688247156c00.zip
tcl-9116440cfe8bf52e4ef8174ab27f688247156c00.tar.gz
tcl-9116440cfe8bf52e4ef8174ab27f688247156c00.tar.bz2
Upgrade to zlib 1.2.8
Diffstat (limited to 'compat/zlib/contrib/minizip/crypt.h')
-rw-r--r--compat/zlib/contrib/minizip/crypt.h8
1 files changed, 4 insertions, 4 deletions
diff --git a/compat/zlib/contrib/minizip/crypt.h b/compat/zlib/contrib/minizip/crypt.h
index a01d08d..1e9e820 100644
--- a/compat/zlib/contrib/minizip/crypt.h
+++ b/compat/zlib/contrib/minizip/crypt.h
@@ -32,7 +32,7 @@
/***********************************************************************
* Return the next byte in the pseudo-random sequence
*/
-static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab)
+static int decrypt_byte(unsigned long* pkeys, const z_crc_t* pcrc_32_tab)
{
unsigned temp; /* POTENTIAL BUG: temp*(temp^1) may overflow in an
* unpredictable manner on 16-bit systems; not a problem
@@ -45,7 +45,7 @@ static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab)
/***********************************************************************
* Update the encryption keys with the next byte of plain text
*/
-static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int c)
+static int update_keys(unsigned long* pkeys,const z_crc_t* pcrc_32_tab,int c)
{
(*(pkeys+0)) = CRC32((*(pkeys+0)), c);
(*(pkeys+1)) += (*(pkeys+0)) & 0xff;
@@ -62,7 +62,7 @@ static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int
* Initialize the encryption keys and the random header according to
* the given password.
*/
-static void init_keys(const char* passwd,unsigned long* pkeys,const unsigned long* pcrc_32_tab)
+static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab)
{
*(pkeys+0) = 305419896L;
*(pkeys+1) = 591751049L;
@@ -91,7 +91,7 @@ static int crypthead(const char* passwd, /* password string */
unsigned char* buf, /* where to write header */
int bufSize,
unsigned long* pkeys,
- const unsigned long* pcrc_32_tab,
+ const z_crc_t* pcrc_32_tab,
unsigned long crcForCrypting)
{
int n; /* index in random header */