summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5/util_crypt.c
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2011-05-09 18:06:15 +0000
committerGreg Hudson <ghudson@mit.edu>2011-05-09 18:06:15 +0000
commiteffe258978203fb880a83ca3ae3f7386b2d87b5d (patch)
tree432e621d846c4130c65ef5ccacd038d419fff1ea /src/lib/gssapi/krb5/util_crypt.c
parent779a79f566abdb82a989ef2dfcba43ac656c2da7 (diff)
downloadkrb5-effe258978203fb880a83ca3ae3f7386b2d87b5d.tar.gz
krb5-effe258978203fb880a83ca3ae3f7386b2d87b5d.tar.xz
krb5-effe258978203fb880a83ca3ae3f7386b2d87b5d.zip
Use internal crypto functions directly from util_crypt.c, avoiding a
dependency on the accessor. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24918 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/util_crypt.c')
-rw-r--r--src/lib/gssapi/krb5/util_crypt.c21
1 files changed, 4 insertions, 17 deletions
diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c
index d1b83763a6..2db6ecb196 100644
--- a/src/lib/gssapi/krb5/util_crypt.c
+++ b/src/lib/gssapi/krb5/util_crypt.c
@@ -102,7 +102,6 @@ kg_setup_keys(krb5_context context, krb5_gss_ctx_id_rec *ctx, krb5_key subkey,
krb5_cksumtype *cksumtype)
{
krb5_error_code code;
- krb5int_access kaccess;
assert(ctx != NULL);
assert(subkey != NULL);
@@ -115,12 +114,8 @@ kg_setup_keys(krb5_context context, krb5_gss_ctx_id_rec *ctx, krb5_key subkey,
ctx->sealalg = -1;
}
- code = krb5int_accessor(&kaccess, KRB5INT_ACCESS_VERSION);
- if (code != 0)
- return code;
-
- code = (*kaccess.mandatory_cksumtype)(context, subkey->keyblock.enctype,
- cksumtype);
+ code = krb5int_c_mandatory_cksumtype(context, subkey->keyblock.enctype,
+ cksumtype);
if (code != 0)
return code;
@@ -316,15 +311,11 @@ kg_arcfour_docrypt(const krb5_keyblock *keyblock, int usage,
krb5_error_code code;
krb5_data kd = make_data((char *) kd_data, kd_data_len);
krb5_crypto_iov kiov;
- krb5int_access kaccess;
- code = krb5int_accessor(&kaccess, KRB5INT_ACCESS_VERSION);
- if (code)
- return code;
memcpy(output_buf, input_buf, input_len);
kiov.flags = KRB5_CRYPTO_TYPE_DATA;
kiov.data = make_data(output_buf, input_len);
- return (*kaccess.arcfour_gsscrypt)(keyblock, usage, &kd, &kiov, 1);
+ return krb5int_arcfour_gsscrypt(keyblock, usage, &kd, &kiov, 1);
}
/* AEAD */
@@ -581,19 +572,15 @@ kg_arcfour_docrypt_iov(krb5_context context, const krb5_keyblock *keyblock,
{
krb5_error_code code;
krb5_data kd = make_data((char *) kd_data, kd_data_len);
- krb5int_access kaccess;
krb5_crypto_iov *kiov = NULL;
size_t kiov_len = 0;
- code = krb5int_accessor (&kaccess, KRB5INT_ACCESS_VERSION);
- if (code)
- return code;
code = kg_translate_iov(context, 0 /* proto */, 0 /* dce_style */,
0 /* ec */, 0 /* rrc */, keyblock->enctype,
iov, iov_count, &kiov, &kiov_len);
if (code)
return code;
- code = (*kaccess.arcfour_gsscrypt)(keyblock, usage, &kd, kiov, kiov_len);
+ code = krb5int_arcfour_gsscrypt(keyblock, usage, &kd, kiov, kiov_len);
free(kiov);
return code;
}