summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5/wrap_size_limit.c
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2004-03-15 17:45:01 +0000
committerKen Raeburn <raeburn@mit.edu>2004-03-15 17:45:01 +0000
commit730ebd39f1e4cdc77c7f9719274e7e1a4346c9f8 (patch)
treec4efc953c40618a56d75e1a258bea4865bcdcbbe /src/lib/gssapi/krb5/wrap_size_limit.c
parent85fa9e1e2073d2c0ec2a82205bcfd13080e854f0 (diff)
downloadkrb5-730ebd39f1e4cdc77c7f9719274e7e1a4346c9f8.tar.gz
krb5-730ebd39f1e4cdc77c7f9719274e7e1a4346c9f8.tar.xz
krb5-730ebd39f1e4cdc77c7f9719274e7e1a4346c9f8.zip
* k5seal.c (kg_seal): Extract the krb5 context from the security context
instead of requiring it be passed in as an argument. * k5unseal.c (kg_unseal): Likewise. * gssapiP_krb5.h (kg_seal, kg_unseal): Declarations updated. * delete_sec_context.c, process_context_token.c, seal.c, sign.c, unseal.c, verify.c: Callers changed. * inq_context.c (krb5_gss_inquire_context): Use krb5 context contained in security context instead of calling kg_get_context. * wrap_size_limit.c (krb5_gss_wrap_size_limit): Likewise. * import_sec_context.c (krb5_gss_ser_init): New function. (krb5_gss_import_sec_context): Create a krb5 context locally to use for the import. * export_sec_context.c (krb5_gss_export_sec_context): Use the krb5 context in the security context. * gssapiP_krb5.h (krb5_gss_ser_init): Declare. * gssapi_krb5.c (kg_get_context): Don't call krb5 serialization initialization code here. * accept_sec_context.c (krb5_gss_accept_sec_context): Free the new krb5 context in an error case not caught before. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@16171 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/wrap_size_limit.c')
-rw-r--r--src/lib/gssapi/krb5/wrap_size_limit.c6
1 files changed, 1 insertions, 5 deletions
diff --git a/src/lib/gssapi/krb5/wrap_size_limit.c b/src/lib/gssapi/krb5/wrap_size_limit.c
index b91c7f7593..4600706377 100644
--- a/src/lib/gssapi/krb5/wrap_size_limit.c
+++ b/src/lib/gssapi/krb5/wrap_size_limit.c
@@ -83,15 +83,11 @@ krb5_gss_wrap_size_limit(minor_status, context_handle, conf_req_flag,
OM_uint32 req_output_size;
OM_uint32 *max_input_size;
{
- krb5_context context;
krb5_gss_ctx_id_rec *ctx;
OM_uint32 data_size, conflen;
OM_uint32 ohlen;
int overhead;
- if (GSS_ERROR(kg_get_context(minor_status, &context)))
- return(GSS_S_FAILURE);
-
/* only default qop is allowed */
if (qop_req != GSS_C_QOP_DEFAULT) {
*minor_status = (OM_uint32) G_UNKNOWN_QOP;
@@ -147,7 +143,7 @@ krb5_gss_wrap_size_limit(minor_status, context_handle, conf_req_flag,
/* Calculate the token size and subtract that from the output size */
overhead = 7 + ctx->mech_used->length;
data_size = req_output_size;
- conflen = kg_confounder_size(context, ctx->enc);
+ conflen = kg_confounder_size(ctx->k5_context, ctx->enc);
data_size = (conflen + data_size + 8) & (~(OM_uint32)7);
ohlen = g_token_size((gss_OID) ctx->mech_used,
(unsigned int) (data_size + ctx->cksum_size + 14))