diff options
author | Greg Hudson <ghudson@mit.edu> | 2010-07-02 17:33:44 +0000 |
---|---|---|
committer | Greg Hudson <ghudson@mit.edu> | 2010-07-02 17:33:44 +0000 |
commit | 6dc8b18192b302b3208d13d8bda9cc3380d5fbec (patch) | |
tree | 6616cfaad37f22cab4baebb82904fe234cc11ec9 /src/lib/kdb/kdb_cpw.c | |
parent | beeab09509ed1e46e1fbe4358c6388caf0dcdc61 (diff) | |
download | krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.tar.gz krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.tar.xz krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.zip |
Rename krb5_dbekd_encrypt_key_data and krb5_dbekd_decrypt_key_data to
just use the krb5_dbe prefix.
ticket: 6749
status: open
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24164 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/kdb/kdb_cpw.c')
-rw-r--r-- | src/lib/kdb/kdb_cpw.c | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/src/lib/kdb/kdb_cpw.c b/src/lib/kdb/kdb_cpw.c index 723d98eaf6..dcf00ab05a 100644 --- a/src/lib/kdb/kdb_cpw.c +++ b/src/lib/kdb/kdb_cpw.c @@ -186,9 +186,8 @@ add_key_rnd(context, master_key, ks_tuple, ks_tuple_count, db_entry, kvno) /* db library will free this. Since, its a so, it could actually be using different memory management function. So, its better if the memory is allocated by the db's malloc. So, a temporary memory is used here which will later be copied to the db_entry */ - retval = krb5_dbekd_encrypt_key_data(context, master_key, - &key, NULL, kvno, - &tmp_key_data); + retval = krb5_dbe_encrypt_key_data(context, master_key, &key, NULL, + kvno, &tmp_key_data); krb5_free_keyblock_contents(context, &key); if( retval ) @@ -464,9 +463,9 @@ add_key_pwd(context, master_key, ks_tuple, ks_tuple_count, passwd, /* memory allocation to be done by db. So, use temporary block and later copy it to the memory allocated by db */ - retval = krb5_dbekd_encrypt_key_data(context, master_key, &key, - (const krb5_keysalt *)&key_salt, - kvno, &tmp_key_data); + retval = krb5_dbe_encrypt_key_data(context, master_key, &key, + (const krb5_keysalt *)&key_salt, + kvno, &tmp_key_data); if (key_salt.data.data) free(key_salt.data.data); free(key.contents); |