diff options
author | John Kohl <jtkohl@mit.edu> | 1991-05-01 11:19:56 +0000 |
---|---|---|
committer | John Kohl <jtkohl@mit.edu> | 1991-05-01 11:19:56 +0000 |
commit | e251d0eba87ea9cad5ec8b86866d29bf18c65d4f (patch) | |
tree | e786ee81274ecfc6148647cd5e66719ba2f3bb50 | |
parent | 52591460eacdd8a11d7a57ef3009f9de583aae86 (diff) | |
download | krb5-e251d0eba87ea9cad5ec8b86866d29bf18c65d4f.tar.gz krb5-e251d0eba87ea9cad5ec8b86866d29bf18c65d4f.tar.xz krb5-e251d0eba87ea9cad5ec8b86866d29bf18c65d4f.zip |
use checksum & encryption macrtos
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@2079 dc483132-0cff-0310-8789-dd5450dbe970
-rw-r--r-- | src/lib/krb5/krb/encode_kdc.c | 2 | ||||
-rw-r--r-- | src/lib/krb5/krb/send_tgs.c | 14 |
2 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/krb5/krb/encode_kdc.c b/src/lib/krb5/krb/encode_kdc.c index 9e2f7b27e..fa51fef40 100644 --- a/src/lib/krb5/krb/encode_kdc.c +++ b/src/lib/krb5/krb/encode_kdc.c @@ -71,7 +71,7 @@ krb5_free_data(scratch); } /* put together an eblock for this encryption */ - eblock.crypto_entry = krb5_csarray[dec_rep->enc_part.etype]->system; + krb5_use_cstype(&eblock, dec_rep->enc_part.etype); dec_rep->enc_part.ciphertext.length = krb5_encrypt_size(scratch->length, eblock.crypto_entry); /* add padding area, and zero it */ diff --git a/src/lib/krb5/krb/send_tgs.c b/src/lib/krb5/krb/send_tgs.c index 224e99c30..c78e11ab7 100644 --- a/src/lib/krb5/krb/send_tgs.c +++ b/src/lib/krb5/krb/send_tgs.c @@ -170,7 +170,7 @@ OLDDECLARG(krb5_response *,rep) } if (!(ap_checksum.contents = (krb5_octet *) - malloc(krb5_cksumarray[sumtype]->checksum_length))) { + malloc(krb5_checsum_size(sumtype)))) { if (sec_ticket) krb5_free_ticket(sec_ticket); krb5_free_data(scratch); @@ -178,12 +178,12 @@ OLDDECLARG(krb5_response *,rep) return ENOMEM; } - if (retval = (*(krb5_cksumarray[sumtype]-> - sum_func))(scratch->data, - scratch->length, - (krb5_pointer) usecred->keyblock.contents, - usecred->keyblock.length, - &ap_checksum)) { + if (retval = krb5_calculate_checksum(sumtype, + scratch->data, + scratch->length, + (krb5_pointer) usecred->keyblock.contents, + usecred->keyblock.length, + &ap_checksum)) { if (sec_ticket) krb5_free_ticket(sec_ticket); xfree(ap_checksum.contents); |