diff options
| author | Greg Hudson <ghudson@mit.edu> | 2010-07-02 17:33:44 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2010-07-02 17:33:44 +0000 |
| commit | 6dc8b18192b302b3208d13d8bda9cc3380d5fbec (patch) | |
| tree | 6616cfaad37f22cab4baebb82904fe234cc11ec9 /src/kadmin | |
| parent | beeab09509ed1e46e1fbe4358c6388caf0dcdc61 (diff) | |
| download | krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.tar.gz krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.tar.xz krb5-6dc8b18192b302b3208d13d8bda9cc3380d5fbec.zip | |
Rename krb5_dbekd_encrypt_key_data and krb5_dbekd_decrypt_key_data to
just use the krb5_dbe prefix.
ticket: 6749
status: open
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24164 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kadmin')
| -rw-r--r-- | src/kadmin/dbutil/dump.c | 12 | ||||
| -rw-r--r-- | src/kadmin/dbutil/kdb5_create.c | 15 | ||||
| -rw-r--r-- | src/kadmin/dbutil/kdb5_mkey.c | 26 |
3 files changed, 22 insertions, 31 deletions
diff --git a/src/kadmin/dbutil/dump.c b/src/kadmin/dbutil/dump.c index d0495e4cf..64c63afb1 100644 --- a/src/kadmin/dbutil/dump.c +++ b/src/kadmin/dbutil/dump.c @@ -302,9 +302,8 @@ krb5_error_code master_key_convert(context, db_entry) retval = krb5_dbe_find_mkey(context, master_keylist, db_entry, &tmp_mkey); if (retval) return retval; - retval = krb5_dbekd_decrypt_key_data(context, tmp_mkey, - key_data, &v5plainkey, - &keysalt); + retval = krb5_dbe_decrypt_key_data(context, tmp_mkey, key_data, + &v5plainkey, &keysalt); if (retval) return retval; @@ -313,10 +312,9 @@ krb5_error_code master_key_convert(context, db_entry) key_ptr = &v5plainkey; kvno = (krb5_kvno) key_data->key_data_kvno; - retval = krb5_dbekd_encrypt_key_data(context, &new_master_keyblock, - key_ptr, &keysalt, - (int) kvno, - &new_key_data); + retval = krb5_dbe_encrypt_key_data(context, &new_master_keyblock, + key_ptr, &keysalt, (int) kvno, + &new_key_data); if (retval) return retval; krb5_free_keyblock_contents(context, &v5plainkey); diff --git a/src/kadmin/dbutil/kdb5_create.c b/src/kadmin/dbutil/kdb5_create.c index ba1653587..cf2f2a7f2 100644 --- a/src/kadmin/dbutil/kdb5_create.c +++ b/src/kadmin/dbutil/kdb5_create.c @@ -403,12 +403,9 @@ tgt_keysalt_iterate(ksent, ptr) ind = iargs->dbentp->n_key_data-1; if (!(kret = krb5_c_make_random_key(context, ksent->ks_enctype, &key))) { - kret = krb5_dbekd_encrypt_key_data(context, - iargs->rblock->key, - &key, - NULL, - 1, - &iargs->dbentp->key_data[ind]); + kret = krb5_dbe_encrypt_key_data(context, iargs->rblock->key, + &key, NULL, 1, + &iargs->dbentp->key_data[ind]); krb5_free_keyblock_contents(context, &key); } } @@ -462,9 +459,9 @@ add_principal(context, princ, op, pblock) else mkey_kvno = 1; /* Default */ entry.attributes |= KRB5_KDB_DISALLOW_ALL_TIX; - if ((retval = krb5_dbekd_encrypt_key_data(context, pblock->key, - &master_keyblock, NULL, - mkey_kvno, entry.key_data))) + if ((retval = krb5_dbe_encrypt_key_data(context, pblock->key, + &master_keyblock, NULL, + mkey_kvno, entry.key_data))) return retval; /* * There should always be at least one "active" mkey so creating the diff --git a/src/kadmin/dbutil/kdb5_mkey.c b/src/kadmin/dbutil/kdb5_mkey.c index 6abd796d9..9c397b6ab 100644 --- a/src/kadmin/dbutil/kdb5_mkey.c +++ b/src/kadmin/dbutil/kdb5_mkey.c @@ -90,7 +90,7 @@ add_new_mkey(krb5_context context, krb5_db_entry *master_entry, /* alloc enough space to hold new and existing key_data */ /* - * The encrypted key is malloc'ed by krb5_dbekd_encrypt_key_data and + * The encrypted key is malloc'ed by krb5_dbe_encrypt_key_data and * krb5_key_data key_data_contents is a pointer to this key. Using some * logic from master_key_convert(). */ @@ -105,10 +105,9 @@ add_new_mkey(krb5_context context, krb5_db_entry *master_entry, /* Note, mkey does not have salt */ /* add new mkey encrypted with itself to mkey princ entry */ - if ((retval = krb5_dbekd_encrypt_key_data(context, new_mkey, - new_mkey, NULL, - (int) new_mkey_kvno, - &master_entry->key_data[0]))) { + if ((retval = krb5_dbe_encrypt_key_data(context, new_mkey, new_mkey, NULL, + (int) new_mkey_kvno, + &master_entry->key_data[0]))) { return (retval); } /* the mvkno should be that of the newest mkey */ @@ -156,11 +155,9 @@ add_new_mkey(krb5_context context, krb5_db_entry *master_entry, memset(&tmp_key_data, 0, sizeof(tmp_key_data)); /* encrypt the new mkey with the older mkey */ - retval = krb5_dbekd_encrypt_key_data(context, &keylist_node->keyblock, - new_mkey, - NULL, /* no keysalt */ - (int) new_mkey_kvno, - &tmp_key_data); + retval = krb5_dbe_encrypt_key_data(context, &keylist_node->keyblock, + new_mkey, NULL, (int) new_mkey_kvno, + &tmp_key_data); if (retval) goto clean_n_exit; @@ -171,11 +168,10 @@ add_new_mkey(krb5_context context, krb5_db_entry *master_entry, /* * Store old key in master_entry keydata past the new mkey */ - retval = krb5_dbekd_encrypt_key_data(context, new_mkey, - &keylist_node->keyblock, - NULL, /* no keysalt */ - (int) keylist_node->kvno, - &master_entry->key_data[i]); + retval = krb5_dbe_encrypt_key_data(context, new_mkey, + &keylist_node->keyblock, + NULL, (int) keylist_node->kvno, + &master_entry->key_data[i]); if (retval) goto clean_n_exit; } |
