summaryrefslogtreecommitdiffstats
path: root/src/lib/crypto
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2011-07-22 16:58:35 +0000
committerGreg Hudson <ghudson@mit.edu>2011-07-22 16:58:35 +0000
commit0e721ac570d8841fd6323179c0775cef777ede09 (patch)
treefcecfd59ea7763f1a0f73e019fcb5f64a3103b40 /src/lib/crypto
parentbd18687a705a8a6cdcb7c140764d1a7c6a3381b5 (diff)
downloadkrb5-0e721ac570d8841fd6323179c0775cef777ede09.tar.gz
krb5-0e721ac570d8841fd6323179c0775cef777ede09.tar.xz
krb5-0e721ac570d8841fd6323179c0775cef777ede09.zip
Rename "ivec" to "cipher_state" in encrypt/decrypt
This makes the implementations match up with the prototypes, and is more correct for enctypes like RC4 where the cipher state is not an ivec. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25038 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto')
-rw-r--r--src/lib/crypto/krb/decrypt.c8
-rw-r--r--src/lib/crypto/krb/encrypt.c8
2 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/crypto/krb/decrypt.c b/src/lib/crypto/krb/decrypt.c
index 775e10a9b..496d262e9 100644
--- a/src/lib/crypto/krb/decrypt.c
+++ b/src/lib/crypto/krb/decrypt.c
@@ -29,7 +29,7 @@
krb5_error_code KRB5_CALLCONV
krb5_k_decrypt(krb5_context context, krb5_key key,
- krb5_keyusage usage, const krb5_data *ivec,
+ krb5_keyusage usage, const krb5_data *cipher_state,
const krb5_enc_data *input, krb5_data *output)
{
const struct krb5_keytypes *ktp;
@@ -75,7 +75,7 @@ krb5_k_decrypt(krb5_context context, krb5_key key,
memcpy(iov[3].data.data, input->ciphertext.data + header_len + plain_len,
trailer_len);
- ret = ktp->decrypt(ktp, key, usage, ivec, iov, 4);
+ ret = ktp->decrypt(ktp, key, usage, cipher_state, iov, 4);
if (ret != 0)
zap(output->data, plain_len);
else
@@ -86,7 +86,7 @@ krb5_k_decrypt(krb5_context context, krb5_key key,
krb5_error_code KRB5_CALLCONV
krb5_c_decrypt(krb5_context context, const krb5_keyblock *keyblock,
- krb5_keyusage usage, const krb5_data *ivec,
+ krb5_keyusage usage, const krb5_data *cipher_state,
const krb5_enc_data *input, krb5_data *output)
{
krb5_key key;
@@ -95,7 +95,7 @@ krb5_c_decrypt(krb5_context context, const krb5_keyblock *keyblock,
ret = krb5_k_create_key(context, keyblock, &key);
if (ret != 0)
return ret;
- ret = krb5_k_decrypt(context, key, usage, ivec, input, output);
+ ret = krb5_k_decrypt(context, key, usage, cipher_state, input, output);
krb5_k_free_key(context, key);
return ret;
}
diff --git a/src/lib/crypto/krb/encrypt.c b/src/lib/crypto/krb/encrypt.c
index 3c7bbdacd..f46fb1370 100644
--- a/src/lib/crypto/krb/encrypt.c
+++ b/src/lib/crypto/krb/encrypt.c
@@ -29,7 +29,7 @@
krb5_error_code KRB5_CALLCONV
krb5_k_encrypt(krb5_context context, krb5_key key,
- krb5_keyusage usage, const krb5_data *ivec,
+ krb5_keyusage usage, const krb5_data *cipher_state,
const krb5_data *input, krb5_enc_data *output)
{
const struct krb5_keytypes *ktp;
@@ -68,7 +68,7 @@ krb5_k_encrypt(krb5_context context, krb5_key key,
iov[3].flags = KRB5_CRYPTO_TYPE_TRAILER;
iov[3].data = make_data(iov[2].data.data + padding_len, trailer_len);
- ret = ktp->encrypt(ktp, key, usage, ivec, iov, 4);
+ ret = ktp->encrypt(ktp, key, usage, cipher_state, iov, 4);
if (ret != 0)
zap(iov[1].data.data, iov[1].data.length);
else
@@ -78,7 +78,7 @@ krb5_k_encrypt(krb5_context context, krb5_key key,
krb5_error_code KRB5_CALLCONV
krb5_c_encrypt(krb5_context context, const krb5_keyblock *keyblock,
- krb5_keyusage usage, const krb5_data *ivec,
+ krb5_keyusage usage, const krb5_data *cipher_state,
const krb5_data *input, krb5_enc_data *output)
{
krb5_key key;
@@ -87,7 +87,7 @@ krb5_c_encrypt(krb5_context context, const krb5_keyblock *keyblock,
ret = krb5_k_create_key(context, keyblock, &key);
if (ret != 0)
return ret;
- ret = krb5_k_encrypt(context, key, usage, ivec, input, output);
+ ret = krb5_k_encrypt(context, key, usage, cipher_state, input, output);
krb5_k_free_key(context, key);
return ret;
}