summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5/util_crypt.c
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2009-10-28 19:17:35 +0000
committerGreg Hudson <ghudson@mit.edu>2009-10-28 19:17:35 +0000
commit83c40776396c2c79a1f3a582cb1be6872b871be5 (patch)
tree159a0e38a51d8c8610a7bdfcdceaaadd46d4d2fc /src/lib/gssapi/krb5/util_crypt.c
parent7da28b8d6f545c8c8c9880d854325d479bba1861 (diff)
downloadkrb5-83c40776396c2c79a1f3a582cb1be6872b871be5.tar.gz
krb5-83c40776396c2c79a1f3a582cb1be6872b871be5.tar.xz
krb5-83c40776396c2c79a1f3a582cb1be6872b871be5.zip
Bump the accessor version number since we made changes.
Take the opportunity to regularize accessor field names (no krb5 or krb5int prefixes). Fix a test program which was still using krb5_hmac. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23081 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/util_crypt.c')
-rw-r--r--src/lib/gssapi/krb5/util_crypt.c21
1 files changed, 10 insertions, 11 deletions
diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c
index 0f712ea46..e0970865b 100644
--- a/src/lib/gssapi/krb5/util_crypt.c
+++ b/src/lib/gssapi/krb5/util_crypt.c
@@ -119,9 +119,8 @@ kg_setup_keys(krb5_context context, krb5_gss_ctx_id_rec *ctx, krb5_key subkey,
if (code != 0)
return code;
- code = (*kaccess.krb5int_c_mandatory_cksumtype)(context,
- subkey->keyblock.enctype,
- cksumtype);
+ code = (*kaccess.mandatory_cksumtype)(context, subkey->keyblock.enctype,
+ cksumtype);
if (code != 0)
return code;
@@ -321,8 +320,8 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage,
input.length = i;
output.data = (void *) usage_key.contents;
output.length = usage_key.length;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- longterm_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, longterm_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
if (exportable)
@@ -331,8 +330,8 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage,
input.data = ( void *) kd_data;
input.length = kd_data_len;
output.data = (void *) seq_enc_key.contents;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- &usage_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, &usage_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
input.data = ( void * ) input_buf;
@@ -667,8 +666,8 @@ kg_arcfour_docrypt_iov(krb5_context context,
input.length = i;
output.data = (void *) usage_key.contents;
output.length = usage_key.length;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- longterm_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, longterm_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
if (exportable)
@@ -677,8 +676,8 @@ kg_arcfour_docrypt_iov(krb5_context context,
input.data = ( void *) kd_data;
input.length = kd_data_len;
output.data = (void *) seq_enc_key.contents;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- &usage_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, &usage_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;