summaryrefslogtreecommitdiffstats
path: root/src/lib
diff options
context:
space:
mode:
authorJohn Kohl <jtkohl@mit.edu>1990-09-28 10:54:24 +0000
committerJohn Kohl <jtkohl@mit.edu>1990-09-28 10:54:24 +0000
commit1ec4ceee880e0c2c8185f59e51195da84a6157ec (patch)
tree2f881da4e36d8892b44a8f6514cd99980d0c6ab0 /src/lib
parent82677a06cc9e069e6b9cdbcd1739e66a870382ee (diff)
no need for credentials; use keyblock directly
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@1155 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/krb5/krb/mk_rep.c12
-rw-r--r--src/lib/krb5/krb/rd_rep.c12
2 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/krb5/krb/mk_rep.c b/src/lib/krb5/krb/mk_rep.c
index f68b21565..fe8d4fdf2 100644
--- a/src/lib/krb5/krb/mk_rep.c
+++ b/src/lib/krb5/krb/mk_rep.c
@@ -27,7 +27,7 @@ static char rcsid_mk_rep_c[] =
/*
Formats a KRB_AP_REP message into outbuf.
- The reply in repl is encrypted under the key in creds, and the resulting
+ The reply in repl is encrypted under the key in kblock, and the resulting
message encoded and left in outbuf.
The outbuf buffer storage is allocated, and should be freed by the
@@ -37,9 +37,9 @@ static char rcsid_mk_rep_c[] =
*/
krb5_error_code
-krb5_mk_rep(repl, creds, outbuf)
+krb5_mk_rep(repl, kblock, outbuf)
const krb5_ap_rep_enc_part *repl;
-const krb5_creds *creds;
+const krb5_keyblock *kblock;
krb5_data *outbuf;
{
krb5_error_code retval;
@@ -50,10 +50,10 @@ krb5_data *outbuf;
krb5_data *toutbuf;
/* verify a valid etype is available */
- if (!valid_keytype(creds->keyblock.keytype))
+ if (!valid_keytype(kblock->keytype))
return KRB5_PROG_KEYTYPE_NOSUPP;
- etype = krb5_keytype_array[creds->keyblock.keytype]->system->proto_enctype;
+ etype = krb5_keytype_array[kblock->keytype]->system->proto_enctype;
if (!valid_etype(etype))
return KRB5_PROG_ETYPE_NOSUPP;
@@ -85,7 +85,7 @@ krb5_data *outbuf;
#define cleanup_encpart() {(void) bzero(reply.enc_part.data, reply.enc_part.length); free(reply.enc_part.data); reply.enc_part.length = 0; reply.enc_part.data = 0;}
/* do any necessary key pre-processing */
- if (retval = krb5_process_key(&eblock, &creds->keyblock)) {
+ if (retval = krb5_process_key(&eblock, kblock)) {
goto clean_encpart;
}
diff --git a/src/lib/krb5/krb/rd_rep.c b/src/lib/krb5/krb/rd_rep.c
index 78cc9d78f..db8791cb6 100644
--- a/src/lib/krb5/krb/rd_rep.c
+++ b/src/lib/krb5/krb/rd_rep.c
@@ -26,15 +26,15 @@ static char rcsid_rd_req_dec_c[] =
repl is filled in with the fields from the encrypted response.
- creds supplies the encryption key used to decrypt the message.
+ the key in kblock is used to decrypt the message.
returns system errors, encryption errors, replay errors
*/
krb5_error_code
-krb5_rd_rep(inbuf, creds, repl)
+krb5_rd_rep(inbuf, kblock, repl)
const krb5_data *inbuf;
-const krb5_creds *creds;
+const krb5_keyblock *kblock;
krb5_ap_rep_enc_part *repl;
{
krb5_error_code retval;
@@ -46,7 +46,7 @@ krb5_ap_rep_enc_part *repl;
if (!krb5_is_ap_rep(inbuf))
return KRB5KRB_AP_ERR_MSG_TYPE;
- if (!valid_keytype(creds->keyblock.keytype))
+ if (!valid_keytype(kblock->keytype))
return KRB5_PROG_KEYTYPE_NOSUPP;
/* decode it */
@@ -56,7 +56,7 @@ krb5_ap_rep_enc_part *repl;
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_keytype_array[creds->keyblock.keytype]->system;
+ eblock.crypto_entry = krb5_keytype_array[kblock->keytype]->system;
scratch.length = reply->enc_part.length;
if (!(scratch.data = malloc(scratch.length))) {
@@ -65,7 +65,7 @@ krb5_ap_rep_enc_part *repl;
}
/* do any necessary key pre-processing */
- if (retval = krb5_process_key(&eblock, &creds->keyblock)) {
+ if (retval = krb5_process_key(&eblock, kblock)) {
errout:
free(scratch.data);
krb5_free_ap_rep(reply);