summaryrefslogtreecommitdiffstats
path: root/src/lib
diff options
context:
space:
mode:
authorTheodore Tso <tytso@mit.edu>1994-11-08 23:00:00 +0000
committerTheodore Tso <tytso@mit.edu>1994-11-08 23:00:00 +0000
commitd18f25e3bdf995e723a7d81bdb6ebac8b1e7f917 (patch)
tree74c0c745a8dbd2fe4249304a671e25e76d2be0d9 /src/lib
parent575922660257014f7e5087db7690f732261cfc5d (diff)
downloadkrb5-d18f25e3bdf995e723a7d81bdb6ebac8b1e7f917.tar.gz
krb5-d18f25e3bdf995e723a7d81bdb6ebac8b1e7f917.tar.xz
krb5-d18f25e3bdf995e723a7d81bdb6ebac8b1e7f917.zip
Change internal calling signature to pass in the encryption block, so
that the encryption type in the keyblock structure can be properly initialized. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@4649 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/crypto/des/ChangeLog9
-rw-r--r--src/lib/crypto/des/des_int.h6
-rw-r--r--src/lib/crypto/des/random_key.c6
-rw-r--r--src/lib/crypto/des/string2key.c6
4 files changed, 22 insertions, 5 deletions
diff --git a/src/lib/crypto/des/ChangeLog b/src/lib/crypto/des/ChangeLog
index c8f25e776..1d977f8e4 100644
--- a/src/lib/crypto/des/ChangeLog
+++ b/src/lib/crypto/des/ChangeLog
@@ -1,3 +1,12 @@
+Tue Nov 8 17:57:47 1994 Theodore Y. Ts'o (tytso@dcl)
+
+ * des_int.h:
+ random_key.c (mit_des_random_key):
+ string2key.c (mit_des_string_to_key): Change
+ internal calling signature to pass in the encryption
+ block, so that the encryption type in the keyblock
+ structure can be properly initialized.
+
Thu Nov 3 18:31:55 1994 Mark Eichin (eichin@cygnus.com)
* Makefile.in: stop building f_pcbc.c, since it belongs in
diff --git a/src/lib/crypto/des/des_int.h b/src/lib/crypto/des/des_int.h
index 038423a97..cc5762a35 100644
--- a/src/lib/crypto/des/des_int.h
+++ b/src/lib/crypto/des/des_int.h
@@ -163,12 +163,12 @@ extern krb5_error_code mit_des_process_key
/* random_key.c */
extern krb5_error_code mit_des_random_key
- PROTOTYPE(( krb5_pointer , krb5_keyblock **));
+ PROTOTYPE(( const krb5_encrypt_block *, krb5_pointer , krb5_keyblock **));
/* string2key.c */
extern krb5_error_code mit_des_string_to_key
- PROTOTYPE((const krb5_keytype, krb5_keyblock *, const krb5_data *,
- const krb5_data *));
+ PROTOTYPE(( const krb5_encrypt_block *, const krb5_keytype,
+ krb5_keyblock *, const krb5_data *, const krb5_data *));
/* weak_key.c */
extern int mit_des_is_weak_key PROTOTYPE((mit_des_cblock ));
diff --git a/src/lib/crypto/des/random_key.c b/src/lib/crypto/des/random_key.c
index 48ad309e0..184d1099e 100644
--- a/src/lib/crypto/des/random_key.c
+++ b/src/lib/crypto/des/random_key.c
@@ -33,8 +33,10 @@
filling in the keyblock address in *keyblock
*/
-krb5_error_code mit_des_random_key (DECLARG(krb5_pointer, seed),
+krb5_error_code mit_des_random_key (DECLARG(const krb5_encrypt_block *, eblock),
+ DECLARG(krb5_pointer, seed),
DECLARG(krb5_keyblock **, keyblock))
+OLDDECLARG(const krb5_encrypt_block *, eblock)
OLDDECLARG(krb5_pointer, seed)
OLDDECLARG(krb5_keyblock **, keyblock)
{
@@ -46,6 +48,8 @@ OLDDECLARG(krb5_keyblock **, keyblock)
krb5_xfree(randkey);
return ENOMEM;
}
+ randkey->magic = KV5M_KEYBLOCK;
+ randkey->etype = eblock->crypto_entry->proto_enctype;
randkey->length = sizeof(mit_des_cblock);
randkey->keytype = KEYTYPE_DES;
mit_des_new_random_key(randkey->contents, (mit_des_random_key_seed *) seed);
diff --git a/src/lib/crypto/des/string2key.c b/src/lib/crypto/des/string2key.c
index 63274bc99..be3292beb 100644
--- a/src/lib/crypto/des/string2key.c
+++ b/src/lib/crypto/des/string2key.c
@@ -44,10 +44,12 @@
returns: errors
*/
-krb5_error_code mit_des_string_to_key (DECLARG(const krb5_keytype, keytype),
+krb5_error_code mit_des_string_to_key (DECLARG(const krb5_encrypt_block *, eblock),
+ DECLARG(const krb5_keytype, keytype),
DECLARG(krb5_keyblock *,keyblock),
DECLARG(const krb5_data *,data),
DECLARG(const krb5_data *, salt))
+OLDDECLARG(const krb5_encrypt_block *, eblock)
OLDDECLARG(const krb5_keytype, keytype)
OLDDECLARG(krb5_keyblock *,keyblock)
OLDDECLARG(const krb5_data *,data)
@@ -73,6 +75,8 @@ OLDDECLARG(const krb5_data *, salt)
if ( !(keyblock->contents = (krb5_octet *)malloc(sizeof(mit_des_cblock))) )
return(ENOMEM);
+ keyblock->magic = KV5M_KEYBLOCK;
+ keyblock->etype = eblock->crypto_entry->proto_enctype;
keyblock->keytype = KEYTYPE_DES;
keyblock->length = sizeof(mit_des_cblock);
key = keyblock->contents;