summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorJohn Kohl <jtkohl@mit.edu>1990-09-20 15:12:08 +0000
committerJohn Kohl <jtkohl@mit.edu>1990-09-20 15:12:08 +0000
commit9039380fc538193960ba2ed4fd769e5244c2e668 (patch)
tree75eb034b2d15722ba39058b1fd3181fced300f37 /src
parentf868f5286750a5dee46bfd6dc7902ab1e82dee24 (diff)
downloadkrb5-9039380fc538193960ba2ed4fd769e5244c2e668.tar.gz
krb5-9039380fc538193960ba2ed4fd769e5244c2e668.tar.xz
krb5-9039380fc538193960ba2ed4fd769e5244c2e668.zip
add #define calls for abstraction
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@1136 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src')
-rw-r--r--src/lib/kdb/decrypt_key.c9
-rw-r--r--src/lib/kdb/encrypt_key.c9
2 files changed, 8 insertions, 10 deletions
diff --git a/src/lib/kdb/decrypt_key.c b/src/lib/kdb/decrypt_key.c
index 7ba40edd2..2e466526c 100644
--- a/src/lib/kdb/decrypt_key.c
+++ b/src/lib/kdb/decrypt_key.c
@@ -53,11 +53,10 @@ krb5_keyblock *out;
/* remember the contents of the encrypted version has a sizeof(in->length)
integer length of the real embedded key, followed by the
encrypted key, so the offset here is needed */
- if (retval = (*eblock->crypto_entry->
- decrypt_func)((krb5_pointer) (((char *) in->contents) +
- sizeof(in->length)),
- (krb5_pointer) out->contents,
- in->length-sizeof(in->length), eblock, 0)) {
+ if (retval = krb5_decrypt((krb5_pointer) (((char *) in->contents) +
+ sizeof(in->length)),
+ (krb5_pointer) out->contents,
+ in->length-sizeof(in->length), eblock, 0)) {
free((char *)out->contents);
out->contents = 0;
out->length = 0;
diff --git a/src/lib/kdb/encrypt_key.c b/src/lib/kdb/encrypt_key.c
index 4cc6068b4..75dab396d 100644
--- a/src/lib/kdb/encrypt_key.c
+++ b/src/lib/kdb/encrypt_key.c
@@ -54,11 +54,10 @@ krb5_keyblock *out;
/* copy in real length */
bcopy((char *)&in->length, (char *)out->contents, sizeof(out->length));
/* and arrange for encrypted key */
- if (retval = (*eblock->crypto_entry->
- encrypt_func)((krb5_pointer) tmpcontents,
- (krb5_pointer) (((char *) out->contents) +
- sizeof(out->length)),
- in->length, eblock, 0)) {
+ if (retval = krb5_encrypt((krb5_pointer) tmpcontents,
+ (krb5_pointer) (((char *) out->contents) +
+ sizeof(out->length)),
+ in->length, eblock, 0)) {
free((char *)out->contents);
out->contents = 0;
out->length = 0;