summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/gssapi')
-rw-r--r--src/lib/gssapi/krb5/accept_sec_context.c6
-rw-r--r--src/lib/gssapi/krb5/ser_sctx.c14
-rw-r--r--src/lib/gssapi/krb5/util_crypt.c21
3 files changed, 21 insertions, 20 deletions
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index b6c216d58..ccfdb5c1c 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -988,9 +988,9 @@ kg_accept_krb5(minor_status, context_handle,
if (ctx->proto == 0 &&
(ctx->gss_flags & GSS_C_DCE_STYLE) == 0 &&
(ap_req_options & AP_OPTS_USE_SUBKEY)) {
- code = (*kaccess.krb5_auth_con_get_subkey_enctype) (context,
- auth_context,
- &negotiated_etype);
+ code = (*kaccess.auth_con_get_subkey_enctype)(context,
+ auth_context,
+ &negotiated_etype);
if (code != 0) {
major_status = GSS_S_FAILURE;
goto fail;
diff --git a/src/lib/gssapi/krb5/ser_sctx.c b/src/lib/gssapi/krb5/ser_sctx.c
index bdcd7685e..4987b2e9c 100644
--- a/src/lib/gssapi/krb5/ser_sctx.c
+++ b/src/lib/gssapi/krb5/ser_sctx.c
@@ -433,10 +433,10 @@ kg_ctx_externalize(kcontext, arg, buffer, lenremain)
&bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_flags,
&bp, &remain);
- (void) (*kaccess.krb5_ser_pack_int64)((krb5_int64) ctx->seq_send,
- &bp, &remain);
- (void) (*kaccess.krb5_ser_pack_int64)((krb5_int64) ctx->seq_recv,
- &bp, &remain);
+ (void) (*kaccess.ser_pack_int64)((krb5_int64) ctx->seq_send,
+ &bp, &remain);
+ (void) (*kaccess.ser_pack_int64)((krb5_int64) ctx->seq_recv,
+ &bp, &remain);
/* Now dynamic data */
kret = 0;
@@ -644,8 +644,10 @@ kg_ctx_internalize(kcontext, argp, buffer, lenremain)
ctx->krb_times.renew_till = (krb5_timestamp) ibuf;
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
ctx->krb_flags = (krb5_flags) ibuf;
- (void) (*kaccess.krb5_ser_unpack_int64)((krb5_int64 *)&ctx->seq_send, &bp, &remain);
- kret = (*kaccess.krb5_ser_unpack_int64)((krb5_int64 *)&ctx->seq_recv, &bp, &remain);
+ (void) (*kaccess.ser_unpack_int64)((krb5_int64 *)&ctx->seq_send,
+ &bp, &remain);
+ kret = (*kaccess.ser_unpack_int64)((krb5_int64 *)&ctx->seq_recv,
+ &bp, &remain);
if (kret) {
free(ctx);
return kret;
diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c
index 0f712ea46..e0970865b 100644
--- a/src/lib/gssapi/krb5/util_crypt.c
+++ b/src/lib/gssapi/krb5/util_crypt.c
@@ -119,9 +119,8 @@ kg_setup_keys(krb5_context context, krb5_gss_ctx_id_rec *ctx, krb5_key subkey,
if (code != 0)
return code;
- code = (*kaccess.krb5int_c_mandatory_cksumtype)(context,
- subkey->keyblock.enctype,
- cksumtype);
+ code = (*kaccess.mandatory_cksumtype)(context, subkey->keyblock.enctype,
+ cksumtype);
if (code != 0)
return code;
@@ -321,8 +320,8 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage,
input.length = i;
output.data = (void *) usage_key.contents;
output.length = usage_key.length;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- longterm_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, longterm_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
if (exportable)
@@ -331,8 +330,8 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage,
input.data = ( void *) kd_data;
input.length = kd_data_len;
output.data = (void *) seq_enc_key.contents;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- &usage_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, &usage_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
input.data = ( void * ) input_buf;
@@ -667,8 +666,8 @@ kg_arcfour_docrypt_iov(krb5_context context,
input.length = i;
output.data = (void *) usage_key.contents;
output.length = usage_key.length;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- longterm_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, longterm_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;
if (exportable)
@@ -677,8 +676,8 @@ kg_arcfour_docrypt_iov(krb5_context context,
input.data = ( void *) kd_data;
input.length = kd_data_len;
output.data = (void *) seq_enc_key.contents;
- code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider,
- &usage_key, 1, &input, &output);
+ code = (*kaccess.hmac)(kaccess.md5_hash_provider, &usage_key, 1,
+ &input, &output);
if (code)
goto cleanup_arcfour;