summaryrefslogtreecommitdiffstats
path: root/src/lib/krb5/krb/ser_eblk.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/krb5/krb/ser_eblk.c')
-rw-r--r--src/lib/krb5/krb/ser_eblk.c21
1 files changed, 3 insertions, 18 deletions
diff --git a/src/lib/krb5/krb/ser_eblk.c b/src/lib/krb5/krb/ser_eblk.c
index 791963e7d..dcc73d04d 100644
--- a/src/lib/krb5/krb/ser_eblk.c
+++ b/src/lib/krb5/krb/ser_eblk.c
@@ -63,14 +63,13 @@ krb5_encrypt_block_size(kcontext, arg, sizep)
size_t required;
/*
- * NOTE: This ASSuMES that keytype and etype are sufficient to recreate
+ * NOTE: This ASSuMES that keytype are sufficient to recreate
* the _krb5_cryptosystem_entry. If this is not true, then something else
* had better be encoded here.
*
* krb5_encrypt_block base requirements:
* krb5_int32 for KV5M_ENCRYPT_BLOCK
* krb5_int32 for keytype
- * krb5_int32 for etype;
* krb5_int32 for private length
* encrypt_block->priv_size for private contents
* krb5_int32 for KV5M_ENCRYPT_BLOCK
@@ -128,11 +127,6 @@ krb5_encrypt_block_externalize(kcontext, arg, buffer, lenremain)
crypto_entry->proto_keytype,
&bp, &remain);
- /* Our etype */
- (void) krb5_ser_pack_int32((krb5_int32) encrypt_block->
- crypto_entry->proto_enctype,
- &bp, &remain);
-
/* Our length */
(void) krb5_ser_pack_int32((krb5_int32) encrypt_block->priv_size,
&bp, &remain);
@@ -178,7 +172,6 @@ krb5_encrypt_block_internalize(kcontext, argp, buffer, lenremain)
krb5_encrypt_block *encrypt_block;
krb5_int32 ibuf;
krb5_keytype ktype;
- krb5_enctype etype;
krb5_octet *bp;
size_t remain;
@@ -201,16 +194,8 @@ krb5_encrypt_block_internalize(kcontext, argp, buffer, lenremain)
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
ktype = (krb5_keytype) ibuf;
- /* Get the etype */
- (void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
- etype = (krb5_enctype) ibuf;
-
- /*
- * Use the etype to determine the crypto_system entry. In the
- * future, we may need to use a combination of keytype/etype or
- * just keytype here.
- */
- krb5_use_cstype(kcontext, encrypt_block, etype);
+ /* Use the ktype to determine the crypto_system entry. */
+ krb5_use_keytype(kcontext, encrypt_block, ktype);
/* Get the length */
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);