Pass the eblock to the init_random_key and finish_random_key functions
authorRichard Basch <probe@mit.edu>
Tue, 7 May 1996 20:39:22 +0000 (20:39 +0000)
committerRichard Basch <probe@mit.edu>
Tue, 7 May 1996 20:39:22 +0000 (20:39 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7914 dc483132-0cff-0310-8789-dd5450dbe970

src/include/ChangeLog
src/include/krb5.hin

index e366904459325b91ed4303c64414b19fce3f582d..f01af2f4ac30b9b32039554ff48abb3a9cda9adf 100644 (file)
@@ -1,3 +1,8 @@
+Thu May  2 18:41:00 1996  Richard Basch  <basch@lehman.com>
+
+       * krb5.hin: krb5_init_random_key & krb5_finish_random_key now
+               pass the eblock to the underlying crypto routine.
+
 Fri May  3 00:26:47 1996  Mark Eichin  <eichin@cygnus.com>
 
        * krb5.hin (krb5_get_credentials_validate): declaration for new
index a6ec1fa7e6cc8b85c2a517f90cfe9bedd90eda02..98125226f32561418a5ea47c9471854adaaf915a 100644 (file)
@@ -359,9 +359,11 @@ typedef struct _krb5_cryptosystem_entry {
                                                krb5_keyblock FAR *,
                                                krb5_const krb5_data FAR *,
                                                krb5_const krb5_data FAR *));
-    krb5_error_code  (*init_random_key) KRB5_NPROTOTYPE((krb5_const krb5_keyblock FAR *,
-                                                  krb5_pointer FAR *));
-    krb5_error_code  (*finish_random_key) KRB5_NPROTOTYPE(( krb5_pointer FAR *));
+    krb5_error_code (*init_random_key) KRB5_NPROTOTYPE(( krb5_const krb5_encrypt_block FAR *,
+                                               krb5_const krb5_keyblock FAR *,
+                                               krb5_pointer FAR *));
+    krb5_error_code (*finish_random_key) KRB5_NPROTOTYPE(( krb5_const krb5_encrypt_block FAR *,
+                                               krb5_pointer FAR *));
     krb5_error_code (*random_key) KRB5_NPROTOTYPE(( krb5_const krb5_encrypt_block FAR *,
                                              krb5_pointer,
                                              krb5_keyblock FAR * FAR *));
@@ -468,8 +470,8 @@ extern krb5_cksumtype krb5_max_cksum;               /* max entry in array */
 #define krb5_process_key(context, eblock, key) krb5_x((eblock)->crypto_entry->process_key,(eblock, key))
 #define krb5_finish_key(context, eblock) krb5_x((eblock)->crypto_entry->finish_key,(eblock))
 #define krb5_string_to_key(context, eblock, keyblock, data, princ) krb5_x((eblock)->crypto_entry->string_to_key,(eblock, keyblock, data, princ))
-#define krb5_init_random_key(context, eblock, keyblock, ptr) krb5_x((eblock)->crypto_entry->init_random_key,(keyblock, ptr))
-#define krb5_finish_random_key(context, eblock, ptr) krb5_x((eblock)->crypto_entry->finish_random_key,(ptr))
+#define krb5_init_random_key(context, eblock, keyblock, ptr) krb5_x((eblock)->crypto_entry->init_random_key,(eblock, keyblock, ptr))
+#define krb5_finish_random_key(context, eblock, ptr) krb5_x((eblock)->crypto_entry->finish_random_key,(eblock, ptr))
 #define krb5_random_key(context, eblock, ptr, keyblock) krb5_x((eblock)->crypto_entry->random_key,(eblock, ptr, keyblock))
 
 #define krb5_eblock_enctype(context, eblockp) ((eblockp)->crypto_entry->proto_enctype)