#include <krb5/ext-proto.h>
-/* array of pointers into encryption systems */
-extern krb5_cs_table_entry *csarray[];
-extern int max_cryptosystem;
-
/*
Takes a KDC_REP message and decrypts encrypted part using etype and
*key, putting result in *rep.
return(ENOMEM);
}
- if (!valid_etype(local_dec_rep->etype))
+ if (!valid_etype(etype))
return KRB5KDC_ERR_ETYPE_NOSUPP;
/* put together an eblock for this encryption */
- eblock.crypto_entry = csarray[local_dec_rep->etype]->system;
+ eblock.crypto_entry = krb5_csarray[etype]->system;
/* do any necessary key pre-processing */
if (retval = (*eblock.crypto_entry->process_key)(&eblock, key)) {
#include <krb5/ext-proto.h>
-
-/* array of pointers into encryption systems */
-extern krb5_cs_table_entry *csarray[];
-extern int max_cryptosystem;
-
/*
Takes encrypted dec_ticket->enc_part, encrypts with dec_ticket->etype
using *srv_key, and places result in dec_ticket->enc_part2.
/* put together an eblock for this encryption */
- eblock.crypto_entry = csarray[ticket->etype]->system;
+ eblock.crypto_entry = krb5_csarray[ticket->etype]->system;
scratch.length = ticket->enc_part.length;
if (!(scratch.data = malloc(ticket->enc_part.length)))
#include <krb5/ext-proto.h>
-/* array of pointers into encryption systems */
-extern krb5_cs_table_entry *csarray[];
-extern int max_cryptosystem; /* max entry in array */
-
/*
Takes KDC rep parts in *rep and *encpart, and formats it into *enc_rep,
using message type type and encryption key client_key and encryption type
/* put together an eblock for this encryption */
- eblock.crypto_entry = csarray[dec_rep->etype]->system;
+ eblock.crypto_entry = krb5_csarray[dec_rep->etype]->system;
dec_rep->enc_part.length = krb5_encrypt_size(scratch->length,
eblock.crypto_entry);
if (!(dec_rep->enc_part.data = malloc(dec_rep->enc_part.length))) {
#include <krb5/ext-proto.h>
-/* array of pointers into encryption systems */
-extern krb5_cs_table_entry *csarray[];
-extern int max_cryptosystem; /* max entry in array */
-
/*
Takes unencrypted dec_ticket & dec_tkt_part, encrypts with dec_ticket->etype
using *srv_key, and places result in dec_ticket->enc_part.
/* put together an eblock for this encryption */
- eblock.crypto_entry = csarray[dec_ticket->etype]->system;
+ eblock.crypto_entry = krb5_csarray[dec_ticket->etype]->system;
dec_ticket->enc_part.length = krb5_encrypt_size(scratch->length,
eblock.crypto_entry);
if (!(dec_ticket->enc_part.data = malloc(dec_ticket->enc_part.length))) {