+2001-10-22 Sam Hartman <hartmans@mit.edu>
+
+ * k5-int.h: keyhash_provider gains usage argument to hash function
+
2001-10-15 Danilo Almeida <dalmeida@mit.edu>
* krb5.hin (krb5_kt_get_type): KRB5_CALLCONV.
void (*hash_size) (size_t *output);
krb5_error_code (*hash) (krb5_const krb5_keyblock *key,
+ krb5_keyusage usage,
krb5_const krb5_data *ivec,
krb5_const krb5_data *input,
krb5_data *output);
+2001-10-22 Sam Hartman <hartmans@mit.edu>
+
+ * make_checksum.c (krb5_c_make_checksum): Include key usage
+
+2001-10-19 Sam Hartman <hartmans@mit.edu>
+
+ * Makefile.in (check-unix): Run t_encrypt
+
+ * t_encrypt.c: New file to contain generic encryption system
+ black-box tests ; currently primitive, but useful for rc4 work
+
2001-10-03 Ken Raeburn <raeburn@mit.edu>
* block_size.c, checksum_length.c, cksumtype_to_string.c,
+2001-10-22 Sam Hartman <hartmans@mit.edu>
+
+ * t_cksum.c (main): Include key usage in hash call.
+
+ * k5_md5des.c (k5_md5des_hash): add usage
+
+ * k5_md4des.c (k5_md4des_hash): add key usage
+
+ * descbc.c (k5_descbc_hash): Add key usage
+
2001-05-31 Ezra Peisach <epeisach@mit.edu>
* k5_md4des.c (k5_md4des_verify): Get rid of local variable that
}
static krb5_error_code
-k5_descbc_hash(const krb5_keyblock *key, const krb5_data *ivec,
+k5_descbc_hash(const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec,
const krb5_data *input, krb5_data *output)
{
mit_des_key_schedule schedule;
that's less efficient, and there's no need for this to be generic */
static krb5_error_code
-k5_md4des_hash(const krb5_keyblock *key, const krb5_data *ivec,
+k5_md4des_hash(const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec,
const krb5_data *input, krb5_data *output)
{
krb5_error_code ret;
that's less efficient, and there's no need for this to be generic */
static krb5_error_code
-k5_md5des_hash(const krb5_keyblock *key, const krb5_data *ivec,
+k5_md5des_hash(const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec,
const krb5_data *input, krb5_data *output)
{
krb5_error_code ret;
plaintext.length = strlen(argv[msgindex]);
plaintext.data = argv[msgindex];
- if ((kret = (*(khp.hash))(&keyblock, 0, &plaintext, &newstyle_checksum))) {
+ if ((kret = (*(khp.hash))(&keyblock, 0, 0, &plaintext, &newstyle_checksum))) {
printf("krb5_calculate_checksum choked with %d\n", kret);
break;
}
}
}
- ret = (*(krb5_cksumtypes_list[i].keyhash->hash))(key, 0, input, &data);
+ ret = (*(krb5_cksumtypes_list[i].keyhash->hash))(key, usage, 0, input, &data);
} else if (krb5_cksumtypes_list[i].flags & KRB5_CKSUMFLAG_DERIVE) {
/* any key is ok */
#ifdef ATHENA_DES3_KLUDGE