use krb5_keytype_array[] instead of fiction
authorJohn Kohl <jtkohl@mit.edu>
Fri, 6 Apr 1990 16:13:40 +0000 (16:13 +0000)
committerJohn Kohl <jtkohl@mit.edu>
Fri, 6 Apr 1990 16:13:40 +0000 (16:13 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@478 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/krb5/krb/rd_req_dec.c

index c11042db331cfcdd67ea68e5366a4f312d32ef5f..330f49c589c35381a747a96080a3bbf7f32e774c 100644 (file)
@@ -180,19 +180,16 @@ krb5_authenticator **authpp;
     krb5_error_code retval;
     krb5_encrypt_block eblock;
     krb5_data scratch;
-    krb5_enctype etype;
     krb5_keyblock *sesskey;
 
     sesskey = request->ticket->enc_part2->session;
 
-    etype = keytype_to_etype(sesskey->keytype);
-
-    if (!valid_etype(etype))
-       return KRB5_PROG_ETYPE_NOSUPP;
+    if (!valid_keytype(sesskey->keytype))
+       return KRB5_PROG_KEYTYPE_NOSUPP;
 
     /* put together an eblock for this encryption */
 
-    eblock.crypto_entry = krb5_csarray[etype]->system;
+    eblock.crypto_entry = krb5_keytype_array[sesskey->keytype]->system;
 
     scratch.length = request->authenticator.length;
     if (!(scratch.data = malloc(scratch.length)))