+Mon May 6 12:15:36 1996 Richard Basch <basch@lehman.com>
+
+ * main.c: Fixed various abstraction violations where the code knew
+ the internals of eblock->crypto_entry.
+
Wed Feb 28 13:07:28 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* main.c: Move com_err.h after k5-int.h include.
}
if (!rkey_init_done) {
krb5_enctype enctype;
+ krb5_encrypt_block temp_eblock;
#ifdef KRB5_KRB4_COMPAT
krb5_keyblock *temp_key;
- krb5_encrypt_block temp_eblock;
#endif
/*
* If all that worked, then initialize the random key
for (enctype = 0; enctype <= krb5_max_enctype; enctype++) {
if (krb5_enctype_array[enctype] &&
!krb5_enctype_array[enctype]->random_sequence) {
- if ((kret = (*krb5_enctype_array[enctype]->system->
- init_random_key)
- (&rdp->realm_mkey,
- &krb5_enctype_array[enctype]->random_sequence))) {
+ krb5_use_enctype(rdp->realm_context, &temp_eblock, enctype);
+ if ((kret = krb5_init_random_key(
+ rdp->realm_context, &temp_eblock,
+ &rdp->realm_mkey,
+ &krb5_enctype_array[enctype]->random_sequence))) {
com_err(progname, kret,
"while setting up random key generator for enctype %d--enctype disabled",
enctype);
} else {
#ifdef KRB5_KRB4_COMPAT
if (enctype == ENCTYPE_DES_CBC_CRC) {
- krb5_use_enctype(rdp->realm_context,
- &temp_eblock, enctype);
- if ((kret = (*krb5_enctype_array[enctype]->
- system->random_key)
- (&temp_eblock,
- krb5_enctype_array[enctype]->random_sequence,
- &temp_key)))
+ if ((kret = krb5_random_key(
+ rdp->realm_context, &temp_eblock,
+ krb5_enctype_array[enctype]->random_sequence,
+ &temp_key)))
com_err(progname, kret,
"while initializing V4 random key generator");
else {
+Thu May 2 21:17:27 1996 Richard Basch <basch@lehman.com>
+
+ * kdb5_mkdums.c: fixed various abstraction violations where the
+ code "knew" the cryptosystem_entry structure
+
Sat Dec 23 01:04:40 1995 <tytso@rsts-11.mit.edu>
* configure.in: Add check for DBM/db libraries
krb5_error_code retval;
char *dbname = 0;
int enctypedone = 0;
- register krb5_cryptosystem_entry *csentry;
extern krb5_kt_ops krb5_ktf_writable_ops;
int num_to_create;
char principal_string[BUFSIZ];
}
krb5_use_enctype(test_context, &master_encblock, master_keyblock.enctype);
- csentry = master_encblock.crypto_entry;
if (!dbname)
dbname = DEFAULT_KDB_FILE; /* XXX? */
}
}
- (void) (*csentry->finish_key)(&master_encblock);
- (void) (*csentry->finish_random_key)(&master_random);
+ krb5_finish_random_key(test_context, &master_encblock, &master_random);
+ krb5_finish_key(test_context, &master_encblock);
+
retval = krb5_db_fini(test_context);
memset((char *)master_keyblock.contents, 0, master_keyblock.length);
if (retval && retval != KRB5_KDB_DBNOTINITED) {
krb5_error_code retval;
int nentries;
krb5_boolean more;
- register krb5_cryptosystem_entry *csentry;
krb5_data pwd, scratch;
- csentry = master_encblock.crypto_entry;
-
if (retval = krb5_db_set_name(test_context, dbname)) {
com_err(pname, retval, "while setting active database to '%s'",
dbname);
return(1);
}
- if (retval = (*csentry->process_key)(&master_encblock,
- &master_keyblock)) {
+ if (retval = krb5_process_key(test_context,
+ &master_encblock, &master_keyblock)) {
com_err(pname, retval, "while processing master key");
(void) krb5_db_fini(test_context);
return(1);
}
- if (retval = (*csentry->init_random_key)(&master_keyblock,
- &master_random)) {
+ if (retval = krb5_init_random_key(test_context,
+ &master_encblock, &master_keyblock,
+ &master_random)) {
com_err(pname, retval, "while initializing random key generator");
- (void) (*csentry->finish_key)(&master_encblock);
+ krb5_finish_key(test_context, &master_encblock);
(void) krb5_db_fini(test_context);
return(1);
}
+Thu May 2 21:16:40 1996 Richard Basch <basch@lehman.com>
+
+ * kdb5_verify.c: fixed various abstraction violations where the
+ code "knew" the cryptosystem_entry structure
+
Sat Dec 23 01:05:33 1995 <tytso@rsts-11.mit.edu>
* configure.in (withval): Add check for DBM/db libraries.
krb5_error_code retval;
char *dbname = 0;
int enctypedone = 0;
- register krb5_cryptosystem_entry *csentry;
int num_to_check;
char principal_string[BUFSIZ];
char *suffix = 0;
}
krb5_use_enctype(context, &master_encblock, master_keyblock.enctype);
- csentry = master_encblock.crypto_entry;
if (!dbname)
dbname = DEFAULT_KDB_FILE; /* XXX? */
else
fprintf(stdout, "\nNo errors.\n");
- (void) (*csentry->finish_key)(&master_encblock);
- (void) (*csentry->finish_random_key)(&master_random);
+ krb5_finish_random_key(context, &master_encblock, &master_random);
+ krb5_finish_key(context, &master_encblock);
+
retval = krb5_db_fini(context);
memset((char *)master_keyblock.contents, 0, master_keyblock.length);
if (retval && retval != KRB5_KDB_DBNOTINITED) {
krb5_error_code retval;
int nentries;
krb5_boolean more;
- register krb5_cryptosystem_entry *csentry;
krb5_data pwd, scratch;
- csentry = master_encblock.crypto_entry;
-
if (retval = krb5_db_set_name(context, dbname)) {
com_err(pname, retval, "while setting active database to '%s'",
dbname);
return(1);
}
- if (retval = (*csentry->process_key)(&master_encblock,
- &master_keyblock)) {
+ if (retval = krb5_process_key(context,
+ &master_encblock, &master_keyblock)) {
com_err(pname, retval, "while processing master key");
(void) krb5_db_fini(context);
return(1);
}
- if (retval = (*csentry->init_random_key)(&master_keyblock,
- &master_random)) {
+ if (retval = krb5_init_random_key(context,
+ &master_encblock, &master_keyblock,
+ &master_random)) {
com_err(pname, retval, "while initializing random key generator");
- (void) (*csentry->finish_key)(&master_encblock);
+ krb5_finish_key(context, &master_encblock);
(void) krb5_db_fini(context);
return(1);
}