/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[ticket->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, ticket->enc_part.etype);
scratch.length = ticket->enc_part.ciphertext.length;
if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[dec_ticket->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, dec_ticket->enc_part.etype);
dec_ticket->enc_part.ciphertext.length =
krb5_encrypt_size(scratch->length,
eblock.crypto_entry);
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[dec_rep->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, dec_rep->enc_part.etype);
/* do any necessary key pre-processing */
if (retval = krb5_process_key(&eblock, key)) {
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[etype]->system;
+ krb5_use_cstype(&eblock, etype);
privmsg.enc_part.ciphertext.length = krb5_encrypt_size(scratch->length,
eblock.crypto_entry);
/* add padding area, and zero it */
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[etype]->system;
+ krb5_use_cstype(&eblock, etype);
reply.enc_part.etype = etype;
reply.enc_part.kvno = 0; /* XXX user set? */
/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[etype]->system;
+ krb5_use_cstype(&eblock, etype);
request.authenticator.etype = etype;
request.authenticator.kvno = 0; /* XXX user set? */
request.authenticator.ciphertext.length =
/* put together an eblock for this decryption */
- eblock.crypto_entry = krb5_csarray[privmsg->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, privmsg->enc_part.etype);
scratch.length = privmsg->enc_part.ciphertext.length;
if (!(scratch.data = malloc(scratch.length))) {
krb5_free_ap_rep(reply);
return KRB5_PROG_ETYPE_NOSUPP;
}
- eblock.crypto_entry = krb5_csarray[reply->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, reply->enc_part.etype);
scratch.length = reply->enc_part.ciphertext.length;
if (!(scratch.data = malloc(scratch.length))) {
if (!valid_etype(request->authenticator.etype))
return KRB5_PROG_ETYPE_NOSUPP;
- eblock.crypto_entry = krb5_csarray[request->authenticator.etype]->system;
+ krb5_use_cstype(&eblock, request->authenticator.etype);
scratch.length = request->authenticator.ciphertext.length;
if (!(scratch.data = malloc(scratch.length)))