Move the implementations of four deprecated crypto functions to
authorGreg Hudson <ghudson@mit.edu>
Sun, 1 Nov 2009 02:47:58 +0000 (02:47 +0000)
committerGreg Hudson <ghudson@mit.edu>
Sun, 1 Nov 2009 02:47:58 +0000 (02:47 +0000)
old_api_glue.c.  Move the prototypes of seven deprecated crypto
functions to old_api_glue.c instead of k5-int.h, since we don't use
those functions internally.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23112 dc483132-0cff-0310-8789-dd5450dbe970

src/include/k5-int.h
src/lib/crypto/krb/coll_proof_cksum.c
src/lib/crypto/krb/keyed_cksum.c
src/lib/crypto/krb/old_api_glue.c
src/lib/crypto/krb/valid_cksumtype.c
src/lib/crypto/krb/valid_enctype.c

index c583efd1f668e7b0afef27875be051979b1802c7..2bdcbf6becc673855a45804e24bd0ec2c5bfabcd 100644 (file)
@@ -2574,29 +2574,6 @@ krb5_error_code KRB5_CALLCONV krb5int_clean_hostname
                char *,
                size_t);
 
-/* Use the above four instead.  */
-krb5_boolean KRB5_CALLCONV valid_enctype
-       (krb5_enctype ktype);
-krb5_boolean KRB5_CALLCONV valid_cksumtype
-       (krb5_cksumtype ctype);
-krb5_boolean KRB5_CALLCONV is_coll_proof_cksum
-       (krb5_cksumtype ctype);
-krb5_boolean KRB5_CALLCONV is_keyed_cksum
-       (krb5_cksumtype ctype);
-
-krb5_error_code KRB5_CALLCONV krb5_random_confounder
-       (size_t, krb5_pointer);
-
-krb5_error_code krb5_encrypt_data
-       (krb5_context context, krb5_keyblock *key,
-               krb5_pointer ivec, krb5_data *data,
-               krb5_enc_data *enc_data);
-
-krb5_error_code krb5_decrypt_data
-       (krb5_context context, krb5_keyblock *key,
-               krb5_pointer ivec, krb5_enc_data *data,
-               krb5_data *enc_data);
-
 krb5_error_code
 krb5int_aes_encrypt(krb5_key key, const krb5_data *ivec,
                    const krb5_data *input, krb5_data *output);
index e5d7ed13c33881e1d0f4ab97b54e2f80682262c5..a6226ba84f57701569209c9d7f47a86ec7d8e697 100644 (file)
@@ -42,9 +42,3 @@ krb5_c_is_coll_proof_cksum(krb5_cksumtype ctype)
        old code would have done */
     return FALSE;
 }
-
-krb5_boolean KRB5_CALLCONV
-is_coll_proof_cksum(krb5_cksumtype ctype)
-{
-    return krb5_c_is_coll_proof_cksum(ctype);
-}
index 97292769b2ef2f42bc0c90cf283bac7f0c8a9e4b..ac49ef6d0472f1e10230bdfe4a172989e7eff696 100644 (file)
@@ -44,9 +44,3 @@ krb5_c_is_keyed_cksum(krb5_cksumtype ctype)
     /* Invalid ctype.  This is misleading, but better than dumping core. */
     return FALSE;
 }
-
-krb5_boolean KRB5_CALLCONV
-is_keyed_cksum(krb5_cksumtype ctype)
-{
-    return krb5_c_is_keyed_cksum(ctype);
-}
index 73f4fd7b25a04c3bd5162d5d25ce810821036f7c..c4ee596a5d1f647e0c539a6bb5ad7f8bfa95c4d1 100644 (file)
 
 #include "k5-int.h"
 
+/*
+ * The following functions were removed from the API in krb5 1.3 but
+ * still need to be exported for ABI compatibility.  The other
+ * functions defined in this file are still in the API (and thus
+ * prototyped in krb5.hin) but are deprecated.
+ */
+krb5_boolean KRB5_CALLCONV valid_enctype(krb5_enctype ktype);
+krb5_boolean KRB5_CALLCONV valid_cksumtype(krb5_cksumtype ctype);
+krb5_boolean KRB5_CALLCONV is_coll_proof_cksum(krb5_cksumtype ctype);
+krb5_boolean KRB5_CALLCONV is_keyed_cksum(krb5_cksumtype ctype);
+krb5_error_code KRB5_CALLCONV krb5_random_confounder(size_t, krb5_pointer);
+krb5_error_code krb5_encrypt_data(krb5_context context, krb5_keyblock *key,
+                                 krb5_pointer ivec, krb5_data *data,
+                                 krb5_enc_data *enc_data);
+krb5_error_code krb5_decrypt_data(krb5_context context, krb5_keyblock *key,
+                                 krb5_pointer ivec, krb5_enc_data *data,
+                                 krb5_data *enc_data);
+
 krb5_error_code KRB5_CALLCONV
 krb5_encrypt(krb5_context context, krb5_const_pointer inptr,
             krb5_pointer outptr, size_t size, krb5_encrypt_block *eblock,
@@ -341,3 +359,27 @@ krb5_error_code krb5_decrypt_data(krb5_context context, krb5_keyblock *key,
 
     return 0;
 }
+
+krb5_boolean KRB5_CALLCONV
+valid_cksumtype(krb5_cksumtype ctype)
+{
+    return krb5_c_valid_cksumtype(ctype);
+}
+
+krb5_boolean KRB5_CALLCONV
+is_keyed_cksum(krb5_cksumtype ctype)
+{
+    return krb5_c_is_keyed_cksum(ctype);
+}
+
+krb5_boolean KRB5_CALLCONV
+is_coll_proof_cksum(krb5_cksumtype ctype)
+{
+    return krb5_c_is_coll_proof_cksum(ctype);
+}
+
+krb5_boolean KRB5_CALLCONV
+valid_enctype(krb5_enctype etype)
+{
+    return krb5_c_valid_enctype(etype);
+}
index 69cc186677c76298caa55ea708a9f142e48b793f..2b1e7228c293feda495a45f2a5a0ab4945b79296 100644 (file)
@@ -39,9 +39,3 @@ krb5_c_valid_cksumtype(krb5_cksumtype ctype)
 
     return FALSE;
 }
-
-krb5_boolean KRB5_CALLCONV
-valid_cksumtype(krb5_cksumtype ctype)
-{
-    return krb5_c_valid_cksumtype(ctype);
-}
index a6445111ed64c855c9e9cbfb3c061a0bea43ad9a..e6fcb2eaada9812b1fa2aaecbbe9a5ecd5722124 100644 (file)
@@ -33,12 +33,6 @@ krb5_c_valid_enctype(krb5_enctype etype)
     return (find_enctype(etype) != NULL);
 }
 
-krb5_boolean KRB5_CALLCONV
-valid_enctype(krb5_enctype etype)
-{
-    return krb5_c_valid_enctype(etype);
-}
-
 krb5_boolean KRB5_CALLCONV
 krb5int_c_weak_enctype(krb5_enctype etype)
 {