/* put together an eblock for this encryption */
- eblock.crypto_entry = krb5_csarray[dec_rep->enc_part.etype]->system;
+ krb5_use_cstype(&eblock, dec_rep->enc_part.etype);
dec_rep->enc_part.ciphertext.length =
krb5_encrypt_size(scratch->length, eblock.crypto_entry);
/* add padding area, and zero it */
}
if (!(ap_checksum.contents = (krb5_octet *)
- malloc(krb5_cksumarray[sumtype]->checksum_length))) {
+ malloc(krb5_checsum_size(sumtype)))) {
if (sec_ticket)
krb5_free_ticket(sec_ticket);
krb5_free_data(scratch);
return ENOMEM;
}
- if (retval = (*(krb5_cksumarray[sumtype]->
- sum_func))(scratch->data,
- scratch->length,
- (krb5_pointer) usecred->keyblock.contents,
- usecred->keyblock.length,
- &ap_checksum)) {
+ if (retval = krb5_calculate_checksum(sumtype,
+ scratch->data,
+ scratch->length,
+ (krb5_pointer) usecred->keyblock.contents,
+ usecred->keyblock.length,
+ &ap_checksum)) {
if (sec_ticket)
krb5_free_ticket(sec_ticket);
xfree(ap_checksum.contents);