changes for new encryption interface
authorJohn Kohl <jtkohl@mit.edu>
Wed, 9 May 1990 17:11:51 +0000 (17:11 +0000)
committerJohn Kohl <jtkohl@mit.edu>
Wed, 9 May 1990 17:11:51 +0000 (17:11 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@815 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/kdb/decrypt_key.c
src/lib/kdb/encrypt_key.c
src/lib/krb5/krb/decrypt_tk.c
src/lib/krb5/krb/encode_kdc.c
src/lib/krb5/krb/encrypt_tk.c
src/lib/krb5/krb/kdc_rep_dc.c
src/lib/krb5/krb/mk_req_ext.c

index b8b69f798c6f391b3ea59d6caace6e2af23ff87d..683c34bedb065fb8cf6994962f7157323d30e0fc 100644 (file)
@@ -59,7 +59,7 @@ krb5_keyblock *out;
                  decrypt_func)((krb5_pointer) (((char *) in->contents) +
                                                sizeof(in->length)),
                                (krb5_pointer) out->contents,
-                               in->length-sizeof(in->length), eblock)) {
+                               in->length-sizeof(in->length), eblock, 0)) {
        free((char *)out->contents);
        out->contents = 0;
        out->length = 0;
index 4a7747a960d2d6521f4a35e049b739ff10bc418b..929c7c061ff4a0edc87e79158e79868f4451e0fd 100644 (file)
@@ -54,7 +54,7 @@ krb5_keyblock *out;
                  encrypt_func)((krb5_pointer) in->contents,
                                (krb5_pointer) (((char *) out->contents) +
                                                sizeof(out->length)),
-                               in->length, eblock)) {
+                               in->length, eblock, 0)) {
        free((char *)out->contents);
        out->contents = 0;
        out->length = 0;
index 513f407b5428fa631abaa2b6cd5fc00f284347d5..451a7598ca43cdbf6e8bf82a60d0f4d94a9a7b01 100644 (file)
@@ -65,7 +65,7 @@ register krb5_ticket *ticket;
     if (retval =
        (*eblock.crypto_entry->decrypt_func)((krb5_pointer) ticket->enc_part.data,
                                             (krb5_pointer) scratch.data,
-                                            scratch.length, &eblock)) {
+                                            scratch.length, &eblock, 0)) {
        (void) (*eblock.crypto_entry->finish_key)(&eblock);
        free(scratch.data);
        return retval;
index 63266a602ac33528e89e54a5a73124cc161ffe04..89cd913b2a52d4b8c51bbce8b38e59abb8b117c8 100644 (file)
@@ -91,7 +91,7 @@ OLDDECLARG(krb5_data **, enc_rep)
     if (retval =
        (*eblock.crypto_entry->encrypt_func)((krb5_pointer) scratch->data,
                                             (krb5_pointer) dec_rep->enc_part.data,
-                                            scratch->length, &eblock)) {
+                                            scratch->length, &eblock, 0)) {
        goto clean_prockey;
     }
 
index 7c9865979e360a6043d4ae8f39a0d7e02b18bba7..813afe810b3af97574aba1761a8d55e0a379e1ba 100644 (file)
@@ -80,7 +80,7 @@ register krb5_ticket *dec_ticket;
     if (retval =
        (*eblock.crypto_entry->encrypt_func)((krb5_pointer) scratch->data,
                                             (krb5_pointer) dec_ticket->enc_part.data,
-                                            scratch->length, &eblock)) {
+                                            scratch->length, &eblock, 0)) {
        goto clean_prockey;
     }
 
index 74299f72dbf811d5c114c7c69aaee1dee7bb2940..a235fb3836f4716504f3c6736d0388d0ce6198f3 100644 (file)
@@ -66,7 +66,7 @@ OLDDECLARG(krb5_kdc_rep *, dec_rep)
     if (retval =
        (*eblock.crypto_entry->decrypt_func)((krb5_pointer) dec_rep->enc_part.data,
                                             (krb5_pointer) scratch.data,
-                                            scratch.length, &eblock)) {
+                                            scratch.length, &eblock, 0)) {
        (void) (*eblock.crypto_entry->finish_key)(&eblock);
        free(scratch.data);
        return retval;
index 3108e7611b7b2d2d4a82a51ddc2c1678cd8a6092..d65f529146474592112896387f5bdf5d57d3cf5d 100644 (file)
@@ -142,7 +142,7 @@ krb5_data *outbuf;
     if (retval =
        (*eblock.crypto_entry->encrypt_func)((krb5_pointer) scratch->data,
                                             (krb5_pointer) request.authenticator.data,
-                                            scratch->length, &eblock)) {
+                                            scratch->length, &eblock, 0)) {
        goto clean_prockey;
     }