aboutsummaryrefslogtreecommitdiff
path: root/src/lib/krb5/krb/decrypt_tk.c
diff options
context:
space:
mode:
authorEzra Peisach <epeisach@mit.edu>1995-09-12 16:43:27 +0000
committerEzra Peisach <epeisach@mit.edu>1995-09-12 16:43:27 +0000
commit88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0 (patch)
tree22fbd2670986bdd23c988858f9baa0af2fe25515 /src/lib/krb5/krb/decrypt_tk.c
parent43ce6c50a83b8550ed083a7362fa9528e50d2fc0 (diff)
downloadkrb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.zip
krb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.tar.gz
krb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.tar.bz2
Reintegrate Macintosh changes
t_ser.c: Work around an optimizer bug in gcc under OSF/1 2.1. The timeofday calls were left in the stage as described in the ChangeLog git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6766 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/krb5/krb/decrypt_tk.c')
-rw-r--r--src/lib/krb5/krb/decrypt_tk.c17
1 files changed, 7 insertions, 10 deletions
diff --git a/src/lib/krb5/krb/decrypt_tk.c b/src/lib/krb5/krb/decrypt_tk.c
index 3777ffa..f8850b1 100644
--- a/src/lib/krb5/krb/decrypt_tk.c
+++ b/src/lib/krb5/krb/decrypt_tk.c
@@ -46,29 +46,27 @@ krb5_decrypt_tkt_part(context, srv_key, ticket)
krb5_data scratch;
krb5_error_code retval;
- if (!valid_etype(ticket->enc_part.etype))
+ if (!valid_enctype(ticket->enc_part.enctype))
return KRB5_PROG_ETYPE_NOSUPP;
/* put together an eblock for this encryption */
-
- krb5_use_cstype(context, &eblock, ticket->enc_part.etype);
+ krb5_use_enctype(context, &eblock, ticket->enc_part.enctype);
scratch.length = ticket->enc_part.ciphertext.length;
if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
return(ENOMEM);
/* do any necessary key pre-processing */
- retval = krb5_process_key(context, &eblock, srv_key);
- if (retval) {
+ if (retval = krb5_process_key(context, &eblock, srv_key)) {
free(scratch.data);
return(retval);
}
/* call the encryption routine */
- retval = krb5_decrypt(context, (krb5_pointer) ticket->enc_part.ciphertext.data,
- (krb5_pointer) scratch.data,
- scratch.length, &eblock, 0);
- if (retval) {
+ if (retval = krb5_decrypt(context,
+ (krb5_pointer) ticket->enc_part.ciphertext.data,
+ (krb5_pointer) scratch.data, scratch.length,
+ &eblock, 0)) {
(void) krb5_finish_key(context, &eblock);
free(scratch.data);
return retval;
@@ -87,6 +85,5 @@ free(scratch.data);}
ticket->enc_part2 = dec_tkt_part;
}
clean_scratch();
- ticket->enc_part2->session->etype = ticket->enc_part.etype;
return retval;
}