diff options
author | Ezra Peisach <epeisach@mit.edu> | 1995-09-12 16:43:27 +0000 |
---|---|---|
committer | Ezra Peisach <epeisach@mit.edu> | 1995-09-12 16:43:27 +0000 |
commit | 88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0 (patch) | |
tree | 22fbd2670986bdd23c988858f9baa0af2fe25515 /src/lib/krb5/krb/decrypt_tk.c | |
parent | 43ce6c50a83b8550ed083a7362fa9528e50d2fc0 (diff) | |
download | krb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.zip krb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.tar.gz krb5-88ebe65e3ecce63cf5bcc86804d9c53ace1efcb0.tar.bz2 |
Reintegrate Macintosh changes
t_ser.c: Work around an optimizer bug in gcc under OSF/1 2.1.
The timeofday calls were left in the stage as described in the ChangeLog
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6766 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/krb5/krb/decrypt_tk.c')
-rw-r--r-- | src/lib/krb5/krb/decrypt_tk.c | 17 |
1 files changed, 7 insertions, 10 deletions
diff --git a/src/lib/krb5/krb/decrypt_tk.c b/src/lib/krb5/krb/decrypt_tk.c index 3777ffa..f8850b1 100644 --- a/src/lib/krb5/krb/decrypt_tk.c +++ b/src/lib/krb5/krb/decrypt_tk.c @@ -46,29 +46,27 @@ krb5_decrypt_tkt_part(context, srv_key, ticket) krb5_data scratch; krb5_error_code retval; - if (!valid_etype(ticket->enc_part.etype)) + if (!valid_enctype(ticket->enc_part.enctype)) return KRB5_PROG_ETYPE_NOSUPP; /* put together an eblock for this encryption */ - - krb5_use_cstype(context, &eblock, ticket->enc_part.etype); + krb5_use_enctype(context, &eblock, ticket->enc_part.enctype); scratch.length = ticket->enc_part.ciphertext.length; if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) return(ENOMEM); /* do any necessary key pre-processing */ - retval = krb5_process_key(context, &eblock, srv_key); - if (retval) { + if (retval = krb5_process_key(context, &eblock, srv_key)) { free(scratch.data); return(retval); } /* call the encryption routine */ - retval = krb5_decrypt(context, (krb5_pointer) ticket->enc_part.ciphertext.data, - (krb5_pointer) scratch.data, - scratch.length, &eblock, 0); - if (retval) { + if (retval = krb5_decrypt(context, + (krb5_pointer) ticket->enc_part.ciphertext.data, + (krb5_pointer) scratch.data, scratch.length, + &eblock, 0)) { (void) krb5_finish_key(context, &eblock); free(scratch.data); return retval; @@ -87,6 +85,5 @@ free(scratch.data);} ticket->enc_part2 = dec_tkt_part; } clean_scratch(); - ticket->enc_part2->session->etype = ticket->enc_part.etype; return retval; } |