diff options
author | Alexander Bokovoy <ab@samba.org> | 2012-05-02 21:40:13 +0300 |
---|---|---|
committer | Simo Sorce <idra@samba.org> | 2012-05-04 16:51:29 +0200 |
commit | 21d383d04f21755418c755139824cfe7234ff474 (patch) | |
tree | 04109edfbf95392ec96160c977928aeaeac6ac0b | |
parent | 4875a12ab840c413b68040503333ca2ecd78db98 (diff) | |
download | samba-21d383d04f21755418c755139824cfe7234ff474.tar.gz samba-21d383d04f21755418c755139824cfe7234ff474.tar.bz2 samba-21d383d04f21755418c755139824cfe7234ff474.zip |
s4:torture: auth/pac.c: use Kerberos wrapper for krb5_keyblock_init
Signed-off-by: Simo Sorce <idra@samba.org>
-rw-r--r-- | source4/torture/auth/pac.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/source4/torture/auth/pac.c b/source4/torture/auth/pac.c index 827864242c..64a843c07f 100644 --- a/source4/torture/auth/pac.c +++ b/source4/torture/auth/pac.c @@ -68,7 +68,7 @@ static bool torture_pac_self_check(struct torture_context *tctx) generate_random_buffer(server_bytes, 16); generate_random_buffer(krbtgt_bytes, 16); - ret = krb5_keyblock_init(smb_krb5_context->krb5_context, + ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context, ENCTYPE_ARCFOUR_HMAC, server_bytes, sizeof(server_bytes), &server_keyblock); @@ -77,7 +77,7 @@ static bool torture_pac_self_check(struct torture_context *tctx) smb_get_krb5_error_message(smb_krb5_context->krb5_context, ret, mem_ctx))); - ret = krb5_keyblock_init(smb_krb5_context->krb5_context, + ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context, ENCTYPE_ARCFOUR_HMAC, krbtgt_bytes, sizeof(krbtgt_bytes), &krbtgt_keyblock); @@ -348,7 +348,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx) torture_fail(tctx, "(saved test) Could not interpret krbsrv key"); } - ret = krb5_keyblock_init(smb_krb5_context->krb5_context, + ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context, ENCTYPE_ARCFOUR_HMAC, krbsrv_bytes->hash, sizeof(krbsrv_bytes->hash), &server_keyblock); @@ -359,7 +359,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx) ret, mem_ctx))); if (krbtgt_bytes) { - ret = krb5_keyblock_init(smb_krb5_context->krb5_context, + ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context, ENCTYPE_ARCFOUR_HMAC, krbtgt_bytes->hash, sizeof(krbtgt_bytes->hash), &krbtgt_keyblock); |