diff options
author | Andrew Bartlett <abartlet@samba.org> | 2011-10-18 21:27:39 +1100 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2011-10-21 08:43:23 +0200 |
commit | bd29f79463009ff7383cb17a3f766fddcdb1f302 (patch) | |
tree | 5caa60eb360bd3c3819cc03a7f17d02da8c10069 /source3/librpc/crypto | |
parent | 487545d48fc0625aab20aa8f46897e2bd622554f (diff) | |
download | samba-bd29f79463009ff7383cb17a3f766fddcdb1f302.tar.gz samba-bd29f79463009ff7383cb17a3f766fddcdb1f302.tar.bz2 samba-bd29f79463009ff7383cb17a3f766fddcdb1f302.zip |
s3-ntlmssp use gensec_{seal,unseal,sign,check}_packet
This avoids the indirection via the auth_ntlmsssp wrapper functions.
Andrew Bartlett
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Diffstat (limited to 'source3/librpc/crypto')
-rw-r--r-- | source3/librpc/crypto/cli_spnego.c | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/source3/librpc/crypto/cli_spnego.c b/source3/librpc/crypto/cli_spnego.c index db03fdc852..1320a95216 100644 --- a/source3/librpc/crypto/cli_spnego.c +++ b/source3/librpc/crypto/cli_spnego.c @@ -354,12 +354,12 @@ NTSTATUS spnego_sign(TALLOC_CTX *mem_ctx, sp_ctx->mech_ctx.gssapi_state, data, signature); case SPNEGO_NTLMSSP: - return auth_ntlmssp_sign_packet( - sp_ctx->mech_ctx.ntlmssp_state, - mem_ctx, - data->data, data->length, - full_data->data, full_data->length, - signature); + return gensec_sign_packet( + sp_ctx->mech_ctx.ntlmssp_state->gensec_security, + mem_ctx, + data->data, data->length, + full_data->data, full_data->length, + signature); default: return NT_STATUS_INVALID_PARAMETER; } @@ -376,11 +376,11 @@ NTSTATUS spnego_sigcheck(TALLOC_CTX *mem_ctx, sp_ctx->mech_ctx.gssapi_state, data, signature); case SPNEGO_NTLMSSP: - return auth_ntlmssp_check_packet( - sp_ctx->mech_ctx.ntlmssp_state, - data->data, data->length, - full_data->data, full_data->length, - signature); + return gensec_check_packet( + sp_ctx->mech_ctx.ntlmssp_state->gensec_security, + data->data, data->length, + full_data->data, full_data->length, + signature); default: return NT_STATUS_INVALID_PARAMETER; } @@ -397,12 +397,12 @@ NTSTATUS spnego_seal(TALLOC_CTX *mem_ctx, sp_ctx->mech_ctx.gssapi_state, data, signature); case SPNEGO_NTLMSSP: - return auth_ntlmssp_seal_packet( - sp_ctx->mech_ctx.ntlmssp_state, - mem_ctx, - data->data, data->length, - full_data->data, full_data->length, - signature); + return gensec_seal_packet( + sp_ctx->mech_ctx.ntlmssp_state->gensec_security, + mem_ctx, + data->data, data->length, + full_data->data, full_data->length, + signature); default: return NT_STATUS_INVALID_PARAMETER; } @@ -419,11 +419,11 @@ NTSTATUS spnego_unseal(TALLOC_CTX *mem_ctx, sp_ctx->mech_ctx.gssapi_state, data, signature); case SPNEGO_NTLMSSP: - return auth_ntlmssp_unseal_packet( - sp_ctx->mech_ctx.ntlmssp_state, - data->data, data->length, - full_data->data, full_data->length, - signature); + return gensec_unseal_packet( + sp_ctx->mech_ctx.ntlmssp_state->gensec_security, + data->data, data->length, + full_data->data, full_data->length, + signature); default: return NT_STATUS_INVALID_PARAMETER; } |