svn rev #22858: branches/enc-perf/src/lib/crypto/crypto_tests/

ghudson@MIT.EDU ghudson at MIT.EDU
Tue Oct 6 12:11:31 EDT 2009


http://src.mit.edu/fisheye/changelog/krb5/?cs=22858
Commit By: ghudson
Log Message:
Adjust test programs to match new internal interfaces using krb5_key.



Changed Files:
U   branches/enc-perf/src/lib/crypto/crypto_tests/aes-test.c
U   branches/enc-perf/src/lib/crypto/crypto_tests/t_cksum.c
U   branches/enc-perf/src/lib/crypto/crypto_tests/t_hmac.c
Modified: branches/enc-perf/src/lib/crypto/crypto_tests/aes-test.c
===================================================================
--- branches/enc-perf/src/lib/crypto/crypto_tests/aes-test.c	2009-10-06 15:54:50 UTC (rev 22857)
+++ branches/enc-perf/src/lib/crypto/crypto_tests/aes-test.c	2009-10-06 16:11:31 UTC (rev 22858)
@@ -50,7 +50,11 @@
 }
 static void enc()
 {
-    krb5int_aes_encrypt(&enc_key, &ivec, &in, &out);
+    krb5_key key;
+
+    krb5_k_create_key(NULL, &enc_key, &key);
+    krb5int_aes_encrypt(key, &ivec, &in, &out);
+    krb5_k_free_key(NULL, key);
 }
 
 static void hexdump(const char *label, const char *cp, int len)

Modified: branches/enc-perf/src/lib/crypto/crypto_tests/t_cksum.c
===================================================================
--- branches/enc-perf/src/lib/crypto/crypto_tests/t_cksum.c	2009-10-06 15:54:50 UTC (rev 22857)
+++ branches/enc-perf/src/lib/crypto/crypto_tests/t_cksum.c	2009-10-06 16:11:31 UTC (rev 22858)
@@ -75,6 +75,7 @@
   krb5_boolean		valid;
   size_t		length;
   krb5_keyblock		keyblock;
+  krb5_key		key;
   krb5_error_code	kret=0;
   krb5_data		plaintext, newstyle_checksum;
 
@@ -89,6 +90,8 @@
   keyblock.length = sizeof(testkey);
   keyblock.contents = testkey;
 
+  krb5_k_create_key(NULL, &keyblock, &key);
+
   length = khp.hashsize;
 
   newstyle_checksum.length = length;
@@ -102,13 +105,13 @@
     plaintext.length = strlen(argv[msgindex]);
     plaintext.data = argv[msgindex];
 
-    if ((kret = (*(khp.hash))(&keyblock, 0, 0, &plaintext, &newstyle_checksum))) {
+    if ((kret = (*(khp.hash))(key, 0, 0, &plaintext, &newstyle_checksum))) {
       printf("krb5_calculate_checksum choked with %d\n", kret);
       break;
     }
     print_checksum("correct", MD, argv[msgindex], &newstyle_checksum);
 
-    if ((kret = (*(khp.verify))(&keyblock, 0, 0, &plaintext, &newstyle_checksum,
+    if ((kret = (*(khp.verify))(key, 0, 0, &plaintext, &newstyle_checksum,
 				&valid))) {
       printf("verify on new checksum choked with %d\n", kret);
       break;
@@ -120,7 +123,7 @@
     printf("Verify succeeded for \"%s\"\n", argv[msgindex]);
 
     newstyle_checksum.data[0]++;
-    if ((kret = (*(khp.verify))(&keyblock, 0, 0, &plaintext, &newstyle_checksum,
+    if ((kret = (*(khp.verify))(key, 0, 0, &plaintext, &newstyle_checksum,
 				&valid))) {
       printf("verify on new checksum choked with %d\n", kret);
       break;

Modified: branches/enc-perf/src/lib/crypto/crypto_tests/t_hmac.c
===================================================================
--- branches/enc-perf/src/lib/crypto/crypto_tests/t_hmac.c	2009-10-06 15:54:50 UTC (rev 22857)
+++ branches/enc-perf/src/lib/crypto/crypto_tests/t_hmac.c	2009-10-06 16:11:31 UTC (rev 22858)
@@ -98,6 +98,7 @@
     char tmp[40];
     size_t blocksize, hashsize;
     krb5_error_code err;
+    krb5_key k;
 
     printk(" test key", key);
     blocksize = h->blocksize;
@@ -120,7 +121,9 @@
 	printk(" pre-hashed key", key);
     }
     printd(" hmac input", in);
-    err = krb5_hmac(h, key, 1, in, out);
+    krb5_k_create_key(NULL, key, &k);
+    err = krb5_hmac(h, k, 1, in, out);
+    krb5_k_free_key(NULL, k);
     if (err == 0)
 	printd(" hmac output", out);
     return err;




More information about the cvs-krb5 mailing list