summaryrefslogtreecommitdiff
path: root/source4/torture/auth
diff options
context:
space:
mode:
authorAlexander Bokovoy <ab@samba.org>2012-05-02 21:40:13 +0300
committerSimo Sorce <idra@samba.org>2012-05-04 16:51:29 +0200
commit21d383d04f21755418c755139824cfe7234ff474 (patch)
tree04109edfbf95392ec96160c977928aeaeac6ac0b /source4/torture/auth
parent4875a12ab840c413b68040503333ca2ecd78db98 (diff)
downloadsamba-21d383d04f21755418c755139824cfe7234ff474.tar.gz
s4:torture: auth/pac.c: use Kerberos wrapper for krb5_keyblock_init
Signed-off-by: Simo Sorce <idra@samba.org>
Diffstat (limited to 'source4/torture/auth')
-rw-r--r--source4/torture/auth/pac.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/source4/torture/auth/pac.c b/source4/torture/auth/pac.c
index 827864242cb..64a843c07fc 100644
--- a/source4/torture/auth/pac.c
+++ b/source4/torture/auth/pac.c
@@ -68,7 +68,7 @@ static bool torture_pac_self_check(struct torture_context *tctx)
generate_random_buffer(server_bytes, 16);
generate_random_buffer(krbtgt_bytes, 16);
- ret = krb5_keyblock_init(smb_krb5_context->krb5_context,
+ ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context,
ENCTYPE_ARCFOUR_HMAC,
server_bytes, sizeof(server_bytes),
&server_keyblock);
@@ -77,7 +77,7 @@ static bool torture_pac_self_check(struct torture_context *tctx)
smb_get_krb5_error_message(smb_krb5_context->krb5_context,
ret, mem_ctx)));
- ret = krb5_keyblock_init(smb_krb5_context->krb5_context,
+ ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context,
ENCTYPE_ARCFOUR_HMAC,
krbtgt_bytes, sizeof(krbtgt_bytes),
&krbtgt_keyblock);
@@ -348,7 +348,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx)
torture_fail(tctx, "(saved test) Could not interpret krbsrv key");
}
- ret = krb5_keyblock_init(smb_krb5_context->krb5_context,
+ ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context,
ENCTYPE_ARCFOUR_HMAC,
krbsrv_bytes->hash, sizeof(krbsrv_bytes->hash),
&server_keyblock);
@@ -359,7 +359,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx)
ret, mem_ctx)));
if (krbtgt_bytes) {
- ret = krb5_keyblock_init(smb_krb5_context->krb5_context,
+ ret = smb_krb5_keyblock_init_contents(smb_krb5_context->krb5_context,
ENCTYPE_ARCFOUR_HMAC,
krbtgt_bytes->hash, sizeof(krbtgt_bytes->hash),
&krbtgt_keyblock);