adapt to rename of oid_cmp to heim_oid_cmp
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@13399 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -346,7 +346,7 @@ get_dh_param(krb5_context context, SubjectPublicKeyInfo *dh_key_info,
|
||||
|
||||
memset(&dhparam, 0, sizeof(dhparam));
|
||||
|
||||
if (oid_cmp(&dh_key_info->algorithm.algorithm, &heim_dhpublicnumber_oid)) {
|
||||
if (heim_oid_cmp(&dh_key_info->algorithm.algorithm, &heim_dhpublicnumber_oid)) {
|
||||
krb5_set_error_string(context,
|
||||
"PKINIT invalid oid in clientPublicValue");
|
||||
return KRB5_BADMSGTYPE;
|
||||
@@ -468,7 +468,7 @@ pk_rd_padata(krb5_context context,
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (oid_cmp(&r.signedAuthPack.contentType, &pkcs7_signed_oid)) {
|
||||
if (heim_oid_cmp(&r.signedAuthPack.contentType, &pkcs7_signed_oid)) {
|
||||
krb5_set_error_string(context, "PK-AS-REQ invalid content type oid");
|
||||
ret = KRB5KRB_ERR_GENERIC;
|
||||
goto out;
|
||||
@@ -491,7 +491,7 @@ pk_rd_padata(krb5_context context,
|
||||
goto out;
|
||||
|
||||
/* Signature is correct, now verify the signed message */
|
||||
if (oid_cmp(&eContentType, &heim_pkauthdata_oid)) {
|
||||
if (heim_oid_cmp(&eContentType, &heim_pkauthdata_oid)) {
|
||||
krb5_set_error_string(context, "got wrong oid for pkauthdata");
|
||||
ret = KRB5_BADMSGTYPE;
|
||||
goto out;
|
||||
|
@@ -1041,13 +1041,13 @@ _krb5_pk_verify_sign(krb5_context context,
|
||||
public_key = X509_get_pubkey(cert);
|
||||
|
||||
/* verify signature */
|
||||
if (oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
if (heim_oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
&heim_sha1WithRSAEncryption_oid) == 0)
|
||||
evp_type = EVP_sha1();
|
||||
else if (oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
else if (heim_oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
&heim_md5WithRSAEncryption_oid) == 0)
|
||||
evp_type = EVP_md5();
|
||||
else if (oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
else if (heim_oid_cmp(&signer_info->digestAlgorithm.algorithm,
|
||||
&heim_sha1_oid) == 0)
|
||||
evp_type = EVP_sha1();
|
||||
else {
|
||||
@@ -1118,7 +1118,7 @@ get_reply_key(krb5_context context,
|
||||
krb5_error_code ret;
|
||||
size_t size;
|
||||
|
||||
if (oid_cmp(eContentType, &heim_pkrkeydata_oid) != 0) {
|
||||
if (heim_oid_cmp(eContentType, &heim_pkrkeydata_oid) != 0) {
|
||||
krb5_set_error_string(context, "PKINIT, reply key, wrong oid");
|
||||
return KRB5KRB_AP_ERR_MSG_TYPE;
|
||||
}
|
||||
@@ -1194,7 +1194,7 @@ pk_rd_pa_reply_enckey(krb5_context context,
|
||||
|
||||
user_cert = sk_X509_value(ctx->id->cert, 0);
|
||||
|
||||
if (oid_cmp(&pkcs7_enveloped_oid, &rep->contentType)) {
|
||||
if (heim_oid_cmp(&pkcs7_enveloped_oid, &rep->contentType)) {
|
||||
krb5_set_error_string(context, "Invalid content type");
|
||||
return EINVAL;
|
||||
}
|
||||
@@ -1230,7 +1230,7 @@ pk_rd_pa_reply_enckey(krb5_context context,
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (oid_cmp(&heim_rsaEncryption_oid,
|
||||
if (heim_oid_cmp(&heim_rsaEncryption_oid,
|
||||
&ri->keyEncryptionAlgorithm.algorithm)) {
|
||||
krb5_set_error_string(context, "Invalid content type");
|
||||
return EINVAL;
|
||||
@@ -1244,19 +1244,19 @@ pk_rd_pa_reply_enckey(krb5_context context,
|
||||
|
||||
/* verify content type */
|
||||
if (context->pkinit_flags & KRB5_PKINIT_WIN2K) {
|
||||
if (oid_cmp(&ed.encryptedContentInfo.contentType, &pkcs7_data_oid)) {
|
||||
if (heim_oid_cmp(&ed.encryptedContentInfo.contentType, &pkcs7_data_oid)) {
|
||||
ret = KRB5KRB_AP_ERR_MSG_TYPE;
|
||||
goto out;
|
||||
}
|
||||
} else {
|
||||
if (oid_cmp(&ed.encryptedContentInfo.contentType, &pkcs7_signed_oid)) {
|
||||
if (heim_oid_cmp(&ed.encryptedContentInfo.contentType, &pkcs7_signed_oid)) {
|
||||
ret = KRB5KRB_AP_ERR_MSG_TYPE;
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (oid_cmp(&ed.encryptedContentInfo.contentEncryptionAlgorithm.algorithm,
|
||||
if (heim_oid_cmp(&ed.encryptedContentInfo.contentEncryptionAlgorithm.algorithm,
|
||||
&heim_des_ede3_cbc_oid) == 0) {
|
||||
/* use des-ede3-cbc */
|
||||
heim_octet_string encryptedContent;
|
||||
@@ -1318,7 +1318,7 @@ pk_rd_pa_reply_enckey(krb5_context context,
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (oid_cmp(&ci.contentType, &pkcs7_signed_oid) == 0) {
|
||||
if (heim_oid_cmp(&ci.contentType, &pkcs7_signed_oid) == 0) {
|
||||
ret = EINVAL; /* XXX */
|
||||
krb5_set_error_string(context, "Invalid content type");
|
||||
goto out;
|
||||
@@ -1384,7 +1384,7 @@ pk_rd_pa_reply_dh(krb5_context context,
|
||||
krb5_data_zero(&eContent);
|
||||
memset(&kdc_dh_info, 0, sizeof(kdc_dh_info));
|
||||
|
||||
if (oid_cmp(&pkcs7_signed_oid, &rep->contentType)) {
|
||||
if (heim_oid_cmp(&pkcs7_signed_oid, &rep->contentType)) {
|
||||
krb5_set_error_string(context, "Invalid content type");
|
||||
return EINVAL;
|
||||
}
|
||||
@@ -1409,7 +1409,7 @@ pk_rd_pa_reply_dh(krb5_context context,
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
if (oid_cmp(&eContentType, &heim_pkdhkeydata_oid)) {
|
||||
if (heim_oid_cmp(&eContentType, &heim_pkdhkeydata_oid)) {
|
||||
ret = KRB5KRB_AP_ERR_MSG_TYPE; /* XXX */
|
||||
goto out;
|
||||
}
|
||||
|
Reference in New Issue
Block a user