lib/krb5_wrap: remove unused create_kerberos_key_from_string_direct().
authorGünther Deschner <gd@samba.org>
Fri, 25 Apr 2014 12:15:48 +0000 (14:15 +0200)
committerAndrew Bartlett <abartlet@samba.org>
Fri, 8 Aug 2014 04:02:34 +0000 (06:02 +0200)
Guenther

Signed-off-by: Günther Deschner <gd@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Pair-Programmed-With: Andreas Schneider <asn@samba.org>

lib/krb5_wrap/krb5_samba.c
lib/krb5_wrap/krb5_samba.h

index b668716d8e0233ad6d022ed74dc4c2b03d2d09ac..df0db67f88cff65dd8a59b91eef3e3be5f870467 100644 (file)
@@ -205,55 +205,6 @@ int smb_krb5_create_key_from_string(krb5_context context,
        return ret;
 }
 
-
-#if defined(HAVE_KRB5_PRINCIPAL2SALT) && defined(HAVE_KRB5_C_STRING_TO_KEY)
-/* MIT */
-int create_kerberos_key_from_string_direct(krb5_context context,
-                                                 krb5_principal host_princ,
-                                                 krb5_data *password,
-                                                 krb5_keyblock *key,
-                                                 krb5_enctype enctype)
-{
-       int ret = 0;
-       krb5_data salt;
-
-       ret = krb5_principal2salt(context, host_princ, &salt);
-       if (ret) {
-               DEBUG(1,("krb5_principal2salt failed (%s)\n", error_message(ret)));
-               return ret;
-       }
-       ret = krb5_c_string_to_key(context, enctype, password, &salt, key);
-       SAFE_FREE(salt.data);
-
-       return ret;
-}
-#elif defined(HAVE_KRB5_GET_PW_SALT) && defined(HAVE_KRB5_STRING_TO_KEY_SALT)
-/* Heimdal */
-int create_kerberos_key_from_string_direct(krb5_context context,
-                                                 krb5_principal host_princ,
-                                                 krb5_data *password,
-                                                 krb5_keyblock *key,
-                                                 krb5_enctype enctype)
-{
-       int ret;
-       krb5_salt salt;
-
-       ret = krb5_get_pw_salt(context, host_princ, &salt);
-       if (ret) {
-               DEBUG(1,("krb5_get_pw_salt failed (%s)\n", error_message(ret)));
-               return ret;
-       }
-
-       ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key);
-       krb5_free_salt(context, salt);
-
-       return ret;
-}
-#else
-#error UNKNOWN_CREATE_KEY_FUNCTIONS
-#endif
-
-
 /**
 * @brief Create a salt for a given principal
 *
index 0c30ca898d32e667bcbf5b1f3523704d5b46147c..0977f8e06ea119864045e36a4b47097b8bf7a50f 100644 (file)
@@ -134,11 +134,6 @@ int create_kerberos_key_from_string(krb5_context context,
                                    krb5_keyblock *key,
                                    krb5_enctype enctype,
                                    bool no_salt);
-int create_kerberos_key_from_string_direct(krb5_context context,
-                                          krb5_principal host_princ,
-                                          krb5_data *password,
-                                          krb5_keyblock *key,
-                                          krb5_enctype enctype);
 
 krb5_error_code get_kerberos_allowed_etypes(krb5_context context, krb5_enctype **enctypes);
 bool get_krb5_smb_session_key(TALLOC_CTX *mem_ctx,