+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * kdb5_stash.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
char *who;
int status;
{
- fprintf(stderr, "usage: %s [-d dbpathname] [-r realmname] [-k keytype]\n\
+ fprintf(stderr, "usage: %s [-d dbpathname] [-r realmname] [-k enctype]\n\
\t[-M mkeyname] [-f keyfile]\n",
who);
exit(status);
krb5_context context;
krb5_realm_params *rparams;
- int keytypedone = 0;
+ int enctypedone = 0;
if (strrchr(argv[0], '/'))
argv[0] = strrchr(argv[0], '/')+1;
realm = optarg;
break;
case 'k':
- if (!krb5_string_to_keytype(optarg, &master_keyblock.keytype))
- keytypedone++;
+ if (!krb5_string_to_enctype(optarg, &master_keyblock.enctype))
+ enctypedone++;
else
- com_err(argv[0], 0, "%s is an invalid keytype", optarg);
+ com_err(argv[0], 0, "%s is an invalid enctype", optarg);
break;
case 'M': /* master key name in DB */
mkey_name = optarg;
mkey_name = strdup(rparams->realm_mkey_name);
/* Get the value for the master key type */
- if (rparams->realm_keytype_valid && !keytypedone) {
- master_keyblock.keytype = rparams->realm_keytype;
- keytypedone++;
+ if (rparams->realm_enctype_valid && !enctypedone) {
+ master_keyblock.enctype = rparams->realm_enctype;
+ enctypedone++;
}
/* Get the value for the stash file */
if (!dbname)
dbname = DEFAULT_KDB_FILE;
- if (!keytypedone)
- master_keyblock.keytype = DEFAULT_KDC_KEYTYPE;
+ if (!enctypedone)
+ master_keyblock.enctype = DEFAULT_KDC_ENCTYPE;
- if (!valid_keytype(master_keyblock.keytype)) {
+ if (!valid_enctype(master_keyblock.enctype)) {
char tmp[32];
- if (krb5_keytype_to_string(master_keyblock.keytype, tmp, sizeof(tmp)))
+ if (krb5_enctype_to_string(master_keyblock.enctype, tmp, sizeof(tmp)))
com_err(argv[0], KRB5_PROG_KEYTYPE_NOSUPP,
- "while setting up keytype %d", master_keyblock.keytype);
+ "while setting up enctype %d", master_keyblock.enctype);
else
com_err(argv[0], KRB5_PROG_KEYTYPE_NOSUPP, tmp);
exit(1);
}
- krb5_use_keytype(context, &master_encblock, master_keyblock.keytype);
+ krb5_use_enctype(context, &master_encblock, master_keyblock.enctype);
if (retval = krb5_db_set_name(context, dbname)) {
com_err(argv[0], retval, "while setting active database to '%s'",
+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * krcp.c, krlogin.c, krlogind.c, krsh.c, krshd.c :
+ s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
+
Sun Aug 27 15:35:04 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
* rlogin.M: Document -f and -F options.
&session_key);
krb5_free_creds(bsd_context, out_creds);
- krb5_use_keytype(bsd_context, &eblock, session_key->keytype);
+ krb5_use_enctype(bsd_context, &eblock, session_key->enctype);
if ( status = krb5_process_key(bsd_context, &eblock,
session_key)){
fprintf(stderr, "rcp: send_auth failed krb5_process_key: %s\n",
krb5_xfree(msg.data);
/* OK process key */
- krb5_use_keytype(bsd_context, &eblock, session_key->keytype);
+ krb5_use_enctype(bsd_context, &eblock, session_key->enctype);
if (status = krb5_process_key(bsd_context, &eblock, session_key))
exit(1);
rem = sock;
/* setup eblock for des_read and write */
- krb5_use_keytype(bsd_context, &eblock,cred->keyblock.keytype);
+ krb5_use_enctype(bsd_context, &eblock,cred->keyblock.enctype);
if ( status = krb5_process_key(bsd_context, &eblock,&cred->keyblock)) {
fprintf(stderr,
"%s: Cannot process session key : %s.\n",
/* Setup up eblock if encrypted login session */
/* otherwise zero out session key */
if (do_encrypt) {
- krb5_use_keytype(bsd_context, &eblock,
- ticket->enc_part2->session->keytype);
+ krb5_use_enctype(bsd_context, &eblock,
+ ticket->enc_part2->session->enctype);
if (status = krb5_process_key(bsd_context, &eblock,
ticket->enc_part2->session))
fatal(netf, "Permission denied");
/* Setup for des_read and write */
desinbuf.data = des_inbuf;
desoutbuf.data = des_outbuf;
- krb5_use_keytype(bsd_context, &eblock,cred->keyblock.keytype);
+ krb5_use_enctype(bsd_context, &eblock,cred->keyblock.enctype);
if (status = krb5_process_key(bsd_context, &eblock,&cred->keyblock)) {
fprintf(stderr, "%s: Cannot process session key : %s.\n",
argv0, error_message(status));
return status;
/* Setup eblock for encrypted sessions. */
- krb5_use_keytype(bsd_context, &eblock, ticket->enc_part2->session->keytype);
+ krb5_use_enctype(bsd_context, &eblock, ticket->enc_part2->session->enctype);
if (status = krb5_process_key(bsd_context, &eblock, ticket->enc_part2->session))
fatal(netf, "Permission denied");