+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * cnv_tkt_skey.c, conv_creds.c, get_cred.c k524init.c krb524d.c,
+ * test.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
+
Wed Sep 6 00:11:53 1995 Mark Eichin <eichin@cygnus.com>
* krb524d.c (main): set timeout inside while loop to prevent spin.
return ret;
}
- if (v5etkt->session->keytype != KEYTYPE_DES_CBC_CRC ||
+ if (v5etkt->session->enctype != ENCTYPE_DES_CBC_CRC ||
v5etkt->session->length != sizeof(C_Block)) {
if (krb524_debug)
fprintf(stderr, "v5 session keyblock type %d length %d != C_Block size %d\n",
- v5etkt->session->keytype,
+ v5etkt->session->enctype,
v5etkt->session->length,
sizeof(C_Block));
krb5_free_enc_tkt_part(context, v5etkt);
v4creds->instance)))
return ret;
- /* Check keytype too */
+ /* Check enctype too */
if (v5creds->keyblock.length != sizeof(C_Block)) {
if (krb524_debug)
fprintf(stderr, "v5 session keyblock length %d != C_Block size %d\n",
v5creds.client = client;
v5creds.server = server;
v5creds.times.endtime = 0;
- v5creds.keyblock.keytype = KEYTYPE_DES_CBC_MD5;
+ v5creds.keyblock.enctype = ENCTYPE_DES_CBC_MD5;
if (ret = krb5_get_credentials(context, 0, cc, &v5creds)) {
com_err("getcred", ret, "getting V5 credentials");
exit(1);
increds.client = client;
increds.server = server;
increds.times.endtime = 0;
- increds.keyblock.keytype = KEYTYPE_DES_CBC_MD5;
+ increds.keyblock.enctype = ENCTYPE_DES_CBC_MD5;
if ((code = krb5_get_credentials(context, 0, cc, &increds, &v5creds))) {
com_err("k524init", code, "getting V5 credentials");
exit(1);
free(realm);
}
- master_keyblock.keytype = KEYTYPE_DES_CBC_MD5;
- krb5_use_keytype(context, &master_encblock, master_keyblock.keytype);
+ master_keyblock.enctype = ENCTYPE_DES_CBC_MD5;
+ krb5_use_enctype(context, &master_encblock, master_keyblock.enctype);
if ((ret = krb5_db_fetch_mkey(context, master_princ, &master_encblock,
FALSE, /* non-manual type-in */
FALSE, /* irrelevant, given prev. arg */
if (debug)
printf("V5 ticket decoded\n");
- /* XXX KEYTYPE_DES_CBC_MD5 shouldn't be hardcoded here. Should be
+ /* XXX ENCTYPE_DES_CBC_MD5 shouldn't be hardcoded here. Should be
derived from the ticket. */
- if ((ret = lookup_service_key(context, v5tkt->server, KEYTYPE_DES_CBC_MD5,
+ if ((ret = lookup_service_key(context, v5tkt->server, ENCTYPE_DES_CBC_MD5,
&service_key)))
goto error;
if (debug)
krb5_error_code lookup_service_key(context, p, ktype, key)
krb5_context context;
krb5_principal p;
- krb5_keytype ktype;
+ krb5_enctype ktype;
krb5_keyblock *key;
{
int ret;
char *msg;
krb5_keyblock *key;
{
- printf("%s: Keytype: %d\n", msg, key->keytype);
+ printf("%s: Keytype: %d\n", msg, key->enctype);
printf("%s: Length: %d\n", msg, key->length);
printf("%s: Key: ", msg);
C_Block_print(key->contents);
increds.client = client;
increds.server = server;
increds.times.endtime = 0;
- increds.keyblock.keytype = KEYTYPE_DES_CBC_MD5;
+ increds.keyblock.enctype = ENCTYPE_DES_CBC_MD5;
if ((ret = krb5_get_credentials(context, 0, cc, &increds, &v5creds))) {
com_err("test", ret, "getting V5 credentials");
exit(1);
keybuf[i] += c;
}
- key.keytype = KEYTYPE_DES_CBC_MD5;
+ key.enctype = ENCTYPE_DES_CBC_MD5;
key.length = KEYSIZE; /* presumably */
key.contents = (krb5_octet *) keybuf;