Reinstate the keytype -> enctype changes and keep the new Mac changes
authorEzra Peisach <epeisach@mit.edu>
Tue, 12 Sep 1995 00:42:25 +0000 (00:42 +0000)
committerEzra Peisach <epeisach@mit.edu>
Tue, 12 Sep 1995 00:42:25 +0000 (00:42 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6761 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/krb5/asn.1/ChangeLog
src/lib/krb5/asn.1/asn1_k_decode.c
src/lib/krb5/asn.1/asn1_k_decode.h
src/lib/krb5/asn.1/asn1_k_encode.c
src/lib/krb5/asn.1/krb5_decode.c
src/lib/krb5/asn.1/krb5_encode.c

index aa82aec0e159bfd619a9b3e973b83bcacbaa9e65..8401f51093d2dfb1d75896b500716be0e0ddb4af 100644 (file)
@@ -2,6 +2,11 @@ Sun Sep 10 12:00:00 1995    <mattly@fusion.com>
 
        * asn1_encode.c: Removed use of localtime for encoding of generaltime.
 
+Wed Sep 06 14:20:57 1995   Chris Provenzano (proven@mit.edu)
+
+        * asn1_k_decode.c, asn1_k_decode.h, asn1_k_encode.c, asn1_k_encode.h,
+       * krb5_decode.c, krb5_encode.c: s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
+
 Wed Sept 6 12:00:00 1995    <mattly@fusion.com>
 
        * asn1_encode.c: added EPOCH to account for macintosh time keeping
@@ -9,6 +14,12 @@ Wed Sept 6 12:00:00 1995    <mattly@fusion.com>
 
        * asn1buf.c: removed some debugging cruft.
 
+Tue Sep 05 22:10:34 1995   Chris Provenzano (proven@mit.edu)
+
+        * asn1_k_decode.c, asn1_k_decode.h, asn1_k_encode.c, asn1_k_encode.h
+       * krb5_decode.c : Remove krb5_enctype references, and replace with
+                krb5_keytype where appropriate
+  
 Mon Aug 28 12:54:05 1995    <tytso@rsts-11.mit.edu>
 
        * krb5_decode.c (decode_krb5_alt_method,
index 187f1917b75019062a052a62e83cc4f7fd13e841..93db3055e05cc4ae36e15775eb4341f0873416df 100644 (file)
@@ -156,9 +156,8 @@ asn1_error_code fname(buf, val)\
 integer_convert(asn1_decode_int,int)
 integer_convert(asn1_decode_int32,krb5_int32)
 integer_convert(asn1_decode_kvno,krb5_kvno)
-integer_convert(asn1_decode_keytype,krb5_keytype)
-integer_convert(asn1_decode_cksumtype,krb5_cksumtype)
 integer_convert(asn1_decode_enctype,krb5_enctype)
+integer_convert(asn1_decode_cksumtype,krb5_cksumtype)
 integer_convert(asn1_decode_octet,krb5_octet)
 integer_convert(asn1_decode_addrtype,krb5_addrtype)
 integer_convert(asn1_decode_authdatatype,krb5_authdatatype)
@@ -241,11 +240,10 @@ asn1_error_code asn1_decode_encryption_key(buf, val)
 {
   setup();
   { begin_structure();
-    get_field(val->keytype,0,asn1_decode_keytype);
+    get_field(val->enctype,0,asn1_decode_enctype);
     get_lenfield(val->length,val->contents,1,asn1_decode_octetstring);
     end_structure();
     val->magic = KV5M_KEYBLOCK;
-    val->etype = ETYPE_UNKNOWN;
   }
   cleanup();
 }
@@ -256,7 +254,7 @@ asn1_error_code asn1_decode_encrypted_data(buf, val)
 {
   setup();
   { begin_structure();
-    get_field(val->etype,0,asn1_decode_enctype);
+    get_field(val->enctype,0,asn1_decode_enctype);
     opt_field(val->kvno,1,asn1_decode_kvno,0);
     get_lenfield(val->ciphertext.length,val->ciphertext.data,2,asn1_decode_charstring);
     end_structure();
@@ -411,13 +409,13 @@ asn1_error_code asn1_decode_kdc_req_body(buf, val)
     get_field(val->till,5,asn1_decode_kerberos_time);
     opt_field(val->rtime,6,asn1_decode_kerberos_time,0);
     get_field(val->nonce,7,asn1_decode_int32);
-    get_lenfield(val->netypes,val->etype,8,asn1_decode_sequence_of_enctype);
+    get_lenfield(val->nktypes,val->ktype,8,asn1_decode_sequence_of_enctype);
     opt_field(val->addresses,9,asn1_decode_host_addresses,0);
     if(tagnum == 10){
       get_field(val->authorization_data,10,asn1_decode_encrypted_data); }
     else{
       val->authorization_data.magic = 0;
-      val->authorization_data.etype = 0;
+      val->authorization_data.enctype = 0;
       val->authorization_data.kvno = 0;
       val->authorization_data.ciphertext.data = NULL;
       val->authorization_data.ciphertext.length = 0;
index a411d1b2e607bbcf999fe67e0dc845564611e6bc..9490619c00c5fe424ea94697025c3797d8be6ea2 100644 (file)
@@ -70,14 +70,12 @@ asn1_error_code asn1_decode_int32
        PROTOTYPE((asn1buf *buf, krb5_int32 *val));
 asn1_error_code asn1_decode_kvno
        PROTOTYPE((asn1buf *buf, krb5_kvno *val));
-asn1_error_code asn1_decode_keytype
-       PROTOTYPE((asn1buf *buf, krb5_keytype *val));
+asn1_error_code asn1_decode_enctype
+       PROTOTYPE((asn1buf *buf, krb5_enctype *val));
 asn1_error_code asn1_decode_msgtype
        PROTOTYPE((asn1buf *buf, krb5_msgtype *val));
 asn1_error_code asn1_decode_cksumtype
        PROTOTYPE((asn1buf *buf, krb5_cksumtype *val));
-asn1_error_code asn1_decode_enctype
-       PROTOTYPE((asn1buf *buf, krb5_enctype *val));
 asn1_error_code asn1_decode_octet
        PROTOTYPE((asn1buf *buf, krb5_octet *val));
 asn1_error_code asn1_decode_addrtype
index 2bdcf7c7ec7e754d5e21197d36ff51e656906d65..9ea9c5c1cad5eba9f3ad48e7f3afc70d7f0679ba 100644 (file)
@@ -228,7 +228,7 @@ asn1_error_code asn1_encode_encrypted_data(buf, val, retlen)
   asn1_addlenfield(val->ciphertext.length,val->ciphertext.data,2,asn1_encode_charstring);
   if(val->kvno)
     asn1_addfield(val->kvno,1,asn1_encode_integer);
-  asn1_addfield(val->etype,0,asn1_encode_integer);
+  asn1_addfield(val->enctype,0,asn1_encode_integer);
 
   asn1_makeseq();
 
@@ -431,7 +431,7 @@ asn1_error_code asn1_encode_kdc_req_body(buf, rep, retlen)
 
   /* etype[8]                  SEQUENCE OF INTEGER, -- EncryptionType, */
   /*                           -- in preference order */
-  asn1_addlenfield(rep->netypes,rep->etype,8,asn1_encode_sequence_of_enctype);
+  asn1_addlenfield(rep->nktypes,rep->ktype,8,asn1_encode_sequence_of_enctype);
 
   /* nonce[7]                  INTEGER, */
   asn1_addfield(rep->nonce,7,asn1_encode_integer);
@@ -485,7 +485,7 @@ asn1_error_code asn1_encode_encryption_key(buf, val, retlen)
   if(val == NULL || val->contents == NULL) return ASN1_MISSING_FIELD;
 
   asn1_addlenfield(val->length,val->contents,1,asn1_encode_octetstring);
-  asn1_addfield(val->keytype,0,asn1_encode_integer);
+  asn1_addfield(val->enctype,0,asn1_encode_integer);
   asn1_makeseq();
 
   asn1_cleanup();
index 1a5a988bb0079fe0fe1edb499404e143eda9887f..09de37d9a1d90b9d5d1fb64beed101cdb791e80b 100644 (file)
@@ -206,11 +206,10 @@ krb5_error_code decode_krb5_encryption_key(code, rep)
   alloc_field(*rep,krb5_keyblock);
 
   { begin_structure();
-    get_field((*rep)->keytype,0,asn1_decode_keytype);
+    get_field((*rep)->enctype,0,asn1_decode_enctype);
     get_lenfield((*rep)->length,(*rep)->contents,1,asn1_decode_octetstring);
     end_structure();
     (*rep)->magic = KV5M_KEYBLOCK;
-    (*rep)->etype = ETYPE_UNKNOWN;
   }
   cleanup();
 }
index 885eb03d06a9a5105542ce64a3a3b41a678f594c..8b5b7e4ab1d7fb8905dfa83c2266cf4fa3b1ac72 100644 (file)
@@ -232,8 +232,8 @@ krb5_error_code encode_krb5_encryption_key(rep, code)
   /* keyvalue[1]       OCTET STRING */
   krb5_addlenfield(rep->length,rep->contents,1,asn1_encode_octetstring);
 
-  /* keytype[0]                INTEGER */
-  krb5_addfield(rep->keytype,0,asn1_encode_integer);
+  /* enctype[0]                INTEGER */
+  krb5_addfield(rep->enctype,0,asn1_encode_integer);
 
   /* EncryptionKey ::= SEQUENCE */
   krb5_makeseq();