+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * accept_sec_context.c, init_sec_context.c, util.c :
+ s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
/* fill in the encryption descriptors */
- krb5_use_keytype(context, &ctx->enc.eblock, KEYTYPE_DES_CBC_RAW);
+ krb5_use_enctype(context, &ctx->enc.eblock, ENCTYPE_DES_CBC_RAW);
ctx->enc.processed = 0;
if (code = krb5_copy_keyblock(context, ctx->subkey, &ctx->enc.key))
return(code);
/*SUPPRESS 113*/
ctx->enc.key->contents[i] ^= 0xf0;
- krb5_use_keytype(context, &ctx->seq.eblock, KEYTYPE_DES_CBC_RAW);
+ krb5_use_enctype(context, &ctx->seq.eblock, ENCTYPE_DES_CBC_RAW);
ctx->seq.processed = 0;
ctx->seq.key = ctx->subkey;
/* the encryption key is the session key XOR 0xf0f0f0f0f0f0f0f0 */
- krb5_use_keytype(context, &ctx->enc.eblock, KEYTYPE_DES_CBC_RAW);
+ krb5_use_enctype(context, &ctx->enc.eblock, ENCTYPE_DES_CBC_RAW);
ctx->enc.processed = 0;
if (code = krb5_copy_keyblock(context, ctx->subkey, &ctx->enc.key))
return(code);
/*SUPPRESS 113*/
ctx->enc.key->contents[i] ^= 0xf0;
- krb5_use_keytype(context, &ctx->seq.eblock, KEYTYPE_DES_CBC_RAW);
+ krb5_use_enctype(context, &ctx->seq.eblock, ENCTYPE_DES_CBC_RAW);
ctx->seq.processed = 0;
ctx->seq.key = ctx->subkey;
for (i=0; i<ed.key->length; i++)
ed.key->contents[i] = key->contents[key->length - 1 - i];
- krb5_use_keytype(kg_context, &ed.eblock, KEYTYPE_DES_CBC_RAW);
+ krb5_use_enctype(kg_context, &ed.eblock, ENCTYPE_DES_CBC_RAW);
ed.processed = 0;
code = kg_encrypt(&ed, NULL, zeros, seed, 16);