/* Find the V4 key */
retval = krb5_dbe_find_keytype(kadm_context,
&entry,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&pkey);
if (retval = krb5_dbe_find_keytype(kadm_context,
entry,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&kdatap)) {
kdatap = &entry->key_data[entry->n_key_data-1];
}
if (kdatap) {
- kdatap->key_data_type[0] = (krb5_int16) KEYTYPE_DES;
+ kdatap->key_data_type[0] = (krb5_int16) KEYTYPE_DES_CBC_MD5;
kdatap->key_data_type[1] = (krb5_int16) KRB5_KDB_SALTTYPE_V4;
kdatap->key_data_kvno = (krb5_int16) princ.key_version;
}
}
newpw.magic = KV5M_KEYBLOCK;
- newpw.etype = ETYPE_UNKNOWN;
if ((newpw.contents = (krb5_octet *)malloc(8)) == NULL)
failadd(KADM_NOMEM);
if (retval = krb5_dbe_find_keytype(kadm_context,
&newentry,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&pkey)) {
memcpy(newpw.contents, &data_i.key_low, 4);
memcpy((char *)(((krb5_int32 *) newpw.contents) + 1), &data_i.key_high, 4);
newpw.length = 8;
- newpw.keytype = KEYTYPE_DES;
+ newpw.keytype = KEYTYPE_DES_CBC_MD5;
sblock.type = KRB5_KDB_SALTTYPE_V4;
sblock.data.length = 0;
sblock.data.data = (char *) NULL;
failmod(KADM_NOMEM);
}
newpw.magic = KV5M_KEYBLOCK;
- newpw.etype = ETYPE_UNKNOWN;
newpw.length = 8;
- newpw.keytype = KEYTYPE_DES;
+ newpw.keytype = KEYTYPE_DES_CBC_MD5;
temp_key.key_low = ntohl(temp_key.key_low);
temp_key.key_high = ntohl(temp_key.key_high);
memcpy(newpw.contents, &temp_key.key_low, 4);
memcpy(newpw.contents + 4, &temp_key.key_high, 4);
if (retval = krb5_dbe_find_keytype(kadm_context,
&newentry,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&pkey)) {
failchange(KADM_NOMEM);
memcpy(localpw.contents, newpw, 8);
localpw.magic = KV5M_KEYBLOCK;
- localpw.etype = ETYPE_UNKNOWN;
- localpw.keytype = KEYTYPE_DES;
+ localpw.keytype = KEYTYPE_DES_CBC_MD5;
localpw.length = 8;
numfound = 1;
retval = krb5_db_get_principal(kadm_context, rprinc, &odata,
} else if (numfound == 1) {
if (retval = krb5_dbe_find_keytype(kadm_context,
&odata,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&pkey)) {
} else if (numfound) {
retval = krb5_dbe_find_keytype(kadm_context,
&odata,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_V4,
-1,
&pkey);
pkey = &odata.key_data[0];
memset(pkey, 0, sizeof(*pkey));
pkey->key_data_ver = 2;
- pkey->key_data_type[0] = KEYTYPE_DES;
+ pkey->key_data_type[0] = KEYTYPE_DES_CBC_MD5;
pkey->key_data_type[1] = KRB5_KDB_SALTTYPE_V4;
}
}
krb5_db_free_principal(kadm_context, &odata, 1);
failsrvtab(KADM_NOMEM);
}
- newpw.keytype = KEYTYPE_DES;
+ newpw.keytype = KEYTYPE_DES_CBC_MD5;
newpw.length = 8;
memcpy((char *)newpw.contents, new_key, 8);
memset((char *)new_key, 0, sizeof (new_key));
int numfound = 1;
krb5_boolean more;
krb5_db_entry master_entry;
- krb5_enctype kdc_etype = DEFAULT_KDC_ETYPE;
krb5_key_data *kdatap;
if (gethostname(hostname, sizeof(hostname)))
server_parm.admin_addr.sin_port = sep->s_port;
/* setting up the database */
mkey_name = KRB5_KDB_M_NAME;
- server_parm.master_keyblock.keytype = KEYTYPE_DES;
+ server_parm.master_keyblock.keytype = KEYTYPE_DES_CBC_MD5;
- if (!valid_etype(kdc_etype))
- return KRB5_PROG_ETYPE_NOSUPP;
- krb5_use_cstype(kadm_context, &server_parm.master_encblock, kdc_etype);
+ krb5_use_keytype(kadm_context, &server_parm.master_encblock,
+ server_parm.master_keyblock.keytype);
retval = krb5_db_setup_mkey_name(kadm_context, mkey_name, realm,
(char **) 0,
retval = krb5_dbe_find_keytype(kadm_context,
&master_entry,
- KEYTYPE_DES,
+ KEYTYPE_DES_CBC_MD5,
-1,
-1,
&kdatap);