+Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
+
+ * ktest.c, ktest.h, ktest_equal.c, ktest_equal.h : Remove krb5_enctype
+ references, and replace with krb5_keytype where appropriate
Tue Aug 29 14:20:52 EDT 1995 Paul Park (pjpark@mit.edu)
* krb5_decode_test.c - Fix string constant.
krb5_keyblock * kb;
{
kb->magic = KV5M_KEYBLOCK;
- kb->etype = ETYPE_UNKNOWN;
kb->keytype = 1;
kb->length = 8;
kb->contents = (krb5_octet*)calloc(8,sizeof(krb5_octet));
{
krb5_error_code retval;
- ed->etype = 0;
ed->kvno = 5;
+ ed->keytype = 0;
retval = krb5_data_parse(&(ed->ciphertext),"krbASN.1 test message");
if(retval) return retval;
kr->till = SAMPLE_TIME;
kr->rtime = SAMPLE_TIME;
kr->nonce = SAMPLE_NONCE;
- kr->netypes = 2;
- kr->etype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
- kr->etype[0] = 0;
- kr->etype[1] = 1;
+ kr->nktypes = 2;
+ kr->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+ kr->ktype[0] = 0;
+ kr->ktype[1] = 1;
retval = ktest_make_sample_addresses(&(kr->addresses));
if(retval) return retval;
retval = ktest_make_sample_enc_data(&(kr->authorization_data));
krb->till = SAMPLE_TIME;
krb->rtime = SAMPLE_TIME;
krb->nonce = SAMPLE_NONCE;
- krb->netypes = 2;
- krb->etype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
- krb->etype[0] = 0;
- krb->etype[1] = 1;
+ krb->nktypes = 2;
+ krb->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+ krb->ktype[0] = 0;
+ krb->ktype[1] = 1;
retval = ktest_make_sample_addresses(&(krb->addresses));
if(retval) return retval;
retval = ktest_make_sample_enc_data(&(krb->authorization_data));
*soi = NULL;
}
-void ktest_destroy_sequence_of_enctype(soi)
- krb5_enctype ** soi;
+void ktest_destroy_sequence_of_keytype(soi)
+ krb5_keytype ** soi;
{
free(*soi);
*soi = NULL;
KRB5_PROTOTYPE((krb5_authdata **ad));
void ktest_destroy_sequence_of_integer
KRB5_PROTOTYPE((long **soi));
-void ktest_destroy_sequence_of_enctype
- KRB5_PROTOTYPE((krb5_enctype **soi));
void ktest_destroy_sequence_of_ticket
KRB5_PROTOTYPE((krb5_ticket ***sot));
void ktest_destroy_ticket
int p=TRUE;
if(ref==var) return TRUE;
else if(ref == NULL || var == NULL) return FALSE;
- p=p&&scalar_equal(etype);
+ p=p&&scalar_equal(keytype);
p=p&&scalar_equal(kvno);
p=p&&struct_equal(ciphertext,ktest_equal_data);
return p;
p=p&&scalar_equal(till);
p=p&&scalar_equal(rtime);
p=p&&scalar_equal(nonce);
- p=p&&len_equal(netypes,etype,ktest_equal_array_of_enctype);
+ p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
p=p&&ptr_equal(addresses,ktest_equal_addresses);
p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
/* This field isn't actually in the ASN.1 encoding. */
p=p&&scalar_equal(till);
p=p&&scalar_equal(rtime);
p=p&&scalar_equal(nonce);
- p=p&&len_equal(netypes,etype,ktest_equal_array_of_enctype);
+ p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
p=p&&ptr_equal(addresses,ktest_equal_addresses);
p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
/* This isn't part of the ASN.1 encoding. */
return p;
}
-int ktest_equal_array_of_enctype(length, ref, var)
+int ktest_equal_array_of_keytype(length, ref, var)
const int length;
- krb5_enctype * ref;
- krb5_enctype * var;
+ krb5_keytype * ref;
+ krb5_keytype * var;
{
int i, p=TRUE;
int ktest_equal_sequence_of_cred_info
KRB5_PROTOTYPE((krb5_cred_info **ref, krb5_cred_info **var));
-len_array(ktest_equal_array_of_enctype,krb5_enctype);
+len_array(ktest_equal_array_of_keytype,krb5_keytype);
len_array(ktest_equal_array_of_data,krb5_data);
len_array(ktest_equal_array_of_octet,krb5_octet);