references, and replace with krb5_keytype where appropriate.
* init_rkey.c (mit_des_init_random_key()),
* string2key.c (mit_des_string_to_key()) : Allow for any DES keytype.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6676
dc483132-0cff-0310-8789-
dd5450dbe970
+Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
+
+ * destest.c, random_key.c, string2key.c, verify.c : Remove krb5_enctype
+ references, and replace with krb5_keytype where appropriate.
+ * init_rkey.c (mit_des_init_random_key()),
+ * string2key.c (mit_des_string_to_key()) : Allow for any DES keytype.
+
+
Tue Aug 29 13:29:19 EDT 1995 Paul Park (pjpark@mit.edu)
* process_key.c, finish_key.c - Set and use priv_size in the krb5_
encrypt_block.
/* do some initialisation */
initialize_krb5_error_table();
- krb5_use_cstype(context, &eblock, ETYPE_DES_CBC_CRC);
+ krb5_use_keytype(context, &eblock, KEYTYPE_DES_CBC_CRC);
keyblock.magic = KV5M_KEYBLOCK;
- keyblock.etype = ETYPE_DES_CBC_CRC;
- keyblock.keytype = KEYTYPE_DES;
+ keyblock.keytype = KEYTYPE_DES_CBC_CRC;
keyblock.length = sizeof (mit_des_cblock);
keyblock.contents = (krb5_octet *)key;
krb5_pointer * seed;
{
mit_des_random_key_seed * p_seed;
- if (seedblock->keytype != KEYTYPE_DES)
+ if ((seedblock->keytype != KEYTYPE_DES_CBC_CRC) &&
+ (seedblock->keytype != KEYTYPE_DES_CBC_MD4) &&
+ (seedblock->keytype != KEYTYPE_DES_CBC_MD5) &&
+ (seedblock->keytype != KEYTYPE_DES_CBC_RAW))
return KRB5_BAD_KEYTYPE;
if ( !(p_seed = (mit_des_random_key_seed *)
malloc(sizeof(mit_des_random_key_seed))) )
return ENOMEM;
}
randkey->magic = KV5M_KEYBLOCK;
- randkey->etype = eblock->crypto_entry->proto_enctype;
randkey->length = sizeof(mit_des_cblock);
- randkey->keytype = KEYTYPE_DES;
+ randkey->keytype = eblock->crypto_entry->proto_keytype;
mit_des_new_random_key(randkey->contents, (mit_des_random_key_seed *) seed);
*keyblock = randkey;
return 0;
#define min(A, B) ((A) < (B) ? (A): (B))
#endif
- if ( keytype != KEYTYPE_DES )
+ if ((keytype != KEYTYPE_DES_CBC_CRC) && (keytype != KEYTYPE_DES_CBC_MD4) &&
+ (keytype != KEYTYPE_DES_CBC_MD5) && (keytype != KEYTYPE_DES_CBC_RAW))
return (KRB5_PROG_KEYTYPE_NOSUPP);
if ( !(keyblock->contents = (krb5_octet *)malloc(sizeof(mit_des_cblock))) )
return(ENOMEM);
keyblock->magic = KV5M_KEYBLOCK;
- keyblock->etype = eblock->crypto_entry->proto_enctype;
- keyblock->keytype = KEYTYPE_DES;
keyblock->length = sizeof(mit_des_cblock);
+ keyblock->keytype = eblock->crypto_entry->proto_keytype;
key = keyblock->contents;
if (salt)
/* do some initialisation */
initialize_krb5_error_table();
- krb5_use_cstype(context, &eblock, ETYPE_DES_CBC_CRC);
- keyblock.keytype = KEYTYPE_DES;
- keyblock.length = sizeof (mit_des_cblock);
+ krb5_use_keytype(context, &eblock, KEYTYPE_DES_CBC_CRC);
+ keyblock.keytype = KEYTYPE_DES_CBC_CRC;
+ keyblock.length = sizeof(mit_des_cblock);
/* use known input and key */