+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * des_int.h, destest.c, init_rkey.c, random_key.c, string2key.c
+ * verify.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
/* string2key.c */
extern krb5_error_code mit_des_string_to_key
- PROTOTYPE(( const krb5_encrypt_block FAR *, const krb5_keytype,
+ PROTOTYPE(( const krb5_encrypt_block FAR *, const krb5_enctype,
krb5_keyblock FAR *, const krb5_data FAR *, const krb5_data FAR *));
/* weak_key.c */
/* do some initialisation */
initialize_krb5_error_table();
- krb5_use_keytype(context, &eblock, KEYTYPE_DES_CBC_CRC);
+ krb5_use_enctype(context, &eblock, ENCTYPE_DES_CBC_CRC);
keyblock.magic = KV5M_KEYBLOCK;
- keyblock.keytype = KEYTYPE_DES_CBC_CRC;
+ keyblock.enctype = ENCTYPE_DES_CBC_CRC;
keyblock.length = sizeof (mit_des_cblock);
keyblock.contents = (krb5_octet *)key;
krb5_pointer * seed;
{
mit_des_random_key_seed * p_seed;
- if ((seedblock->keytype != KEYTYPE_DES_CBC_CRC) &&
- (seedblock->keytype != KEYTYPE_DES_CBC_MD4) &&
- (seedblock->keytype != KEYTYPE_DES_CBC_MD5) &&
- (seedblock->keytype != KEYTYPE_DES_CBC_RAW))
- return KRB5_BAD_KEYTYPE;
+ if ((seedblock->enctype != ENCTYPE_DES_CBC_CRC) &&
+ (seedblock->enctype != ENCTYPE_DES_CBC_MD4) &&
+ (seedblock->enctype != ENCTYPE_DES_CBC_MD5) &&
+ (seedblock->enctype != ENCTYPE_DES_CBC_RAW))
+ return KRB5_BAD_ENCTYPE;
if ( !(p_seed = (mit_des_random_key_seed *)
malloc(sizeof(mit_des_random_key_seed))) )
return ENOMEM;
}
randkey->magic = KV5M_KEYBLOCK;
randkey->length = sizeof(mit_des_cblock);
- randkey->keytype = eblock->crypto_entry->proto_keytype;
+ randkey->enctype = eblock->crypto_entry->proto_enctype;
mit_des_new_random_key(randkey->contents, (mit_des_random_key_seed *) seed);
*keyblock = randkey;
return 0;
/*
converts the string pointed to by "data" into an encryption key
- of type "keytype". *keyblock is filled in with the key info;
+ of type "enctype". *keyblock is filled in with the key info;
in particular, keyblock->contents is to be set to allocated storage.
It is the responsibility of the caller to release this storage
when the generated key no longer needed.
algorithm.
If the particular function called does not know how to make a
- key of type "keytype", an error may be returned.
+ key of type "enctype", an error may be returned.
returns: errors
*/
krb5_error_code
-mit_des_string_to_key (eblock, keytype, keyblock, data, salt)
+mit_des_string_to_key (eblock, enctype, keyblock, data, salt)
const krb5_encrypt_block FAR * eblock;
-const krb5_keytype keytype;
+const krb5_enctype enctype;
krb5_keyblock FAR * keyblock;
const krb5_data FAR * data;
const krb5_data FAR * salt;
#define min(A, B) ((A) < (B) ? (A): (B))
#endif
- if ((keytype != KEYTYPE_DES_CBC_CRC) && (keytype != KEYTYPE_DES_CBC_MD4) &&
- (keytype != KEYTYPE_DES_CBC_MD5) && (keytype != KEYTYPE_DES_CBC_RAW))
- return (KRB5_PROG_KEYTYPE_NOSUPP);
+ if ((enctype != ENCTYPE_DES_CBC_CRC) && (enctype != ENCTYPE_DES_CBC_MD4) &&
+ (enctype != ENCTYPE_DES_CBC_MD5) && (enctype != ENCTYPE_DES_CBC_RAW))
+ return (KRB5_PROG_ETYPE_NOSUPP);
if ( !(keyblock->contents = (krb5_octet *)malloc(sizeof(mit_des_cblock))) )
return(ENOMEM);
keyblock->magic = KV5M_KEYBLOCK;
keyblock->length = sizeof(mit_des_cblock);
- keyblock->keytype = eblock->crypto_entry->proto_keytype;
+ keyblock->enctype = eblock->crypto_entry->proto_enctype;
key = keyblock->contents;
if (salt)
/* do some initialisation */
initialize_krb5_error_table();
- krb5_use_keytype(context, &eblock, KEYTYPE_DES_CBC_CRC);
- keyblock.keytype = KEYTYPE_DES_CBC_CRC;
+ krb5_use_enctype(context, &eblock, ENCTYPE_DES_CBC_CRC);
+ keyblock.enctype = ENCTYPE_DES_CBC_CRC;
keyblock.length = sizeof(mit_des_cblock);
/* use known input and key */