* adm_adm_func.c, adm_fmt_inq.c, adm_funcs.c, adm_process.c,
authorChris Provenzano <proven@mit.edu>
Wed, 6 Sep 1995 19:03:38 +0000 (19:03 +0000)
committerChris Provenzano <proven@mit.edu>
Wed, 6 Sep 1995 19:03:38 +0000 (19:03 +0000)
* adm_server.c adm_v4_pwd.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6707 dc483132-0cff-0310-8789-dd5450dbe970

src/kadmin.old/server/ChangeLog
src/kadmin.old/server/adm_adm_func.c
src/kadmin.old/server/adm_fmt_inq.c
src/kadmin.old/server/adm_funcs.c
src/kadmin.old/server/adm_process.c
src/kadmin.old/server/adm_server.c
src/kadmin.old/server/adm_v4_pwd.c

index 819293bd9397a2a50879d8ce8437ffec2c4d712f..79617a0e6e0568e3cf547798f972c9dabb4861bb 100644 (file)
@@ -1,3 +1,7 @@
+Wed Sep 06 14:20:57 1995   Chris Provenzano (proven@mit.edu)
+
+        * adm_adm_func.c, adm_fmt_inq.c, adm_funcs.c, adm_process.c,
+       * adm_server.c adm_v4_pwd.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
 
 Tue Sep 05 22:10:34 1995   Chris Provenzano (proven@mit.edu)
 
index 58eff881c54c17b741594d00e427d91156dfbaf7..f497a136e073e361c9e9549f6ede6e8f09933f8b 100644 (file)
@@ -109,9 +109,9 @@ adm_build_key (context, auth_context, new_passwd, oper_type, entry)
     
     if (oper_type == CHGOPER || oper_type == CH4OPER) {
        key_data = (krb5_key_data *) NULL;
-       if (krb5_dbe_find_keytype(context,
+       if (krb5_dbe_find_enctype(context,
                                  &entry,
-                                 KEYTYPE_DES_CBC_MD5,
+                                 ENCTYPE_DES_CBC_MD5,
                                  ((oper_type == CHGOPER) ? 
                                   KRB5_KDB_SALTTYPE_NORMAL : 
                                   KRB5_KDB_SALTTYPE_V4),
@@ -601,30 +601,30 @@ adm_mod_old_key(context, auth_context, cmdname, customer_name)
             * We could loop through all the supported key/salt types, but
             * we don't have that technology yet.
             */
-           if (!krb5_dbe_find_keytype(context,
+           if (!krb5_dbe_find_enctype(context,
                                       &entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       KRB5_KDB_SALTTYPE_NORMAL,
                                       -1,
                                       &kdata))
                kdata->key_data_kvno = atoi(tempstr);
-           if (!krb5_dbe_find_keytype(context,
+           if (!krb5_dbe_find_enctype(context,
                                       &entry,
-                                      KEYTYPE_DES_CBC_CRC,
+                                      ENCTYPE_DES_CBC_CRC,
                                       KRB5_KDB_SALTTYPE_V4,
                                       -1,
                                       &kdata))
                kdata->key_data_kvno = atoi(tempstr);
-           if (!krb5_dbe_find_keytype(context,
+           if (!krb5_dbe_find_enctype(context,
                                       &entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       KRB5_KDB_SALTTYPE_NOREALM,
                                       -1,
                                       &kdata))
                kdata->key_data_kvno = atoi(tempstr);
-           if (!krb5_dbe_find_keytype(context,
+           if (!krb5_dbe_find_enctype(context,
                                       &entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       KRB5_KDB_SALTTYPE_ONLYREALM,
                                       -1,
                                       &kdata))
index 3ff13a9c3bb01a797dc7ccf899fd9f01a627728d..9b4ac542f9eec1c2fdc8075b97739f72ca8c00ca 100644 (file)
@@ -169,9 +169,9 @@ adm_fmt_prt(context, entry, Principal_name, ret_data)
                        entry->max_renewable_life);
     strcat(my_data, thisline);
     pkey = (krb5_key_data *) NULL;
-    if (retval = krb5_dbe_find_keytype(context,
+    if (retval = krb5_dbe_find_enctype(context,
                                       entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       KRB5_KDB_SALTTYPE_NORMAL,
                                       -1,
                                       &pkey)) {
index 1bf841c9e7a6a22ec2e4cdfe79c1f0e5e7b57242..f130993645e037f5a84b8bd09fc15302423ac443 100644 (file)
@@ -47,8 +47,8 @@ struct saltblock {
 };
 
 static const krb5_key_salt_tuple       keysalts[] = {
-{ KEYTYPE_DES_CBC_MD5, KRB5_KDB_SALTTYPE_NORMAL },
-{ KEYTYPE_DES_CBC_CRC, KRB5_KDB_SALTTYPE_V4 }
+{ ENCTYPE_DES_CBC_MD5, KRB5_KDB_SALTTYPE_NORMAL },
+{ ENCTYPE_DES_CBC_CRC, KRB5_KDB_SALTTYPE_V4 }
 };
 static const krb5_int32                        n_keysalts =
        sizeof(keysalts) / sizeof(keysalts[0]);
index abab60abab7436fba4d337b8a1eb96bc53548ab7..35d0bc99fe2dfcaab29d9be17cac29bff0c15f18 100644 (file)
@@ -80,9 +80,9 @@ cpw_keyproc(context, keyblock)
        }
 
        /* Find our key */
-       if (retval = krb5_dbe_find_keytype(context,
+       if (retval = krb5_dbe_find_enctype(context,
                                           &cpw_entry,
-                                          KEYTYPE_DES_CBC_MD5,
+                                          ENCTYPE_DES_CBC_MD5,
                                           -1,
                                           -1,
                                           &kdatap)) {
@@ -208,9 +208,9 @@ process_client(context, prog)
     }
 
     /* Find our key */
-    if (retval = krb5_dbe_find_keytype(context,
+    if (retval = krb5_dbe_find_enctype(context,
                                       &server_entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       -1,
                                       -1,
                                       &kdatap)) {
index 547c40693dba43e54a60d3b62d90bf45540173a5..c704c39b58488ede9566fb305582af29041fb123 100644 (file)
@@ -103,7 +103,7 @@ void
 usage(name)
 char *name;
 {
-    fprintf(stderr, "Usage: %s\t[-a aclfile] [-d dbname] [-k masterkeytype]", 
+    fprintf(stderr, "Usage: %s\t[-a aclfile] [-d dbname] [-k masterenctype]", 
                        name);
     fprintf(stderr, "\n\t[-h] [-m] [-M masterkeyname] [-r realm] [-p port]\n");
     return;
@@ -118,10 +118,10 @@ process_args(context, argc, argv)
     krb5_error_code retval;
     int c;
     krb5_boolean manual = FALSE;
-    int keytypedone = 0;
+    int enctypedone = 0;
     char *mkey_name = 0;
     char *local_realm;
-    krb5_keytype ktype;
+    krb5_enctype ktype;
 
 #ifdef SANDIA
     char input_string[80];
@@ -164,9 +164,9 @@ process_args(context, argc, argv)
                }
                break;
 
-           case 'k':                   /* keytype for master key */
-               if (!krb5_string_to_keytype(optarg, &master_keyblock.keytype))
-                   keytypedone++;
+           case 'k':                   /* enctype for master key */
+               if (!krb5_string_to_enctype(optarg, &master_keyblock.enctype))
+                   enctypedone++;
                else
                    fprintf(stderr, "%s: %s is an invalid key type\n",
                            argv[0], optarg);
@@ -214,8 +214,8 @@ process_args(context, argc, argv)
        mkey_name = KRB5_KDB_M_NAME;
     }
  
-    if (!keytypedone) {
-       master_keyblock.keytype = KEYTYPE_DES_CBC_MD5;
+    if (!enctypedone) {
+       master_keyblock.enctype = ENCTYPE_DES_CBC_MD5;
     }
  
     /* assemble & parse the master key name */
@@ -227,7 +227,7 @@ process_args(context, argc, argv)
        exit(1);
     }
 
-    krb5_use_keytype(context, &master_encblock, master_keyblock.keytype);
+    krb5_use_enctype(context, &master_encblock, master_keyblock.enctype);
  
     if ((retval = krb5_db_fetch_mkey(context, 
                master_princ, 
@@ -242,15 +242,15 @@ process_args(context, argc, argv)
     }
 
     /* initialize random key generators */
-    for (ktype = 0; ktype <= krb5_max_keytype; ktype++) {
-       if (krb5_keytype_array[ktype]) {
-               if (retval = (*krb5_keytype_array[ktype]->system->
+    for (ktype = 0; ktype <= krb5_max_enctype; ktype++) {
+       if (krb5_enctype_array[ktype]) {
+               if (retval = (*krb5_enctype_array[ktype]->system->
                                init_random_key)(&master_keyblock,
-                               &krb5_keytype_array[ktype]->random_sequence)) {
+                               &krb5_enctype_array[ktype]->random_sequence)) {
                        com_err(argv[0], retval, 
        "while setting up random key generator for ktype %d--ktype disabled", 
                                ktype);
-                       krb5_keytype_array[ktype] = 0;
+                       krb5_enctype_array[ktype] = 0;
                }
        }
     }
@@ -354,9 +354,9 @@ init_db(context, dbname, masterkeyname, masterkeyblock)
        convert server.key into a real key 
        (it may be encrypted in the database) 
  */
-    if (retval = krb5_dbe_find_keytype(context,
+    if (retval = krb5_dbe_find_enctype(context,
                                       &server_entry,
-                                      KEYTYPE_DES_CBC_MD5,
+                                      ENCTYPE_DES_CBC_MD5,
                                       -1,
                                       -1,
                                       &kdatap)) {
index 8728092cc390ab48623b319dbb323995e9ec6a8c..1e48d0e6cf8a88e87f546f6c3aa5901a785bcf63 100644 (file)
@@ -357,7 +357,7 @@ int *outlen;
         return(1);
     }  
  
-    v5_keyblock->keytype = KEYTYPE_DES_CBC_MD5;
+    v5_keyblock->enctype = ENCTYPE_DES_CBC_MD5;
     v5_keyblock->length = 8;
     if (!(v5_keyblock->contents = (krb5_octet *) calloc (1,
                 8))) {