+Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
+
+ * adm_adm_func.c, adm_fmt_inq.c, adm_funcs.c, adm_process.c,
+ * adm_server.c adm_v4_pwd.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
if (oper_type == CHGOPER || oper_type == CH4OPER) {
key_data = (krb5_key_data *) NULL;
- if (krb5_dbe_find_keytype(context,
+ if (krb5_dbe_find_enctype(context,
&entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
((oper_type == CHGOPER) ?
KRB5_KDB_SALTTYPE_NORMAL :
KRB5_KDB_SALTTYPE_V4),
* We could loop through all the supported key/salt types, but
* we don't have that technology yet.
*/
- if (!krb5_dbe_find_keytype(context,
+ if (!krb5_dbe_find_enctype(context,
&entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_NORMAL,
-1,
&kdata))
kdata->key_data_kvno = atoi(tempstr);
- if (!krb5_dbe_find_keytype(context,
+ if (!krb5_dbe_find_enctype(context,
&entry,
- KEYTYPE_DES_CBC_CRC,
+ ENCTYPE_DES_CBC_CRC,
KRB5_KDB_SALTTYPE_V4,
-1,
&kdata))
kdata->key_data_kvno = atoi(tempstr);
- if (!krb5_dbe_find_keytype(context,
+ if (!krb5_dbe_find_enctype(context,
&entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_NOREALM,
-1,
&kdata))
kdata->key_data_kvno = atoi(tempstr);
- if (!krb5_dbe_find_keytype(context,
+ if (!krb5_dbe_find_enctype(context,
&entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_ONLYREALM,
-1,
&kdata))
entry->max_renewable_life);
strcat(my_data, thisline);
pkey = (krb5_key_data *) NULL;
- if (retval = krb5_dbe_find_keytype(context,
+ if (retval = krb5_dbe_find_enctype(context,
entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
KRB5_KDB_SALTTYPE_NORMAL,
-1,
&pkey)) {
};
static const krb5_key_salt_tuple keysalts[] = {
-{ KEYTYPE_DES_CBC_MD5, KRB5_KDB_SALTTYPE_NORMAL },
-{ KEYTYPE_DES_CBC_CRC, KRB5_KDB_SALTTYPE_V4 }
+{ ENCTYPE_DES_CBC_MD5, KRB5_KDB_SALTTYPE_NORMAL },
+{ ENCTYPE_DES_CBC_CRC, KRB5_KDB_SALTTYPE_V4 }
};
static const krb5_int32 n_keysalts =
sizeof(keysalts) / sizeof(keysalts[0]);
}
/* Find our key */
- if (retval = krb5_dbe_find_keytype(context,
+ if (retval = krb5_dbe_find_enctype(context,
&cpw_entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
-1,
-1,
&kdatap)) {
}
/* Find our key */
- if (retval = krb5_dbe_find_keytype(context,
+ if (retval = krb5_dbe_find_enctype(context,
&server_entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
-1,
-1,
&kdatap)) {
usage(name)
char *name;
{
- fprintf(stderr, "Usage: %s\t[-a aclfile] [-d dbname] [-k masterkeytype]",
+ fprintf(stderr, "Usage: %s\t[-a aclfile] [-d dbname] [-k masterenctype]",
name);
fprintf(stderr, "\n\t[-h] [-m] [-M masterkeyname] [-r realm] [-p port]\n");
return;
krb5_error_code retval;
int c;
krb5_boolean manual = FALSE;
- int keytypedone = 0;
+ int enctypedone = 0;
char *mkey_name = 0;
char *local_realm;
- krb5_keytype ktype;
+ krb5_enctype ktype;
#ifdef SANDIA
char input_string[80];
}
break;
- case 'k': /* keytype for master key */
- if (!krb5_string_to_keytype(optarg, &master_keyblock.keytype))
- keytypedone++;
+ case 'k': /* enctype for master key */
+ if (!krb5_string_to_enctype(optarg, &master_keyblock.enctype))
+ enctypedone++;
else
fprintf(stderr, "%s: %s is an invalid key type\n",
argv[0], optarg);
mkey_name = KRB5_KDB_M_NAME;
}
- if (!keytypedone) {
- master_keyblock.keytype = KEYTYPE_DES_CBC_MD5;
+ if (!enctypedone) {
+ master_keyblock.enctype = ENCTYPE_DES_CBC_MD5;
}
/* assemble & parse the master key name */
exit(1);
}
- krb5_use_keytype(context, &master_encblock, master_keyblock.keytype);
+ krb5_use_enctype(context, &master_encblock, master_keyblock.enctype);
if ((retval = krb5_db_fetch_mkey(context,
master_princ,
}
/* initialize random key generators */
- for (ktype = 0; ktype <= krb5_max_keytype; ktype++) {
- if (krb5_keytype_array[ktype]) {
- if (retval = (*krb5_keytype_array[ktype]->system->
+ for (ktype = 0; ktype <= krb5_max_enctype; ktype++) {
+ if (krb5_enctype_array[ktype]) {
+ if (retval = (*krb5_enctype_array[ktype]->system->
init_random_key)(&master_keyblock,
- &krb5_keytype_array[ktype]->random_sequence)) {
+ &krb5_enctype_array[ktype]->random_sequence)) {
com_err(argv[0], retval,
"while setting up random key generator for ktype %d--ktype disabled",
ktype);
- krb5_keytype_array[ktype] = 0;
+ krb5_enctype_array[ktype] = 0;
}
}
}
convert server.key into a real key
(it may be encrypted in the database)
*/
- if (retval = krb5_dbe_find_keytype(context,
+ if (retval = krb5_dbe_find_enctype(context,
&server_entry,
- KEYTYPE_DES_CBC_MD5,
+ ENCTYPE_DES_CBC_MD5,
-1,
-1,
&kdatap)) {
return(1);
}
- v5_keyblock->keytype = KEYTYPE_DES_CBC_MD5;
+ v5_keyblock->enctype = ENCTYPE_DES_CBC_MD5;
v5_keyblock->length = 8;
if (!(v5_keyblock->contents = (krb5_octet *) calloc (1,
8))) {