/* fill in the encryption descriptors */
- krb5_use_cstype(context, &ctx->enc.eblock, ETYPE_RAW_DES_CBC);
+ krb5_use_enctype(context, &ctx->enc.eblock, ENCTYPE_DES_CBC_RAW);
ctx->enc.processed = 0;
if (code = krb5_copy_keyblock(context, ctx->subkey, &ctx->enc.key))
return(code);
/*SUPPRESS 113*/
ctx->enc.key->contents[i] ^= 0xf0;
- krb5_use_cstype(context, &ctx->seq.eblock, ETYPE_RAW_DES_CBC);
+ krb5_use_enctype(context, &ctx->seq.eblock, ENCTYPE_DES_CBC_RAW);
ctx->seq.processed = 0;
ctx->seq.key = ctx->subkey;
/* the encryption key is the session key XOR 0xf0f0f0f0f0f0f0f0 */
- krb5_use_cstype(context, &ctx->enc.eblock, ETYPE_RAW_DES_CBC);
+ krb5_use_enctype(context, &ctx->enc.eblock, ENCTYPE_DES_CBC_RAW);
ctx->enc.processed = 0;
if (code = krb5_copy_keyblock(context, ctx->subkey, &ctx->enc.key))
return(code);
/*SUPPRESS 113*/
ctx->enc.key->contents[i] ^= 0xf0;
- krb5_use_cstype(context, &ctx->seq.eblock, ETYPE_RAW_DES_CBC);
+ krb5_use_enctype(context, &ctx->seq.eblock, ENCTYPE_DES_CBC_RAW);
ctx->seq.processed = 0;
ctx->seq.key = ctx->subkey;
for (i=0; i<ed.key->length; i++)
ed.key->contents[i] = key->contents[key->length - 1 - i];
- krb5_use_cstype(kg_context, &ed.eblock, ETYPE_RAW_DES_CBC);
+ krb5_use_enctype(kg_context, &ed.eblock, ENCTYPE_DES_CBC_RAW);
ed.processed = 0;
code = kg_encrypt(&ed, NULL, zeros, seed, 16);