On Wed, Jul 15, 2009 at 3:16 PM, Ken Raeburn wrote:
> On Jul 15, 2009, at 12:36, kerbe...@noopy.org wrote:
>>
>
> This is not the mechanism Kerberos uses for generating a DES key from a
> password and salt. Check RFC 3961, particularly section 6.2.
Uggh, you're right.
Followed the RFC and things
On Jul 15, 2009, at 12:36, kerbe...@noopy.org wrote:
> In my DES calls I:
> - pad and convert the salt from string to unsigned long to byte[8].
> - use the converted salt as the key and initialization vector.
> - use a cipher mode of CBC.
> - write password to crypto stream.
> - return array o
Hello,
I've reviewed the following document about the binary format used in
Kerberos keytab:
http://www.gnu.org/software/shishi/manual/html_node/The-Keytab-Binary-File-Format.html
In my Java code I am able to read a file stream (e.g. for
/etc/krb5.keytab) and starting with the 16-bit header (