Lines Matching defs:key
75 krb5_keyblock key;
79 memset(&key, 0, sizeof (krb5_keyblock));
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
91 entry.key = key;
100 krb5_free_keyblock_contents(ctx, &key);
116 * constructing the salt in the string-to-key function.
117 * where kvno is the key version number of the set of service principal
119 * where flags is the set of conditions that affects the key table entries
126 * where password is the password that will be used to derive the key for
133 * service principals share the same key material, unlike MIT based
274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type)
284 assert(ctx != NULL && key != NULL);
287 krb5_princ_realm(ctx, &realm_data)->length = strlen(key);
288 krb5_princ_realm(ctx, &realm_data)->data = key;
290 if ((code = krb5_parse_name(ctx, key, &svc_princ)) != 0)
353 * Removes all key entries in the keytab file that match the exact realm name
373 * Removes all key entries in the keytab file that match the exact service
399 * where flags is the set of conditions that affects the key table entries
412 * a corresponding service principal, of key version number (kvno) n. It would
465 (entry.key.enctype == *tenctype)) {
472 if ((entry.key.enctype == AES128) ||
473 (entry.key.enctype == AES256)) {