Lines Matching refs:key

54  *  any server will be accepted if the key can be found, and the caller should
60 * keyproc specifies a procedure to generate a decryption key for the
62 * used as a decryption key. If keyproc is NULL, then fetchfrom is checked;
64 * decryption key. If fetchfrom is NULL, then the default key store is
93 krb5_keyblock *key)
110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket);
111 if (retval == 0 && key != NULL)
112 retval = krb5_copy_keyblock_contents(context, &ktent.key, key);
128 if (ktent.key.enctype != req->ticket->enc_part.enctype) {
133 retval = krb5_decrypt_tkt_part(context, &ktent.key,
152 if (retval == 0 && key != NULL)
153 retval = krb5_copy_keyblock_contents(context, &ktent.key, key);
295 if ((*auth_context)->key) { /* User to User authentication */
297 &(*auth_context)->key->keyblock,
304 decrypt_key = (*auth_context)->key->keyblock;
305 (*auth_context)->key->keyblock.contents = NULL;
307 krb5_k_free_key(context, (*auth_context)->key);
308 (*auth_context)->key = NULL;
321 key usage to use */
588 * subkey (if that is present) or the service ticket session key, the
591 * used as the protocol key or base key [RFC3961] for subsequent
594 * If the enctype of the ticket session key is included in the enctype
600 * to whether it is legal to negotiate the ticket session key type if it
604 * enctype as the ticket session key for the acceptor subkey, surely.
667 if ((*auth_context)->key != NULL) {
668 krb5_k_free_key(context, (*auth_context)->key);
669 (*auth_context)->key = NULL;
673 &((*auth_context)->key))))
697 krb5_k_key_enctype(context, (*auth_context)->key))