Lines Matching refs:key

209  * was invalid UTF-8, which runs afoul of the arcfour string-to-key.
442 * Then update the active mkey list in case the new key has been activated
470 /* Null password means create with random key (new in 1.8). */
483 /* Record the master key VNO used to encrypt this entry's keys */
523 /* In all cases key and the principal data is set, let the database provider know */
1013 * Purpose: Check if a key appears in a list of keys, in order to
1019 * hist_keyblock (r) the key that hist_key_data is
1035 * Returns krb5 errors, KADM5_PASS_RESUSE if a key in
1036 * new_key_data is the same as a key in pw_hist_data, or 0.
1091 * mkey (r) master keyblock to decrypt key data with
1092 * hist_key (r) history keyblock to encrypt key data with
1110 krb5_keyblock key;
1122 &key, &salt);
1127 &key, &salt,
1133 krb5_free_keyblock_contents(context, &key);
1159 * hist_kvno (r) kvno of current history key
1162 * pw (r) keys for the password to add to adb's key history
1194 /* The history key has changed since the last password change, so we
1585 /* key data and attributes changed, let the database provider know */
1586 /* Solaris Kerberos: adding support for key history in LDAP KDB */
1665 * key. */
1742 /* key data changed, let the database provider know */
1762 * Set only ONE key of the principal, removing all others. This key
2070 /* copy old key data if necessary */
2179 * element with the results of decrypting the nth key in key_data with
2223 * Purpose: Retrieves and decrypts a principal key.
2239 * find a key with a specified enctype, salt type, and kvno in a
2241 * it with the master key, and return the key in keyblock, the salt
2242 * in salttype, and the key version number in kvno.
2245 * -1, ktype and stype are ignored and the key with the max kvno is
2246 * returned. If kvno is 0, only the key with the max kvno is returned
2284 * the key storage architecture gets redesigned for 1.3.