Lines Matching refs:key

47  * If kvno is 0 get the key which is maxkvno for the princ and matches
71 /* Get the max key version */
207 new_entry.key = keylist->keyblock;
241 krb5_keyblock *key,
247 list.keyblock = *key;
256 krb5_keyblock *key,
281 if (key->enctype == ENCTYPE_UNKNOWN)
282 key->enctype = enctype;
283 else if (enctype != key->enctype) {
295 key->length = ntohl((uint32_t) keylength);
297 key->length = keylength;
300 if (!key->length || ((int) key->length) < 0) {
305 if (!(key->contents = (krb5_octet *)malloc(key->length))) {
310 if (fread((krb5_pointer) key->contents, sizeof(key->contents[0]),
311 key->length, kf) != key->length) {
313 zap(key->contents, key->length);
314 free(key->contents);
315 key->contents = 0;
337 krb5_keyblock *key,
349 if (key->enctype != ENCTYPE_UNKNOWN)
350 enctype = key->enctype;
357 if (key->enctype == ENCTYPE_UNKNOWN)
358 key->enctype = kt_ent.key.enctype;
360 if (((int) kt_ent.key.length) < 0) {
366 key->length = kt_ent.key.length;
378 * kt_ent will be free'd so need to allocate and copy key contents for
381 if (!(key->contents = (krb5_octet *)malloc(key->length))) {
386 memcpy(key->contents, kt_ent.key.contents, kt_ent.key.length);
400 krb5_keyblock *key,
408 key->magic = KV5M_KEYBLOCK;
420 retval = krb5_db_def_fetch_mkey_keytab(context, keyfile, mname, key, kvno);
422 retval = krb5_db_def_fetch_mkey_stash(context, keyfile, key, kvno);
426 * key, but set a message indicating the actual error.
430 "Can not fetch master key (error: %s).",
483 "User specified mkeyVNO (%u) does not match master key princ's KVNO (%u)",
532 * Check if the input mkey is the latest key and if it isn't then find the
561 "Unable to decrypt latest master key with the provided master key\n");
623 * Solaris Kerberos: derived key caching changes. If retval != 0 then
639 krb5_keyblock *key )
641 /* printf("default set master key\n"); */
646 krb5_keyblock **key )
648 /* printf("default get master key\n"); */
655 /* printf("default set master key\n"); */
662 /* printf("default get master key\n"); */