Lines Matching refs:key
58 krb5_keyblock key;
62 memset(&key, 0, sizeof (krb5_keyblock));
71 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
74 entry.key = key;
83 krb5_free_keyblock_contents(ctx, &key);
99 * constructing the salt in the string-to-key function.
100 * where kvno is the key version number of the set of service principal
102 * where flags is the set of conditions that affects the key table entries
109 * where password is the password that will be used to derive the key for
112 * derive the key salt. If NULL is specified, this function will use the hostname
119 * service principals share the same key material, unlike MIT based
266 k5_kt_remove_by_key(krb5_context ctx, char *key, uint_t type)
276 assert(ctx != NULL && key != NULL);
279 krb5_princ_realm(ctx, &realm_data)->length = strlen(key);
280 krb5_princ_realm(ctx, &realm_data)->data = key;
282 if ((code = krb5_parse_name(ctx, key, &svc_princ)) != 0)
345 * Removes all key entries in the keytab file that match the exact realm name
364 * Removes all key entries in the keytab file that match the exact service
390 * where flags is the set of conditions that affects the key table entries
403 * a corresponding service principal, of key version number (kvno) n. It would
456 (entry.key.enctype == *tenctype)) {
463 if ((entry.key.enctype == AES128) ||
464 (entry.key.enctype == AES256)) {