skey 882 source3/libsmb/clikrb5.c krb5_keyblock *skey = NULL; skey 887 source3/libsmb/clikrb5.c err = krb5_auth_con_getremotesubkey(context, auth_context, &skey); skey 889 source3/libsmb/clikrb5.c err = krb5_auth_con_getlocalsubkey(context, auth_context, &skey); skey 892 source3/libsmb/clikrb5.c if (err || skey == NULL) { skey 897 source3/libsmb/clikrb5.c DEBUG(10, ("Got KRB5 session key of length %d\n", (int)KRB5_KEY_LENGTH(skey))); skey 898 source3/libsmb/clikrb5.c *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey)); skey 904 source3/libsmb/clikrb5.c if (skey) { skey 905 source3/libsmb/clikrb5.c krb5_free_keyblock(context, skey); skey 515 source4/auth/gensec/gensec_krb5.c krb5_keyblock *skey; skey 529 source4/auth/gensec/gensec_krb5.c err = krb5_auth_con_getlocalsubkey(context, auth_context, &skey); skey 532 source4/auth/gensec/gensec_krb5.c err = krb5_auth_con_getremotesubkey(context, auth_context, &skey); skey 535 source4/auth/gensec/gensec_krb5.c if (err == 0 && skey != NULL) { skey 537 source4/auth/gensec/gensec_krb5.c (int)KRB5_KEY_LENGTH(skey))); skey 539 source4/auth/gensec/gensec_krb5.c KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey)); skey 543 source4/auth/gensec/gensec_krb5.c krb5_free_keyblock(context, skey); skey 194 source4/heimdal/kdc/524.c krb5_keyblock *skey, skey 199 source4/heimdal/kdc/524.c ret = krb5_crypto_init(context, skey, ETYPE_DES_PCBC_NONE, &crypto); skey 251 source4/heimdal/kdc/524.c Key *skey; skey 267 source4/heimdal/kdc/524.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); skey 274 source4/heimdal/kdc/524.c &skey->key, ticket); skey 300 source4/heimdal/kdc/524.c Key *skey; skey 322 source4/heimdal/kdc/524.c ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey); skey 328 source4/heimdal/kdc/524.c ret = krb5_crypto_init(context, &skey->key, 0, &crypto); skey 285 source4/heimdal/kdc/kaserver.c Key *skey, skey 322 source4/heimdal/kdc/kaserver.c &skey->key, skey 451 source4/heimdal/kdc/kaserver.c Key *skey = NULL; skey 514 source4/heimdal/kdc/kaserver.c ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey); skey 568 source4/heimdal/kdc/kaserver.c hdr, skey, skey 666 source4/heimdal/kdc/kaserver.c Key *skey = NULL; skey 722 source4/heimdal/kdc/kaserver.c ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey); skey 843 source4/heimdal/kdc/kaserver.c hdr, skey, skey 139 source4/heimdal/kdc/kerberos4.c Key *ckey, *skey; skey 262 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); skey 298 source4/heimdal/kdc/kerberos4.c &skey->key, skey 510 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey); skey 566 source4/heimdal/kdc/kerberos4.c &skey->key, skey 262 source4/heimdal/kdc/kerberos5.c int skvno, const EncryptionKey *skey, skey 286 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, skey, etype, &crypto); skey 986 source4/heimdal/kdc/kerberos5.c Key *ckey, *skey; skey 1382 source4/heimdal/kdc/kerberos5.c &setype, &skey); skey 1730 source4/heimdal/kdc/kerberos5.c &skey->key, /* Server key */ skey 1731 source4/heimdal/kdc/kerberos5.c &skey->key, /* FIXME: should be krbtgt key */ skey 1765 source4/heimdal/kdc/kerberos5.c &skey->key, client->entry.kvno, skey 1588 source4/heimdal/kdc/krb5tgs.c Key *skey; skey 1591 source4/heimdal/kdc/krb5tgs.c &skey, &etype); skey 1597 source4/heimdal/kdc/krb5tgs.c ekey = &skey->key;