"KRB5_LIB_FUNCTION void KRB5_LIB_CALL krb5_generate_random_block (void *buf, size_t len)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_enctype_valid (krb5_context context, krb5_enctype etype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_cksumtype_to_enctype (krb5_context context, krb5_cksumtype ctype, krb5_enctype *etype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_encrypt_iov_ivec (krb5_context context, krb5_crypto crypto, unsigned usage, krb5_crypto_iov *data, int num_data, void *ivec)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_decrypt_iov_ivec (krb5_context context, krb5_crypto crypto, unsigned usage, krb5_crypto_iov *data, unsigned int num_data, void *ivec)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_create_checksum_iov (krb5_context context, krb5_crypto crypto, unsigned usage, krb5_crypto_iov *data, unsigned int num_data, krb5_cksumtype *type)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_verify_checksum_iov (krb5_context context, krb5_crypto crypto, unsigned usage, krb5_crypto_iov *data, unsigned int num_data, krb5_cksumtype *type)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_init (krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_crypto *crypto)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_destroy (krb5_context context, krb5_crypto crypto)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_getblocksize (krb5_context context, krb5_crypto crypto, size_t *blocksize)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_getenctype (krb5_context context, krb5_crypto crypto, krb5_enctype *enctype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_getpadsize (krb5_context context, krb5_crypto crypto, size_t *padsize)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_getconfoundersize (krb5_context context, krb5_crypto crypto, size_t *confoundersize)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_enctype_disable (krb5_context context, krb5_enctype enctype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_enctype_enable (krb5_context context, krb5_enctype enctype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_allow_weak_crypto (krb5_context context, krb5_boolean enable)"
"KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL krb5_is_enctype_weak (krb5_context context, krb5_enctype enctype)"
"KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL _krb5_enctype_requires_random_salt (krb5_context context, krb5_enctype enctype)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_random_to_key (krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_crypto_fx_cf2 (krb5_context context, const krb5_crypto crypto1, const krb5_crypto crypto2, krb5_data *pepper1, krb5_data *pepper2, krb5_enctype enctype, krb5_keyblock *res)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_generate_subkey_extended (krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey)"
"KRB5_LIB_FUNCTION void KRB5_LIB_CALL krb5_keyblock_zero (krb5_keyblock *keyblock)"
"KRB5_LIB_FUNCTION void KRB5_LIB_CALL krb5_free_keyblock_contents (krb5_context context, krb5_keyblock *keyblock)"
"KRB5_LIB_FUNCTION void KRB5_LIB_CALL krb5_free_keyblock (krb5_context context, krb5_keyblock *keyblock)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_copy_keyblock_contents (krb5_context context, const krb5_keyblock *inblock, krb5_keyblock *to)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_copy_keyblock (krb5_context context, const krb5_keyblock *inblock, krb5_keyblock **to)"
"KRB5_LIB_FUNCTION krb5_enctype KRB5_LIB_CALL krb5_keyblock_get_enctype (const krb5_keyblock *block)"
"KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL krb5_keyblock_init (krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key)"
"krb5_error_code _krb5_SP800_108_HMAC_KDF (krb5_context context, const krb5_data *kdf_K1, const krb5_data *kdf_label, const krb5_data *kdf_context, const EVP_MD *md, krb5_data *kdf_K0)"
Parameters
context Kerberos 5 context
enctype encryption type to probe
Returns
Returns true if generated salts should have random component
Parameters
context Kerberos 5 context
kdf_K1 Base key material.
kdf_label A string that identifies the purpose for the derived key.
kdf_context A binary string containing parties, nonce, etc.
md Message digest function to use for PRF.
kdf_K0 Derived key data.
Returns
Return an error code for an failure or 0 on success.
Parameters
context Kerberos 5 context
enable true to enable, false to disable
Returns
Return an error code or 0.
Parameters
context Kerberos context
ctype The checksum type to get the result enctype for
etype The returned encryption, when the matching etype is not found, etype is set to ETYPE_NULL.
Returns
Return an error code for an failure or 0 on success.
Parameters
context a Kerberos 5 context
inblock the key to copy
to the output key.
Returns
0 on success or a Kerberos 5 error code
Parameters
context a Kerberos 5 context
inblock the key to copy
to the output key.
Returns
0 on success or a Kerberos 5 error code
Parameters
context Kerberos context
crypto Kerberos crypto context
usage Key usage for this buffer
data array of buffers to process
num_data length of array
type output data
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto crypto context to free
Returns
Return an error code or 0.
Parameters
context Kerberos 5 context
crypto1 first key to combine
crypto2 second key to combine
pepper1 factor to combine with first key to garante uniqueness
pepper2 factor to combine with second key to garante uniqueness
enctype the encryption type of the resulting key
res allocated key, free with krb5_free_keyblock_contents()
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto crypto context to query
blocksize the resulting blocksize
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto crypto context to query
confoundersize the returned confounder size
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto crypto context to query
enctype the resulting encryption type
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto crypto context to query
padsize the return padding size
Returns
Return an error code or 0.
To free the crypto context, use krb5_crypto_destroy().
Parameters
context Kerberos context
key the key block information with all key data
etype the encryption type
crypto the resulting crypto context
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto Kerberos crypto context
usage Key usage for this buffer
data array of buffers to process
num_data length of array
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto Kerberos crypto context
usage Key usage for this buffer
data array of buffers to process
num_data length of array
Returns
Return an error code or 0.
Kerberos encrypted data look like this:
Parameters
context Kerberos 5 context
enctype encryption type to disable
Returns
Return an error code or 0.
Parameters
context Kerberos 5 context
enctype encryption type to enable
Returns
Return an error code or 0.
Parameters
context Kerberos context
etype enctype to check if its valid or not
Returns
Return an error code for an failure or 0 on success (enctype valid).
Parameters
context a Kerberos 5 context
keyblock keyblock to free, NULL is valid argument
Parameters
context a Kerberos 5 context
keyblock keyblock content to free, NULL is valid argument
This function can fail, and callers must check the return value.
Parameters
buf a buffer to fill with randomness
len length of memory that buf points to.
Returns
return 0 on success or HEIM_ERR_RANDOM_OFFLINE if the funcation failed to initialize the randomness source.
This function can NOT fail, instead it will abort() and program will crash.
If this function is called after a successful krb5_init_context(), the chance of it failing is low due to that krb5_init_context() pulls out some random, and quite commonly the randomness sources will not fail once it have started to produce good output, /dev/urandom behavies that way.
Parameters
buf a buffer to fill with randomness
len length of memory that buf points to.
Parameters
context kerberos context
key session key
etype encryption type of subkey, if ETYPE_NULL, use key's enctype
subkey returned new, free with krb5_free_keyblock().
Returns
0 on success or a Kerberos 5 error code
Parameters
context Kerberos 5 context
enctype encryption type to probe
Returns
Returns true if encryption type is weak or is not supported.
Returns
0 on success or a Kerberos 5 error code
Parameters
keyblock keyblock to zero out
Parameters
context Kerberos 5 context
type the enctype resulting key will be of
data input random data to convert to a key
size size of input random data, at least krb5_enctype_keysize() long
key key, output key, free with krb5_free_keyblock_contents()
Returns
Return an error code or 0.
Parameters
context Kerberos context
crypto Kerberos crypto context
usage Key usage for this buffer
data array of buffers to process
num_data length of array
type return checksum type if not NULL
Returns
Return an error code or 0.
Generated automatically by Doxygen for Heimdal Kerberos 5 library from the source code.