skey 882 source3/libsmb/clikrb5.c krb5_keyblock *skey = NULL;
skey 887 source3/libsmb/clikrb5.c err = krb5_auth_con_getremotesubkey(context, auth_context, &skey);
skey 889 source3/libsmb/clikrb5.c err = krb5_auth_con_getlocalsubkey(context, auth_context, &skey);
skey 892 source3/libsmb/clikrb5.c if (err || skey == NULL) {
skey 897 source3/libsmb/clikrb5.c DEBUG(10, ("Got KRB5 session key of length %d\n", (int)KRB5_KEY_LENGTH(skey)));
skey 898 source3/libsmb/clikrb5.c *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey));
skey 904 source3/libsmb/clikrb5.c if (skey) {
skey 905 source3/libsmb/clikrb5.c krb5_free_keyblock(context, skey);
skey 515 source4/auth/gensec/gensec_krb5.c krb5_keyblock *skey;
skey 529 source4/auth/gensec/gensec_krb5.c err = krb5_auth_con_getlocalsubkey(context, auth_context, &skey);
skey 532 source4/auth/gensec/gensec_krb5.c err = krb5_auth_con_getremotesubkey(context, auth_context, &skey);
skey 535 source4/auth/gensec/gensec_krb5.c if (err == 0 && skey != NULL) {
skey 537 source4/auth/gensec/gensec_krb5.c (int)KRB5_KEY_LENGTH(skey)));
skey 539 source4/auth/gensec/gensec_krb5.c KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey));
skey 543 source4/auth/gensec/gensec_krb5.c krb5_free_keyblock(context, skey);
skey 194 source4/heimdal/kdc/524.c krb5_keyblock *skey,
skey 199 source4/heimdal/kdc/524.c ret = krb5_crypto_init(context, skey, ETYPE_DES_PCBC_NONE, &crypto);
skey 251 source4/heimdal/kdc/524.c Key *skey;
skey 267 source4/heimdal/kdc/524.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
skey 274 source4/heimdal/kdc/524.c &skey->key, ticket);
skey 300 source4/heimdal/kdc/524.c Key *skey;
skey 322 source4/heimdal/kdc/524.c ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
skey 328 source4/heimdal/kdc/524.c ret = krb5_crypto_init(context, &skey->key, 0, &crypto);
skey 285 source4/heimdal/kdc/kaserver.c Key *skey,
skey 322 source4/heimdal/kdc/kaserver.c &skey->key,
skey 451 source4/heimdal/kdc/kaserver.c Key *skey = NULL;
skey 514 source4/heimdal/kdc/kaserver.c ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey);
skey 568 source4/heimdal/kdc/kaserver.c hdr, skey,
skey 666 source4/heimdal/kdc/kaserver.c Key *skey = NULL;
skey 722 source4/heimdal/kdc/kaserver.c ret = _kdc_get_des_key(context, server_entry, TRUE, TRUE, &skey);
skey 843 source4/heimdal/kdc/kaserver.c hdr, skey,
skey 139 source4/heimdal/kdc/kerberos4.c Key *ckey, *skey;
skey 262 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
skey 298 source4/heimdal/kdc/kerberos4.c &skey->key,
skey 510 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, server, TRUE, FALSE, &skey);
skey 566 source4/heimdal/kdc/kerberos4.c &skey->key,
skey 262 source4/heimdal/kdc/kerberos5.c int skvno, const EncryptionKey *skey,
skey 286 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, skey, etype, &crypto);
skey 986 source4/heimdal/kdc/kerberos5.c Key *ckey, *skey;
skey 1382 source4/heimdal/kdc/kerberos5.c &setype, &skey);
skey 1730 source4/heimdal/kdc/kerberos5.c &skey->key, /* Server key */
skey 1731 source4/heimdal/kdc/kerberos5.c &skey->key, /* FIXME: should be krbtgt key */
skey 1765 source4/heimdal/kdc/kerberos5.c &skey->key, client->entry.kvno,
skey 1588 source4/heimdal/kdc/krb5tgs.c Key *skey;
skey 1591 source4/heimdal/kdc/krb5tgs.c &skey, &etype);
skey 1597 source4/heimdal/kdc/krb5tgs.c ekey = &skey->key;