krb5_c_make_checksum man page on FreeBSD

Man page or keyword search:  
man Server   9747 pages
apropos Keyword Search (all sections)
Output format
FreeBSD logo
[printable version]

KRB5_C_MAKE_CHECKSUM(3)	 BSD Library Functions Manual  KRB5_C_MAKE_CHECKSUM(3)

NAME
     krb5_c_block_size, krb5_c_decrypt, krb5_c_encrypt, krb5_c_encrypt_length,
     krb5_c_enctype_compare, krb5_c_get_checksum, krb5_c_is_coll_proof_cksum,
     krb5_c_is_keyed_cksum, krb5_c_keylength, krb5_c_make_checksum,
     krb5_c_make_random_key, krb5_c_set_checksum, krb5_c_valid_cksumtype,
     krb5_c_valid_enctype, krb5_c_verify_checksum, krb5_c_checksum_length —
     Kerberos 5 crypto API

LIBRARY
     Kerberos 5 Library (libkrb5, -lkrb5)

SYNOPSIS
     #include <krb5.h>

     krb5_error_code
     krb5_c_block_size(krb5_context context, krb5_enctype enctype,
	 size_t *blocksize);

     krb5_error_code
     krb5_c_decrypt(krb5_context context, const krb5_keyblock key,
	 krb5_keyusage usage, const krb5_data *ivec, krb5_enc_data *input,
	 krb5_data *output);

     krb5_error_code
     krb5_c_encrypt(krb5_context context, const krb5_keyblock *key,
	 krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input,
	 krb5_enc_data *output);

     krb5_error_code
     krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype,
	 size_t inputlen, size_t *length);

     krb5_error_code
     krb5_c_enctype_compare(krb5_context context, krb5_enctype e1,
	 krb5_enctype e2, krb5_boolean *similar);

     krb5_error_code
     krb5_c_make_random_key(krb5_context context, krb5_enctype enctype,
	 krb5_keyblock *random_key);

     krb5_error_code
     krb5_c_make_checksum(krb5_context context, krb5_cksumtype cksumtype,
	 const krb5_keyblock *key, krb5_keyusage usage,
	 const krb5_data *input, krb5_checksum *cksum);

     krb5_error_code
     krb5_c_verify_checksum(krb5_context context, const krb5_keyblock *key,
	 krb5_keyusage usage, const krb5_data *data,
	 const krb5_checksum *cksum, krb5_boolean *valid);

     krb5_error_code
     krb5_c_checksum_length(krb5_context context, krb5_cksumtype cksumtype,
	 size_t *length);

     krb5_error_code
     krb5_c_get_checksum(krb5_context context, const krb5_checksum *cksum,
	 krb5_cksumtype *type, krb5_data **data);

     krb5_error_code
     krb5_c_set_checksum(krb5_context context, krb5_checksum *cksum,
	 krb5_cksumtype type, const krb5_data *data);

     krb5_boolean
     krb5_c_valid_enctype(krb5_enctype, etype");

     krb5_boolean
     krb5_c_valid_cksumtype(krb5_cksumtype ctype);

     krb5_boolean
     krb5_c_is_coll_proof_cksum(krb5_cksumtype ctype);

     krb5_boolean
     krb5_c_is_keyed_cksum(krb5_cksumtype ctype);

     krb5_error_code
     krb5_c_keylengths(krb5_context context, krb5_enctype enctype,
	 size_t *inlength, size_t *keylength);

DESCRIPTION
     The functions starting with krb5_c are compat functions with MIT ker‐
     beros.

     The krb5_enc_data structure holds and encrypted data.  There are two pub‐
     lic accessable members of krb5_enc_data.  enctype that holds the encryp‐
     tion type of the data encrypted and ciphertext that is a krb5_data that
     might contain the encrypted data.

     krb5_c_block_size() returns the blocksize of the encryption type.

     krb5_c_decrypt() decrypts input and store the data in output. If ivec is
     NULL the default initialization vector for that encryption type will be
     used.

     krb5_c_encrypt() encrypts the plaintext in input and store the ciphertext
     in output.

     krb5_c_encrypt_length() returns the length the encrypted data given the
     plaintext length.

     krb5_c_enctype_compare() compares to encryption types and returns if they
     use compatible encryption key types.

     krb5_c_make_checksum() creates a checksum cksum with the checksum type
     cksumtype of the data in data.  key and usage are used if the checksum is
     a keyed checksum type.  Returns 0 or an error code.

     krb5_c_verify_checksum() verifies the checksum of data in cksum that was
     created with key using the key usage usage.  verify is set to non-zero if
     the checksum verifies correctly and zero if not.  Returns 0 or an error
     code.

     krb5_c_checksum_length() returns the length of the checksum.

     krb5_c_set_checksum() sets the krb5_checksum structure given type and
     data.  The content of cksum should be freeed with
     krb5_c_free_checksum_contents().

     krb5_c_get_checksum() retrieves the components of the krb5_checksum.
     structure.	 data should be free with krb5_free_data().  If some either of
     data or checksum is not needed for the application, NULL can be passed
     in.

     krb5_c_valid_enctype() returns true if etype is a valid encryption type.

     krb5_c_valid_cksumtype() returns true if ctype is a valid checksum type.

     krb5_c_is_keyed_cksum() return true if ctype is a keyed checksum type.

     krb5_c_is_coll_proof_cksum() returns true if ctype is a collition proof
     checksum type.

     krb5_c_keylengths() return the minimum length ( inlength) bytes needed to
     create a key and the length ( keylength) of the resulting key for the
     enctype.

SEE ALSO
     krb5(3), krb5_create_checksum(3), krb5_free_data(3), kerberos(8)

HEIMDAL				 Nov 17, 2006			       HEIMDAL
[top]

List of man pages available for FreeBSD

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
...................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net