2 KRB5_ENCRYPT(3) UNIX Programmer's Manual KRB5_ENCRYPT(3)
5 k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt, k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba, k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt,
6 k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba - encrypt and decrypt data
8 L
\bLI
\bIB
\bBR
\bRA
\bAR
\bRY
\bY
9 Kerberos 5 Library (libkrb5, -lkrb5)
11 S
\bSY
\bYN
\bNO
\bOP
\bPS
\bSI
\bIS
\bS
12 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
13 k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\br_
\by_
\bp_
\bt_
\bo _
\bc_
\br_
\by_
\bp_
\bt_
\bo, _
\bu_
\bn_
\bs_
\bi_
\bg_
\bn_
\be_
\bd _
\bu_
\bs_
\ba_
\bg_
\be,
14 _
\bv_
\bo_
\bi_
\bd _
\b*_
\bd_
\ba_
\bt_
\ba, _
\bs_
\bi_
\bz_
\be_
\b__
\bt _
\bl_
\be_
\bn, _
\bk_
\br_
\bb_
\b5_
\b__
\bd_
\ba_
\bt_
\ba _
\b*_
\br_
\be_
\bs_
\bu_
\bl_
\bt)
16 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
17 k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\br_
\by_
\bp_
\bt_
\bo _
\bc_
\br_
\by_
\bp_
\bt_
\bo,
18 _
\bu_
\bn_
\bs_
\bi_
\bg_
\bn_
\be_
\bd _
\bu_
\bs_
\ba_
\bg_
\be, _
\bv_
\bo_
\bi_
\bd _
\b*_
\bd_
\ba_
\bt_
\ba, _
\bs_
\bi_
\bz_
\be_
\b__
\bt _
\bl_
\be_
\bn, _
\bi_
\bn_
\bt _
\bk_
\bv_
\bn_
\bo,
19 _
\bE_
\bn_
\bc_
\br_
\by_
\bp_
\bt_
\be_
\bd_
\bD_
\ba_
\bt_
\ba _
\b*_
\br_
\be_
\bs_
\bu_
\bl_
\bt)
21 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
22 k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\br_
\by_
\bp_
\bt_
\bo _
\bc_
\br_
\by_
\bp_
\bt_
\bo, _
\bu_
\bn_
\bs_
\bi_
\bg_
\bn_
\be_
\bd _
\bu_
\bs_
\ba_
\bg_
\be,
23 _
\bv_
\bo_
\bi_
\bd _
\b*_
\bd_
\ba_
\bt_
\ba, _
\bs_
\bi_
\bz_
\be_
\b__
\bt _
\bl_
\be_
\bn, _
\bk_
\br_
\bb_
\b5_
\b__
\bd_
\ba_
\bt_
\ba _
\b*_
\br_
\be_
\bs_
\bu_
\bl_
\bt)
25 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
26 k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\br_
\by_
\bp_
\bt_
\bo _
\bc_
\br_
\by_
\bp_
\bt_
\bo,
27 _
\bu_
\bn_
\bs_
\bi_
\bg_
\bn_
\be_
\bd _
\bu_
\bs_
\ba_
\bg_
\be, _
\bE_
\bn_
\bc_
\br_
\by_
\bp_
\bt_
\be_
\bd_
\bD_
\ba_
\bt_
\ba _
\b*_
\be, _
\bk_
\br_
\bb_
\b5_
\b__
\bd_
\ba_
\bt_
\ba _
\b*_
\br_
\be_
\bs_
\bu_
\bl_
\bt)
29 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
30 These functions are used to encrypt and decrypt data.
32 k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt() puts the encrypted version of _
\bd_
\ba_
\bt_
\ba (of size _
\bl_
\be_
\bn) in
33 _
\br_
\be_
\bs_
\bu_
\bl_
\bt. If the encryption type supports using derived keys, _
\bu_
\bs_
\ba_
\bg_
\be should
34 be the appropriate key-usage. k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba() does the same
35 as k
\bkr
\brb
\bb5
\b5_
\b_e
\ben
\bnc
\bcr
\bry
\byp
\bpt
\bt(), but it puts the encrypted data in a _
\bE_
\bn_
\bc_
\br_
\by_
\bp_
\bt_
\be_
\bd_
\bD_
\ba_
\bt_
\ba
36 structure instead. If _
\bk_
\bv_
\bn_
\bo is not zero, it will be put in the _
\bk_
\bv_
\bn_
\bo _
\bf_
\bi_
\be_
\bl_
\bd
37 _
\bi_
\bn _
\bt_
\bh_
\be _
\bE_
\bn_
\bc_
\br_
\by_
\bp_
\bt_
\be_
\bd_
\bD_
\ba_
\bt_
\ba.
39 k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt(), and k
\bkr
\brb
\bb5
\b5_
\b_d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt_
\b_E
\bEn
\bnc
\bcr
\bry
\byp
\bpt
\bte
\bed
\bdD
\bDa
\bat
\bta
\ba() works similarly.
41 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
42 krb5_create_checksum(3), krb5_crypto_init(3)
44 HEIMDAL April 7, 1999 1