xref: /freebsd/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_keyblock.rst.txt (revision 7f2fe78b9dd5f51c821d771b63d2e096f6fd49e9)
1krb5_init_keyblock -  Initialize an empty krb5_keyblock .
2==========================================================
3
4..
5
6.. c:function:: krb5_error_code krb5_init_keyblock(krb5_context context, krb5_enctype enctype, size_t length, krb5_keyblock ** out)
7
8..
9
10
11:param:
12
13	          **[in]** **context** - Library context
14
15	          **[in]** **enctype** - Encryption type
16
17	          **[in]** **length** - Length of keyblock (or 0)
18
19	          **[out]** **out** - New keyblock structure
20
21
22..
23
24
25:retval:
26         -   0   Success; otherwise - Kerberos error codes
27
28
29..
30
31
32
33
34
35
36
37Initialize a new keyblock and allocate storage for the contents of the key. It is legal to pass in a length of 0, in which case contents are left unallocated. Use krb5_free_keyblock() to free *out* when it is no longer needed.
38
39
40
41
42
43
44
45
46
47
48..
49
50
51
52
53
54
55.. note::
56
57	 If *length* is set to 0, contents are left unallocated.
58
59
60
61
62