krb5_c_decrypt
ret = krb5_c_decrypt(context, *key, usage, NULL, &e, &decrypt);
krb5_c_decrypt (
retval = krb5_c_decrypt(context, state->armor_key,
ret = krb5_c_decrypt(context, key, KRB5_KEYUSAGE_PA_FX_COOKIE, NULL, &enc,
ret = krb5_c_decrypt(context, enc_tkt_req->session,
ret = krb5_c_decrypt(context, client_key,
ret = krb5_c_decrypt(context, challenge_key,
retval = krb5_c_decrypt(context, &key, KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS,
if (krb5_c_decrypt(context, &kb, test->usage, NULL, &enc,
krb5_c_decrypt (context, keyblock, 7, 0, &enc_out, &check));
krb5_c_decrypt (context, keyblock, 7, &state, &enc_out, &check));
krb5_c_decrypt (context, keyblock, 7, &state, &enc_out2, &check2));
krb5_c_decrypt (context, keyblock, 9, 0, &enc_out, &check));
t(krb5_c_decrypt(ctx, &kb_aes, 0, NULL, &out_aes, &decrypted));
krb5_c_decrypt(NULL, &kblock, 0, NULL, &outblock, &block);
ret = krb5_c_decrypt(NULL, &keyblock, 0, NULL, &input, &output);
return krb5_c_decrypt(context, eblock->key, 0, ivec ? &ivecd : 0,
ret = krb5_c_decrypt(context, key, 0, ivec ? &ivecd : 0, enc_data, data);
ret = krb5_c_decrypt(context, mkey, 0, 0, &cipher, &plain);
if ((retval = krb5_c_decrypt(context, srv_key,
retval = krb5_c_decrypt(context, state->armor_key,
ret = krb5_c_decrypt(context, as_key, KRB5_KEYUSAGE_PA_PKINIT_KX,
if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
retval = krb5_c_decrypt(context, challenge_key,
if ((retval = krb5_c_decrypt(context, sesskey,
retval = krb5_c_decrypt(context, armor_key, KRB5_KEYUSAGE_PA_OTP_REQUEST,
ret = krb5_c_decrypt(context, &client_key, KRB5_KEYUSAGE_PA_SAM_RESPONSE,
ret = krb5_c_decrypt(context, &sam_key,
retval = krb5_c_decrypt(context, &sam_key,
retval = krb5_c_decrypt(context, &client_key,
ret = krb5_c_decrypt(context, k1, KRB5_KEYUSAGE_SPAKE, NULL, &resp->factor,
ret = krb5_c_decrypt(context, k, 1024, NULL, &enc, &plain);
krb5_c_decrypt,