Lines Matching defs:key

35 	const krb5_keyblock *key, const krb5_data *ivec,
56 ASSERT(key != NULL);
57 ASSERT(key->key_tmpl != NULL);
58 ASSERT(key->kef_mt == crypto_mech2id(SUN_CKM_AES_CBC));
103 input->length, (krb5_keyblock *)key,
210 mech.cm_type = key->kef_mt;
222 ret = crypto_encrypt(&mech, &pt, (crypto_key_t *)&key->kef_key,
223 key->key_tmpl, &ct, NULL);
270 const krb5_keyblock *key, const krb5_data *ivec,
291 assert(key != NULL);
316 rv = get_algo(key->enctype, &algos);
321 rv = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key);
340 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
487 const krb5_keyblock *key, const krb5_data *ivec,
502 ASSERT(key != NULL);
503 ASSERT(key->kef_mt == crypto_mech2id(SUN_CKM_AES_CBC));
574 input->length, (krb5_keyblock *)key,
620 output->data, length, (krb5_keyblock *)key,
648 (krb5_keyblock *)key, &tmp_ivec, FALSE);
687 length, (krb5_keyblock *)key,
722 const krb5_keyblock *key, const krb5_data *ivec,
738 assert(key != NULL);
763 rv = get_algo(key->enctype, &algos);
768 rv = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key);
827 key->hKey);
873 &mechanism, key->hKey);
911 key->hKey);
967 key->hKey);
1013 const krb5_data *randombits, krb5_keyblock *key)
1016 if (key->length != 16 && key->length != 32)
1018 if (randombits->length != key->length)
1021 key->magic = KV5M_KEYBLOCK;
1022 key->dk_list = NULL;
1025 key->kef_key.ck_data = NULL;
1026 key->key_tmpl = NULL;
1027 (void) memcpy(key->contents, randombits->data, randombits->length);
1028 ret = init_key_kef(context->kef_cipher_mt, key);
1030 key->hKey = CK_INVALID_HANDLE;
1031 (void) memcpy(key->contents, randombits->data, randombits->length);
1032 ret = init_key_uef(krb_ctx_hSession(context), key);
1041 krb5int_aes_init_state(krb5_context context, const krb5_keyblock *key,