Lines Matching defs:context
73 k5_arcfour_decrypt(krb5_context context,
112 * context record is properly initialized.
114 if (!context->arcfour_ctx.initialized) {
115 session = krb_ctx_hSession(context);
120 session = context->arcfour_ctx.dSession;
122 if (context->arcfour_ctx.dKey == CK_INVALID_HANDLE) {
124 /* Use the long-term key object in the RC4 context area */
125 kptr = &context->arcfour_ctx.dKey;
149 if (context->arcfour_ctx.initialized)
190 k5_arcfour_encrypt(krb5_context context,
219 if (!context->arcfour_ctx.initialized) {
220 session = krb_ctx_hSession(context);
224 session = context->arcfour_ctx.eSession;
225 if (context->arcfour_ctx.eKey == 0) {
226 kptr = &context->arcfour_ctx.eKey;
255 if (context->arcfour_ctx.initialized)
297 k5_arcfour_make_key(krb5_context context,
314 ret = init_key_kef(context->kef_cipher_mt, key);
317 ret = init_key_uef(krb_ctx_hSession(context), key);
328 k5_arcfour_init_state (krb5_context context,
334 if (!context->arcfour_ctx.initialized) {
335 retval = krb5_open_pkcs11_session(&context->arcfour_ctx.eSession);
338 retval = krb5_open_pkcs11_session(&context->arcfour_ctx.dSession);
341 context->arcfour_ctx.initialized = 1;
342 context->arcfour_ctx.eKey = CK_INVALID_HANDLE;
343 context->arcfour_ctx.dKey = CK_INVALID_HANDLE;