Lines Matching defs:key

16 /* from a random bitstrem, construct a key */
23 const krb5_keyblock *key,
34 if ((rv = get_algo(key->enctype, algos)) != CKR_OK) {
53 template[4].pValue = key->contents;
54 template[4].ulValueLen = key->length;
56 /* Create an object handle for the key */
74 const krb5_keyblock *key, const krb5_data *state,
90 if (key->length != 16)
104 * Normally, the RC4 key is used as a single operation
107 * use a short-term key object defined locally. We don't
116 /* Just use a local, 1-time only key object */
124 /* Use the long-term key object in the RC4 context area */
130 ret = setup_arcfour_crypto(session, key, &algos, kptr);
174 /* If we used a 1-time only key object, destroy it now */
179 KRB5_LOG(KRB5_INFO, "key->kef_mt = %ld", (ulong_t) key->kef_mt);
181 input->length, (krb5_keyblock *)key, NULL, 0);
191 const krb5_keyblock *key, const krb5_data *state,
207 if (key->length != 16)
216 * for an explanation of why the key handles are initialized
232 ret = setup_arcfour_crypto(session, key, &algos, kptr);
285 KRB5_LOG1(KRB5_INFO, "key->kef_mt = %ld key->key_tmpl = %ld",
286 (ulong_t) key->kef_mt, (ulong_t) key->key_tmpl);
288 input->length, (krb5_keyblock *)key, NULL, 1);
298 const krb5_data *randombits, krb5_keyblock *key)
303 if (key->length != 16)
308 key->magic = KV5M_KEYBLOCK;
309 key->length = 16;
310 key->dk_list = NULL;
312 key->kef_key.ck_data = NULL;
313 key->key_tmpl = NULL;
314 ret = init_key_kef(context->kef_cipher_mt, key);
316 key->hKey = CK_INVALID_HANDLE;
317 ret = init_key_uef(krb_ctx_hSession(context), key);
320 bcopy(randombits->data, key->contents, randombits->length);
329 const krb5_keyblock *key,