Lines Matching refs:key
38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key,
45 /* key->enctype was checked by the caller */
47 if (key->length != 8)
58 (krb5_keyblock *)key,
67 k5_des_encrypt(krb5_context context, krb5_const krb5_keyblock *key,
71 return(k5_des_docrypt(context, key, ivec, input, output, 1));
75 k5_des_decrypt(krb5_context context, krb5_const krb5_keyblock *key,
79 return(k5_des_docrypt(context, key, ivec, input, output, 0));
84 krb5_keyblock *key)
87 if (key->length != 8)
92 key->magic = KV5M_KEYBLOCK;
93 key->length = 8;
94 key->dk_list = NULL;
97 8 key bytes, then compute the parity bits */
99 (void) memcpy(key->contents, randombits->data, randombits->length);
100 key->contents[7] = (((key->contents[0]&1)<<1) | ((key->contents[1]&1)<<2) |
101 ((key->contents[2]&1)<<3) | ((key->contents[3]&1)<<4) |
102 ((key->contents[4]&1)<<5) | ((key->contents[5]&1)<<6) |
103 ((key->contents[6]&1)<<7));
105 mit_des_fixup_key_parity(key->contents);
108 key->kef_key.ck_data = NULL;
109 key->key_tmpl = NULL;
110 ret = init_key_kef(context->kef_cipher_mt, key);
112 key->hKey = CK_INVALID_HANDLE;
113 ret = init_key_uef(krb_ctx_hSession(context), key);