Lines Matching refs:key
38 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec,
46 /* key->enctype was checked by the caller */
48 if (key->length != 24)
59 (krb5_keyblock *)key,
69 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec,
72 return(k5_des3_docrypt(context, key, ivec, input, output, 1));
77 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec,
80 return(k5_des3_docrypt(context, key, ivec, input, output, 0));
85 krb5_keyblock *key)
92 if (key->length != 24)
97 key->magic = KV5M_KEYBLOCK;
98 key->length = 24;
99 key->dk_list = NULL;
102 8 key bytes, then compute the parity bits. Do this three times. */
105 (void) memcpy(key->contents+i*8, randombits->data+i*7, 7);
106 key->contents[i*8+7] = (((key->contents[i*8]&1)<<1) |
107 ((key->contents[i*8+1]&1)<<2) |
108 ((key->contents[i*8+2]&1)<<3) |
109 ((key->contents[i*8+3]&1)<<4) |
110 ((key->contents[i*8+4]&1)<<5) |
111 ((key->contents[i*8+5]&1)<<6) |
112 ((key->contents[i*8+6]&1)<<7));
114 mit_des_fixup_key_parity(key->contents+i*8);
117 key->kef_key.ck_data = NULL;
118 key->key_tmpl = NULL;
119 ret = init_key_kef(context->kef_cipher_mt, key);
121 key->hKey = CK_INVALID_HANDLE;
122 ret = init_key_uef(krb_ctx_hSession(context), key);