Lines Matching defs:keys

90  * of keys is odd
93 * If we have an even number of keys and additional encryption will be
104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len,
124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
138 * If we have an even number of keys then do an extra round of
142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
158 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode)
166 if (keys->dh_key_set_len < 1)
180 stat = __desN_crypt(keys->dh_key_set_val, keys->dh_key_set_len,
194 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode)
202 if (keys->dh_key_set_len < 1)
207 stat = cbc_crypt(keys->dh_key_set_val[0].c, (char *)buf->value,
224 * hold the signature after its been encrypted. If keys is null, then
231 dh_key_set_t keys, /* Optiona keys to be used with the above */
235 gss_buffer_desc buf; /* GSS buffer to hold keys for cipher routine */
253 /* If we have keys encrypt it */
254 if (keys != NULL)
255 return (signer(&buf, keys, ENCIPHER));
359 * given length and an optional message. We use the supplied keys to
368 dh_key_set_t keys, /* The optional encryption keys */
389 * Calculate the signature using the supplied keys. If keys
393 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig);
405 dh_key_set_t keys, /* The context session keys */
424 /* Encrypt the check sum using the supplied set of keys */
425 if ((stat = (*cipher)(&buf, keys, ENCIPHER)) != DH_SUCCESS)
507 dh_key_set_t keys, /* The session keys */
511 _NOTE(ARGUNUSED(conf_req,keys))
560 dh_key_set_t keys, /* The session keys to decrypt if conf_req */
563 _NOTE(ARGUNUSED(keys))