Home
last modified time | relevance | path

Searched refs:key_block (Results 1 – 3 of 3) sorted by relevance

/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c630 uchar_t key_block[MAX_KEYBLOCK], *kb, *export_keys = NULL; in soft_ssl_key_and_mac_derive() local
707 MD5Final(key_block, &exp_md5_ctx); in soft_ssl_key_and_mac_derive()
708 bcopy(key_block, kmo->pIVClient, iv_bytes); in soft_ssl_key_and_mac_derive()
715 MD5Final(key_block, &exp_md5_ctx); in soft_ssl_key_and_mac_derive()
716 bcopy(key_block, kmo->pIVServer, iv_bytes); in soft_ssl_key_and_mac_derive()
750 kb = key_block; in soft_ssl_key_and_mac_derive()
/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c111 krb5_keyblock * key_block, krb5_enctype etype, krb5_data *);
695 krb5_keyblock *key_block, argument
713 assert((as_rep != NULL) && (key_block != NULL));
811 client_key_len, key_block);
852 key_block);
898 key_block);
H A Dpkinit_crypto_openssl.c2085 krb5_keyblock * key_block) in pkinit_octetstring2key() argument
2121 key_block->magic = KV5M_KEYBLOCK; in pkinit_octetstring2key()
2122 key_block->enctype = etype; in pkinit_octetstring2key()
2128 key_block->length = keylength; in pkinit_octetstring2key()
2129 key_block->contents = calloc(keylength, sizeof(unsigned char *)); in pkinit_octetstring2key()
2130 if (key_block->contents == NULL) { in pkinit_octetstring2key()
2138 retval = krb5_c_random_to_key(context, etype, &random_data, key_block); in pkinit_octetstring2key()
2143 if (retval && key_block->contents != NULL && key_block->length != 0) { in pkinit_octetstring2key()
2144 (void) memset(key_block->contents, 0, key_block->length); in pkinit_octetstring2key()
2145 key_block->length = 0; in pkinit_octetstring2key()