Lines Matching defs:token

150  * Generate an accept token for a context and channel binding puting the
151 * generated token output.
158 gss_buffer_t output /* The accept token */)
160 dh_token_desc token;
161 /* Grap a pointer to the context_t part of the token */
162 dh_cntx_t accept = &token.ver.dh_version_u.
168 token.ver.verno = ctx->proto_version;
169 /* Set the token type to be an ACCEPT token. */
170 token.ver.dh_version_u.body.type = DH_ACCEPT_CNTX;
185 /* Build the token */
186 return (__make_token(output, NULL, &token, &keys));
252 * and uses those keys to verifiy the signature over the input token
253 * match the signature in the token.
257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token)
293 * token, and those session keys were decrypted by a key
328 * deserialized token is the same as our calculation
331 if ((stat = __verify_sig(token, DH_MECH_QOP, keys, sig)) ==
353 * routine accepts a context establish token from the initator
354 * and optionally produces a token to send back to the initator to
374 dh_token_desc token;
423 * Deserialize the input into token, extracting the signature
425 * over the input token up to the signature.
428 if (*minor = __get_ap_token(input, dhctx->mech, &token, &sig)) {
434 /* set clnt to point to the init context part of token */
435 clnt = &token.ver.dh_version_u.body.dh_token_body_desc_u.init_context;
451 if (token.ver.verno != DH_PROTO_VERSION) {
460 &sig, &token)) != DH_SUCCESS) {
482 * need to send a token if the initiator requested mutual
488 /* Set the protocol version from the token */
489 g_cntx->proto_version = token.ver.verno;
524 /* Create output token if needed */
557 /* Tear down the deserialize token */
558 xdr_free(xdr_dh_token_desc, (char *)&token);
574 /* Release the signature and the deserialized token. */
576 xdr_free(xdr_dh_token_desc, (char *)&token);
583 * gen_init_token: create a token to pass to the other side
591 gss_buffer_t result /* The serialized token to send */)
593 dh_token_desc token; /* Unserialed token */
594 dh_init_context_t remote; /* init_context in token */
607 /* Initialize token from GSS context */
608 memset(&token, 0, sizeof (token));
609 token.ver.verno = cntx->proto_version;
610 token.ver.dh_version_u.body.type = DH_INIT_CNTX;
612 /* Set remote to init_context part of token */
613 remote = &token.ver.dh_version_u.body.dh_token_body_desc_u.init_context;
641 * Make an APPLICATION 0 token and place it in result.
643 * the token.
645 stat = __make_ap_token(result, dhctx->mech, &token, &ukeys);
659 * generate the output token to pass to the other side.
673 gss_buffer_t results /* Output token for the other side */)
762 /* Gennerate the output token to send to the other side */
796 * continue_context: Proccess the token from the otherside in the case
801 continue_context(OM_uint32 *minor, gss_buffer_t token,
814 if (token == NULL || token->length == 0)
821 /* Deserialize the input token into tok using the session keys */
822 if (*minor = __get_token(token, NULL, &tok, &keys))
837 /* Make sure this is the right type of token */
843 /* Grab a pointer to the context part of the token */
868 /* Release the deserialized token, tok */
883 * to the token received from the remote. The established context will