Lines Matching refs:keys

158 	dh_key_set keys;
175 /* Package the context session keys into a key_set */
176 keys.dh_key_set_len = ctx->no_keys;
177 keys.dh_key_set_val = ctx->keys;
180 return (__make_token(output, NULL, &token, &keys));
245 * establish_session_keys: This routine decrypts the session keys supplied
246 * and uses those keys to verifiy the signature over the input token
251 dh_key_set_t keys, dh_signature_t sig, dh_token_t token)
261 * mechanism uses a cache of public keys, then get the public key
269 if ((saved_keys = New(des_block, keys->dh_key_set_len)) == NULL)
272 for (i = 0; i < keys->dh_key_set_len; i++)
273 saved_keys[i] = keys->dh_key_set_val[i];
283 * We will try to decrypt the session keys up to two times.
285 * public key cache, if the set of session keys fail to
287 * token, and those session keys were decrypted by a key
295 * Decrypt the session keys using the mechanism specific
302 keys->dh_key_set_val,
303 keys->dh_key_set_len,
311 fprintf(stderr, "Received session keys %s the cache:\n",
313 for (i = 0; i < keys->dh_key_set_len; i++)
315 keys->dh_key_set_val[i].key.high,
316 keys->dh_key_set_val[i].key.low);
325 if ((stat = __verify_sig(token, DH_MECH_QOP, keys, sig)) ==
333 /* Restore the keys and signature for retry */
334 for (j = 0; j < keys->dh_key_set_len; j++)
335 keys->dh_key_set_val[j] = saved_keys[j];
449 /* Decrypt the session keys and verify the signature */
451 &clnt->keys,
501 /* Stash a copy of the session keys for the context */
502 g_cntx->no_keys = clnt->keys.dh_key_set_len;
503 if ((g_cntx->keys = New(des_block, g_cntx->no_keys)) == NULL) {
510 g_cntx->keys[i] = clnt->keys.dh_key_set_val[i];
562 Free(g_cntx->keys);
586 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */
590 /* Create key_set for session keys */
591 if ((keys.dh_key_set_val = New(des_block, cntx->no_keys)) == NULL)
594 keys.dh_key_set_len = cntx->no_keys;
596 keys.dh_key_set_val[i] = cntx->keys[i];
615 /* set the tokens keys */
616 remote->keys = keys;
619 /* Encrypt the keys for the other side */
622 keys.dh_key_set_val,
624 Free(keys.dh_key_set_val);
628 /* Package up our session keys */
630 ukeys.dh_key_set_val = cntx->keys;
638 /* We're don with the encrypted session keys */
639 Free(keys.dh_key_set_val);
702 dh_gss_ctx->keys = New(des_block, 3);
703 if (dh_gss_ctx->keys == NULL) {
709 if (dh_keyopts.key_gendeskeys(dh_gss_ctx->keys, 3)) {
718 fprintf(stderr, "Generated session keys:\n");
721 dh_gss_ctx->keys[i].key.high,
722 dh_gss_ctx->keys[i].key.low);
772 Free(dh_gss_ctx->keys);
793 dh_key_set keys;
806 /* Package the session keys for __get_token) */
807 keys.dh_key_set_len = dh_gss_ctx->no_keys;
808 keys.dh_key_set_val = dh_gss_ctx->keys;
810 /* Deserialize the input token into tok using the session keys */
811 if (*minor = __get_token(token, NULL, &tok, &keys))