Lines Matching refs:keys
119 dh_key_set_t keys /* The session keys to sign the token */)
193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys))
215 dh_key_set_t keys /* The keys to encrypt the check sum with */)
246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys))
382 * session keys established, so that keys is null. The unencrypted
384 * caller can then attempt to decrypt the session keys in token
385 * and encrypt the returned sig with those keys to check the
399 * session keys should always be supplied to this routine. The message
406 dh_key_set_t keys /* The session keys */)
420 if ((stat = __xdr_decode_token(&xdrs, msg, token, keys, &sig))
437 * token_desc pointed to by objp, using keys to encrypt the signature. If
446 dh_token_desc *objp, dh_key_set_t keys)
460 xdr_getpos(xdrs), msg, keys,
477 * returned to the caller in sig. If the supplied keys are available this
481 * the keys have not yet been established. So we just give the caller back
484 * to decrypt the session keys and call __verify_sig with the decrypted
485 * session keys the signature returned from this routine and the deserialized
493 dh_token_desc *objp, dh_key_set_t keys, dh_signature_t sig)
512 * supplied keys if they are available. If keys is null the signature
516 xdr_getpos(xdrs), msg, keys, sig);
525 * If we have keys then we can check that the signatures
528 if (keys && !__cmpsig(sig, &objp->verifier))