/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 133 * initialize the derived key values in the context. 136 init_derived_keydata(krb5_context context, argument 173 rv = krb5_derive_key(context, enc, key, 176 krb5_free_keyblock(context, *d_encr_key); 184 krb5_free_keyblock(context, *d_encr_key); 212 rv = krb5_derive_key(context, enc, key, *d_hmac_key, &d1); 214 krb5_free_keyblock(context, *d_hmac_key); 225 if ((*d_hmac_key)->kef_mt != context->kef_hash_mt) { 226 (*d_hmac_key)->kef_mt = context->kef_hash_mt; 235 krb5_free_keyblock(context, *d_hmac_ke [all...] |
H A D | dk_encrypt.c | 58 krb5_dk_encrypt(krb5_context context, argument 79 ret = init_derived_keydata(context, enc, 103 if ((ret = krb5_c_random_make_octets(context, &d1))) 121 if ((ret = ((*(enc->encrypt))(context, derived_encr_key, 138 if ((ret = krb5_hmac(context, derived_hmac_key, &d1, &d2))) { 143 if ((ret = krb5_hmac(context, hash, derived_hmac_key, 185 trunc_hmac (krb5_context context, argument 203 ret = krb5_hmac(context, ki, input, &tmphash); 205 ret = krb5_hmac(context, hash, ki, num, input, &tmphash); 220 krb5int_aes_dk_encrypt(krb5_context context, argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 73 k5_arcfour_decrypt(krb5_context context, argument 112 * context record is properly initialized. 114 if (!context->arcfour_ctx.initialized) { 115 session = krb_ctx_hSession(context); 120 session = context->arcfour_ctx.dSession; 122 if (context->arcfour_ctx.dKey == CK_INVALID_HANDLE) { 124 /* Use the long-term key object in the RC4 context area */ 125 kptr = &context->arcfour_ctx.dKey; 149 if (context->arcfour_ctx.initialized) 190 k5_arcfour_encrypt(krb5_context context, argument 297 k5_arcfour_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument 328 k5_arcfour_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | unparse.c | 174 k5_unparse_name(krb5_context context, krb5_const_principal principal, argument 200 ret = krb5_get_default_realm(context, &default_realm); 204 krb5_princ_realm(context, &p)->length = strlen(default_realm); 205 krb5_princ_realm(context, &p)->data = default_realm; 207 if (krb5_realm_compare(context, &p, principal)) 212 totalsize += component_length_quoted(krb5_princ_realm(context, 218 nelem = krb5_princ_size(context, principal); 222 cp = krb5_princ_component(context, principal, i)->data; 224 totalsize += component_length_quoted(krb5_princ_component(context, principal, i), flags); 260 cp = krb5_princ_component(context, principa 288 krb5_unparse_name(krb5_context context, krb5_const_principal principal, register char **name) argument 297 krb5_unparse_name_ext(krb5_context context, krb5_const_principal principal, char **name, unsigned int *size) argument 304 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument 313 krb5_unparse_name_flags_ext(krb5_context context, krb5_const_principal principal, int flags, char **name, unsigned int *size) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | gssapi_krb5.c | 186 kg_sync_ccache_name (krb5_context context, OM_uint32 *minor_status) argument 191 * Sync up the context ccache name with the GSSAPI ccache name. 194 * be picked up and used by resetting the context default ccache. 199 /* if NULL, resets the context default ccache */ 200 err = krb5_cc_set_default_name(context, 238 krb5_context context = NULL; local 240 /* Reset the context default ccache (see text above), and then 242 err = krb5_gss_init_context(&context); 244 err = krb5_cc_set_default_name (context, NULL); 246 name = krb5_cc_default_name(context); [all...] |
H A D | k5seal.c | 56 make_seal_token_v1 (krb5_context context, argument 99 context->kef_cipher_mt = get_cipher_mech_type(context, seq); 100 context->kef_hash_mt = get_hash_mech_type(context, seq); 101 if ((code = init_key_kef(context->kef_cipher_mt, seq))) { 104 if ((code = init_key_kef(context->kef_cipher_mt, enc))) { 112 conflen = kg_confounder_size(context, enc); 186 code = krb5_c_checksum_length(context, md5cksum.checksum_type, &sumlen); 201 if ((code = kg_make_confounder(context, en 382 krb5_context context; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 55 * CRYPTO_INVALID_CONTEXT: Not a valid context. 117 /* no crypto context to carry between multiple parts. */ 165 /* no crypto context to carry between multiple parts. */ 229 /* Allocate and initialize the canonical context */ 321 * context: A crypto_context_t initialized by digest_init(). 336 crypto_digest_update(crypto_context_t context, crypto_data_t *data, argument 339 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 370 * context: A crypto_context_t initialized by digest_init(). 385 crypto_digest_final(crypto_context_t context, crypto_data_t *digest, argument 388 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 422 crypto_digest_key_prov(crypto_context_t context, crypto_key_t *key, crypto_call_req_t *cr) argument 456 crypto_digest_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_mac.c | 54 * CRYPTO_INVALID_CONTEXT: Not a valid context. 75 * tmpl: a crypto_ctx_template_t, opaque template of a context of a 151 * For SW providers, check the validity of the context template 275 * For SW providers, check the validity of the context template 347 * tmpl: a crypto_ctx_template_t, opaque template of a context of a 358 * context from the context template, tmpl. 392 /* Allocate and initialize the canonical context */ 455 * For SW providers, check the validity of the context template 507 * context 522 crypto_mac_update(crypto_context_t context, crypto_data_t *data, crypto_call_req_t *cr) argument 571 crypto_mac_final(crypto_context_t context, crypto_data_t *mac, crypto_call_req_t *cr) argument 607 crypto_mac_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *mac, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_sign.c | 67 /* Allocate and initialize the canonical context */ 111 * For SW providers, check the validity of the context template 146 crypto_sign_single(crypto_context_t context, crypto_data_t *data, argument 149 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 174 crypto_sign_update(crypto_context_t context, crypto_data_t *data, argument 177 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, argument 204 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 279 * For SW providers, check the validity of the context template 319 /* no crypto context t 431 crypto_sign_recover_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_verify.c | 67 /* Allocate and initialize the canonical context */ 112 * For SW providers, check the validity of the context template 147 crypto_verify_single(crypto_context_t context, crypto_data_t *data, argument 150 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 175 crypto_verify_update(crypto_context_t context, crypto_data_t *data, argument 179 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, argument 206 crypto_ctx_t *ctx = (crypto_ctx_t *)context; 281 * For SW providers, check the validity of the context template 322 /* no crypto context t 433 crypto_verify_recover_single(crypto_context_t context, crypto_data_t *signature, crypto_data_t *data, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/test/zfs-tests/cmd/mktree/ |
H A D | mktree.c | 152 char *context = "0123456789ABCDF"; local 161 for (i = 0; i < size / strlen(context); i++) { 162 int offset = i * strlen(context); 163 (void) snprintf(pbuf+offset, size-offset, "%s", context);
|
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_authclient.c | 146 MD5_CTX context; local 148 MD5Init(&context); 154 MD5Update(&context, resp, 1); 159 MD5Update(&context, (uchar_t *)password, password_len); 164 MD5Update(&context, chap_c, challenge_len); 166 MD5Final(resp, &context);
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsiAuthClientGlue.c | 50 IscsiAuthMd5Context context; local 166 iscsiAuthMd5Init(&context); 172 iscsiAuthMd5Update(&context, verifyData, 1); 177 iscsiAuthMd5Update(&context, 184 iscsiAuthMd5Update(&context, 188 iscsiAuthMd5Final(verifyData, &context); 251 iscsiAuthMd5Init(IscsiAuthMd5Context * context) argument 253 MD5Init(context); 258 iscsiAuthMd5Update(IscsiAuthMd5Context *context, uchar_t *data, argument 261 MD5Update(context, dat 266 iscsiAuthMd5Final(uchar_t *hash, IscsiAuthMd5Context *context) argument [all...] |
H A D | radius_packet.c | 169 MD5_CTX context; local 251 MD5Init(&context); 253 MD5Update(&context, &packet->code, 1); 254 MD5Update(&context, &packet->identifier, 1); 255 MD5Update(&context, packet->length, 2); 256 MD5Update(&context, req_authenticator, RAD_AUTHENTICATOR_LEN); 260 MD5Update(&context, packet->data, 263 MD5Update(&context, shared_secret, shared_secret_len); 264 MD5Final(md5_digest, &context);
|
/illumos-gate/usr/src/uts/common/io/xge/hal/include/ |
H A D | xge-queue.h | 69 * @context: Opaque (void*) "context", for instance event producer object. 80 void *context; member in struct:xge_queue_item_t 85 * @data: Per-queue context independent of the event. E.g., device handle. 151 xge_queue_produce(xge_queue_h queueh, int event_type, void *context, 155 xge_queue_produce_context(xge_queue_h queueh, int event_type, void *context) { argument 156 return xge_queue_produce(queueh, event_type, context, 0, 0, 0);
|
/illumos-gate/usr/src/uts/common/io/xge/hal/xgehal/ |
H A D | xge-queue.c | 123 * @context: Opaque (void*) "context", for instance event producer object. 139 xge_queue_produce(xge_queue_h queueh, int event_type, void *context, argument 225 elem->context = context;
|
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | kadm_host_srv_names.c | 25 kadm5_get_master(krb5_context context, const char *realm, char **master) argument 41 krb5_get_default_realm(context, &def_realm); 43 (void) profile_get_string(context->profile, "realms", 58 dns_ret = krb5_get_servername(context, &dns_realm, 71 krb5_free_default_realm(context, def_realm); 83 kadm5_get_kpasswd(krb5_context context, const char *realm, char **kpasswd) argument 97 ret = krb5_get_default_realm(context, &def_realm); 102 (void) profile_get_string(context->profile, "realms", 122 dns_ret = krb5_get_servername(context, &dns_realm, 151 kadm5_get_adm_host_srv_name(krb5_context context, argument 180 kadm5_get_cpw_host_srv_name(krb5_context context, const char *realm, char **host_service_name) argument 213 kadm5_get_kiprop_host_srv_name(krb5_context context, const char *realm, char **host_service_name) argument 240 kadm5_is_master(krb5_context context, const char *realm, krb5_boolean *is_master) argument [all...] |
H A D | server_internal.h | 54 krb5_context context; member in struct:_kadm5_server_handle_t 110 kadm5_ret_t krb5_copy_key_data_contents(krb5_context context, 113 kadm5_ret_t krb5_free_key_data_contents(krb5_context context,
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb_default.c | 143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd) 144 krb5_context context; 154 krb5_data *realm = krb5_princ_realm(context, mname); 182 krb5_set_error_message (context, e, 208 krb5_db_def_fetch_mkey( krb5_context context, argument 217 krb5_data *realm = krb5_princ_realm(context, mname); 284 krb5_def_verify_master_key(context, mprinc, mkey) 285 krb5_context context; 296 if ((retval = krb5_db_get_principal(context, mprinc, 302 krb5_db_free_principal(context, [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_pwd_policy.c | 52 krb5_ldap_create_password_policy (context, policy) 53 krb5_context context; 65 krb5_clear_error_message(context); 74 st = krb5_ldap_name_to_policydn (context, policy->name, &policy_dn); 82 krb5_set_error_message(context, st, gettext("Invalid password policy DN syntax")); 108 st = set_ldap_error (context, st, OP_ADD); 128 krb5_ldap_put_password_policy (context, policy) 129 krb5_context context; 141 krb5_clear_error_message(context); 150 st = krb5_ldap_name_to_policydn (context, polic 186 populate_policy(krb5_context context, LDAP *ld, LDAPMessage *ent, char *pol_name, osa_policy_ent_t pol_entry) argument 221 krb5_ldap_get_password_policy_from_dn(krb5_context context, char *pol_name, char *pol_dn, osa_policy_ent_t *policy, int *cnt) argument [all...] |
/illumos-gate/usr/src/lib/libadt_jni/com/sun/audit/ |
H A D | AuditSession.java | 55 byte[] context, long flags) 68 String hostname, int context) 86 public AuditSession(byte[] context) { argument 96 sh = startSession(context, 0); 113 // exportSession() and the "context" parameter to 186 // for the context input to setUser(). If the user has 189 // ADT_UPDATE. If the process audit context is already set, 205 String hostname, int context) { 210 hostname, context); 54 startSession( byte[] context, long flags) argument 66 sessionAttr(byte[] sessionHandle, int euid, int egid, int ruid, int rgid, String hostname, int context) argument 204 setUser(int euid, int egid, int ruid, int rgid, String hostname, int context) argument
|
/illumos-gate/usr/src/uts/intel/io/pciex/ |
H A D | pcie_acpi.c | 47 void *context, void **ret); 49 void *context, void **ret); 257 pcie_walk_obj_namespace(ACPI_HANDLE hdl, uint32_t nl, void *context, argument 285 pcie_print_acpi_name(ACPI_HANDLE hdl, uint32_t nl, void *context, void **ret) argument 295 PCIE_DBG("%s %s \n", (char *)context, name);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | send_tgs.c | 56 krb5_send_tgs_basic(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf) argument 66 if ((retval = krb5_c_make_checksum(context, context->kdc_req_sumtype, 80 if ((retval = krb5_us_timeofday(context, &authent.ctime, 104 if ((retval = krb5_encrypt_helper(context, &in_cred->keyblock, 122 krb5_free_ticket(context, request.ticket); 134 krb5_send_tgs(krb5_context context, krb5_flags kdcoptions, argument 141 return (krb5_send_tgs2(context, kdcoptions, 156 krb5_send_tgs2(krb5_context context, krb5_flags kdcoptions, argument 195 if ((retval = krb5_timeofday(context, [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_context.c | 100 krb5_context context; local 112 /* validate the context handle */ 127 context = ctx->k5_context; 129 if ((code = krb5_timeofday(context, &now))) { 131 save_error_info(*minor_status, context); 141 if ((code = krb5_copy_principal(context, 145 save_error_info(*minor_status, context); 149 krb5_free_principal(context, initiator); 156 if ((code = krb5_copy_principal(context, 159 if (initiator) krb5_free_principal(context, initiato [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSession.h | 42 void *context; member in struct:crypto_active_op 95 crypto_active_op_t digest; /* context of active digest operation */ 96 crypto_active_op_t encrypt; /* context of active encrypt op */ 97 crypto_active_op_t decrypt; /* context of active decrypt op */ 98 crypto_active_op_t sign; /* context of active sign op */ 99 crypto_active_op_t verify; /* context of active verify op */
|