Searched defs:context (Results 251 - 275 of 504) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Dderive.c133 * initialize the derived key values in the context.
136 init_derived_keydata(krb5_context context, argument
173 rv = krb5_derive_key(context, enc, key,
176 krb5_free_keyblock(context, *d_encr_key);
184 krb5_free_keyblock(context, *d_encr_key);
212 rv = krb5_derive_key(context, enc, key, *d_hmac_key, &d1);
214 krb5_free_keyblock(context, *d_hmac_key);
225 if ((*d_hmac_key)->kef_mt != context->kef_hash_mt) {
226 (*d_hmac_key)->kef_mt = context->kef_hash_mt;
235 krb5_free_keyblock(context, *d_hmac_ke
[all...]
H A Ddk_encrypt.c58 krb5_dk_encrypt(krb5_context context, argument
79 ret = init_derived_keydata(context, enc,
103 if ((ret = krb5_c_random_make_octets(context, &d1)))
121 if ((ret = ((*(enc->encrypt))(context, derived_encr_key,
138 if ((ret = krb5_hmac(context, derived_hmac_key, &d1, &d2))) {
143 if ((ret = krb5_hmac(context, hash, derived_hmac_key,
185 trunc_hmac (krb5_context context, argument
203 ret = krb5_hmac(context, ki, input, &tmphash);
205 ret = krb5_hmac(context, hash, ki, num, input, &tmphash);
220 krb5int_aes_dk_encrypt(krb5_context context, argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Darcfour_provider.c73 k5_arcfour_decrypt(krb5_context context, argument
112 * context record is properly initialized.
114 if (!context->arcfour_ctx.initialized) {
115 session = krb_ctx_hSession(context);
120 session = context->arcfour_ctx.dSession;
122 if (context->arcfour_ctx.dKey == CK_INVALID_HANDLE) {
124 /* Use the long-term key object in the RC4 context area */
125 kptr = &context->arcfour_ctx.dKey;
149 if (context->arcfour_ctx.initialized)
190 k5_arcfour_encrypt(krb5_context context, argument
297 k5_arcfour_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument
328 k5_arcfour_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dunparse.c174 k5_unparse_name(krb5_context context, krb5_const_principal principal, argument
200 ret = krb5_get_default_realm(context, &default_realm);
204 krb5_princ_realm(context, &p)->length = strlen(default_realm);
205 krb5_princ_realm(context, &p)->data = default_realm;
207 if (krb5_realm_compare(context, &p, principal))
212 totalsize += component_length_quoted(krb5_princ_realm(context,
218 nelem = krb5_princ_size(context, principal);
222 cp = krb5_princ_component(context, principal, i)->data;
224 totalsize += component_length_quoted(krb5_princ_component(context, principal, i), flags);
260 cp = krb5_princ_component(context, principa
288 krb5_unparse_name(krb5_context context, krb5_const_principal principal, register char **name) argument
297 krb5_unparse_name_ext(krb5_context context, krb5_const_principal principal, char **name, unsigned int *size) argument
304 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument
313 krb5_unparse_name_flags_ext(krb5_context context, krb5_const_principal principal, int flags, char **name, unsigned int *size) argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dgssapi_krb5.c186 kg_sync_ccache_name (krb5_context context, OM_uint32 *minor_status) argument
191 * Sync up the context ccache name with the GSSAPI ccache name.
194 * be picked up and used by resetting the context default ccache.
199 /* if NULL, resets the context default ccache */
200 err = krb5_cc_set_default_name(context,
238 krb5_context context = NULL; local
240 /* Reset the context default ccache (see text above), and then
242 err = krb5_gss_init_context(&context);
244 err = krb5_cc_set_default_name (context, NULL);
246 name = krb5_cc_default_name(context);
[all...]
H A Dk5seal.c56 make_seal_token_v1 (krb5_context context, argument
99 context->kef_cipher_mt = get_cipher_mech_type(context, seq);
100 context->kef_hash_mt = get_hash_mech_type(context, seq);
101 if ((code = init_key_kef(context->kef_cipher_mt, seq))) {
104 if ((code = init_key_kef(context->kef_cipher_mt, enc))) {
112 conflen = kg_confounder_size(context, enc);
186 code = krb5_c_checksum_length(context, md5cksum.checksum_type, &sumlen);
201 if ((code = kg_make_confounder(context, en
382 krb5_context context; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_digest.c55 * CRYPTO_INVALID_CONTEXT: Not a valid context.
117 /* no crypto context to carry between multiple parts. */
165 /* no crypto context to carry between multiple parts. */
229 /* Allocate and initialize the canonical context */
321 * context: A crypto_context_t initialized by digest_init().
336 crypto_digest_update(crypto_context_t context, crypto_data_t *data, argument
339 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
370 * context: A crypto_context_t initialized by digest_init().
385 crypto_digest_final(crypto_context_t context, crypto_data_t *digest, argument
388 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
422 crypto_digest_key_prov(crypto_context_t context, crypto_key_t *key, crypto_call_req_t *cr) argument
456 crypto_digest_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *cr) argument
[all...]
H A Dkcf_mac.c54 * CRYPTO_INVALID_CONTEXT: Not a valid context.
75 * tmpl: a crypto_ctx_template_t, opaque template of a context of a
151 * For SW providers, check the validity of the context template
275 * For SW providers, check the validity of the context template
347 * tmpl: a crypto_ctx_template_t, opaque template of a context of a
358 * context from the context template, tmpl.
392 /* Allocate and initialize the canonical context */
455 * For SW providers, check the validity of the context template
507 * context
522 crypto_mac_update(crypto_context_t context, crypto_data_t *data, crypto_call_req_t *cr) argument
571 crypto_mac_final(crypto_context_t context, crypto_data_t *mac, crypto_call_req_t *cr) argument
607 crypto_mac_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *mac, crypto_call_req_t *cr) argument
[all...]
H A Dkcf_sign.c67 /* Allocate and initialize the canonical context */
111 * For SW providers, check the validity of the context template
146 crypto_sign_single(crypto_context_t context, crypto_data_t *data, argument
149 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
174 crypto_sign_update(crypto_context_t context, crypto_data_t *data, argument
177 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, argument
204 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
279 * For SW providers, check the validity of the context template
319 /* no crypto context t
431 crypto_sign_recover_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument
[all...]
H A Dkcf_verify.c67 /* Allocate and initialize the canonical context */
112 * For SW providers, check the validity of the context template
147 crypto_verify_single(crypto_context_t context, crypto_data_t *data, argument
150 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
175 crypto_verify_update(crypto_context_t context, crypto_data_t *data, argument
179 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, argument
206 crypto_ctx_t *ctx = (crypto_ctx_t *)context;
281 * For SW providers, check the validity of the context template
322 /* no crypto context t
433 crypto_verify_recover_single(crypto_context_t context, crypto_data_t *signature, crypto_data_t *data, crypto_call_req_t *cr) argument
[all...]
/illumos-gate/usr/src/test/zfs-tests/cmd/mktree/
H A Dmktree.c152 char *context = "0123456789ABCDF"; local
161 for (i = 0; i < size / strlen(context); i++) {
162 int offset = i * strlen(context);
163 (void) snprintf(pbuf+offset, size-offset, "%s", context);
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/
H A Discsit_authclient.c146 MD5_CTX context; local
148 MD5Init(&context);
154 MD5Update(&context, resp, 1);
159 MD5Update(&context, (uchar_t *)password, password_len);
164 MD5Update(&context, chap_c, challenge_len);
166 MD5Final(resp, &context);
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A DiscsiAuthClientGlue.c50 IscsiAuthMd5Context context; local
166 iscsiAuthMd5Init(&context);
172 iscsiAuthMd5Update(&context, verifyData, 1);
177 iscsiAuthMd5Update(&context,
184 iscsiAuthMd5Update(&context,
188 iscsiAuthMd5Final(verifyData, &context);
251 iscsiAuthMd5Init(IscsiAuthMd5Context * context) argument
253 MD5Init(context);
258 iscsiAuthMd5Update(IscsiAuthMd5Context *context, uchar_t *data, argument
261 MD5Update(context, dat
266 iscsiAuthMd5Final(uchar_t *hash, IscsiAuthMd5Context *context) argument
[all...]
H A Dradius_packet.c169 MD5_CTX context; local
251 MD5Init(&context);
253 MD5Update(&context, &packet->code, 1);
254 MD5Update(&context, &packet->identifier, 1);
255 MD5Update(&context, packet->length, 2);
256 MD5Update(&context, req_authenticator, RAD_AUTHENTICATOR_LEN);
260 MD5Update(&context, packet->data,
263 MD5Update(&context, shared_secret, shared_secret_len);
264 MD5Final(md5_digest, &context);
/illumos-gate/usr/src/uts/common/io/xge/hal/include/
H A Dxge-queue.h69 * @context: Opaque (void*) "context", for instance event producer object.
80 void *context; member in struct:xge_queue_item_t
85 * @data: Per-queue context independent of the event. E.g., device handle.
151 xge_queue_produce(xge_queue_h queueh, int event_type, void *context,
155 xge_queue_produce_context(xge_queue_h queueh, int event_type, void *context) { argument
156 return xge_queue_produce(queueh, event_type, context, 0, 0, 0);
/illumos-gate/usr/src/uts/common/io/xge/hal/xgehal/
H A Dxge-queue.c123 * @context: Opaque (void*) "context", for instance event producer object.
139 xge_queue_produce(xge_queue_h queueh, int event_type, void *context, argument
225 elem->context = context;
/illumos-gate/usr/src/lib/krb5/kadm5/
H A Dkadm_host_srv_names.c25 kadm5_get_master(krb5_context context, const char *realm, char **master) argument
41 krb5_get_default_realm(context, &def_realm);
43 (void) profile_get_string(context->profile, "realms",
58 dns_ret = krb5_get_servername(context, &dns_realm,
71 krb5_free_default_realm(context, def_realm);
83 kadm5_get_kpasswd(krb5_context context, const char *realm, char **kpasswd) argument
97 ret = krb5_get_default_realm(context, &def_realm);
102 (void) profile_get_string(context->profile, "realms",
122 dns_ret = krb5_get_servername(context, &dns_realm,
151 kadm5_get_adm_host_srv_name(krb5_context context, argument
180 kadm5_get_cpw_host_srv_name(krb5_context context, const char *realm, char **host_service_name) argument
213 kadm5_get_kiprop_host_srv_name(krb5_context context, const char *realm, char **host_service_name) argument
240 kadm5_is_master(krb5_context context, const char *realm, krb5_boolean *is_master) argument
[all...]
H A Dserver_internal.h54 krb5_context context; member in struct:_kadm5_server_handle_t
110 kadm5_ret_t krb5_copy_key_data_contents(krb5_context context,
113 kadm5_ret_t krb5_free_key_data_contents(krb5_context context,
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb_default.c143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd)
144 krb5_context context;
154 krb5_data *realm = krb5_princ_realm(context, mname);
182 krb5_set_error_message (context, e,
208 krb5_db_def_fetch_mkey( krb5_context context, argument
217 krb5_data *realm = krb5_princ_realm(context, mname);
284 krb5_def_verify_master_key(context, mprinc, mkey)
285 krb5_context context;
296 if ((retval = krb5_db_get_principal(context, mprinc,
302 krb5_db_free_principal(context,
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_pwd_policy.c52 krb5_ldap_create_password_policy (context, policy)
53 krb5_context context;
65 krb5_clear_error_message(context);
74 st = krb5_ldap_name_to_policydn (context, policy->name, &policy_dn);
82 krb5_set_error_message(context, st, gettext("Invalid password policy DN syntax"));
108 st = set_ldap_error (context, st, OP_ADD);
128 krb5_ldap_put_password_policy (context, policy)
129 krb5_context context;
141 krb5_clear_error_message(context);
150 st = krb5_ldap_name_to_policydn (context, polic
186 populate_policy(krb5_context context, LDAP *ld, LDAPMessage *ent, char *pol_name, osa_policy_ent_t pol_entry) argument
221 krb5_ldap_get_password_policy_from_dn(krb5_context context, char *pol_name, char *pol_dn, osa_policy_ent_t *policy, int *cnt) argument
[all...]
/illumos-gate/usr/src/lib/libadt_jni/com/sun/audit/
H A DAuditSession.java55 byte[] context, long flags)
68 String hostname, int context)
86 public AuditSession(byte[] context) { argument
96 sh = startSession(context, 0);
113 // exportSession() and the "context" parameter to
186 // for the context input to setUser(). If the user has
189 // ADT_UPDATE. If the process audit context is already set,
205 String hostname, int context) {
210 hostname, context);
54 startSession( byte[] context, long flags) argument
66 sessionAttr(byte[] sessionHandle, int euid, int egid, int ruid, int rgid, String hostname, int context) argument
204 setUser(int euid, int egid, int ruid, int rgid, String hostname, int context) argument
/illumos-gate/usr/src/uts/intel/io/pciex/
H A Dpcie_acpi.c47 void *context, void **ret);
49 void *context, void **ret);
257 pcie_walk_obj_namespace(ACPI_HANDLE hdl, uint32_t nl, void *context, argument
285 pcie_print_acpi_name(ACPI_HANDLE hdl, uint32_t nl, void *context, void **ret) argument
295 PCIE_DBG("%s %s \n", (char *)context, name);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dsend_tgs.c56 krb5_send_tgs_basic(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf) argument
66 if ((retval = krb5_c_make_checksum(context, context->kdc_req_sumtype,
80 if ((retval = krb5_us_timeofday(context, &authent.ctime,
104 if ((retval = krb5_encrypt_helper(context, &in_cred->keyblock,
122 krb5_free_ticket(context, request.ticket);
134 krb5_send_tgs(krb5_context context, krb5_flags kdcoptions, argument
141 return (krb5_send_tgs2(context, kdcoptions,
156 krb5_send_tgs2(krb5_context context, krb5_flags kdcoptions, argument
195 if ((retval = krb5_timeofday(context,
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_context.c100 krb5_context context; local
112 /* validate the context handle */
127 context = ctx->k5_context;
129 if ((code = krb5_timeofday(context, &now))) {
131 save_error_info(*minor_status, context);
141 if ((code = krb5_copy_principal(context,
145 save_error_info(*minor_status, context);
149 krb5_free_principal(context, initiator);
156 if ((code = krb5_copy_principal(context,
159 if (initiator) krb5_free_principal(context, initiato
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSession.h42 void *context; member in struct:crypto_active_op
95 crypto_active_op_t digest; /* context of active digest operation */
96 crypto_active_op_t encrypt; /* context of active encrypt op */
97 crypto_active_op_t decrypt; /* context of active decrypt op */
98 crypto_active_op_t sign; /* context of active sign op */
99 crypto_active_op_t verify; /* context of active verify op */

Completed in 97 milliseconds

<<11121314151617181920>>