/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_md5.c | 46 CK_MECHANISM mechanism; local 48 mechanism.mechanism = CKM_MD5; 49 mechanism.pParameter = NULL_PTR; 50 mechanism.ulParameterLen = 0; 52 return(k5_ef_hash(context, &mechanism, icount, input, output));
|
H A D | hash_sha1.c | 42 CK_MECHANISM mechanism; local 44 mechanism.mechanism = CKM_SHA_1; 45 mechanism.pParameter = NULL_PTR; 46 mechanism.ulParameterLen = 0; 48 return(k5_ef_hash(context, &mechanism, icount, input, output));
|
H A D | hash_ef_generic.c | 10 CK_MECHANISM *mechanism, 19 if ((rv = C_DigestInit(krb_ctx_hSession(context), mechanism)) != 9 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_mac.c | 83 CK_MECHANISM mechanism; local 99 mechanism.mechanism = CKM_MD5; 100 mechanism.pParameter = 0; 101 mechanism.ulParameterLen = 0; 103 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 108 rv = C_DigestInit(hSession, &mechanism);
|
H A D | smb_crypt.c | 56 CK_MECHANISM mechanism; local 61 mechanism.mechanism = CKM_MD5; 62 mechanism.pParameter = 0; 63 mechanism.ulParameterLen = 0; 65 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 70 rv = C_DigestInit(hSession, &mechanism); 97 CK_MECHANISM mechanism; local 102 mechanism 150 CK_MECHANISM mechanism; local [all...] |
/osnet-11/usr/src/lib/libgss/ |
H A D | g_inquire_names.c | 36 gss_inquire_names_for_mech(minor_status, mechanism, name_types) 39 const gss_OID mechanism; 63 * select the approprate underlying mechanism routine and 67 mech = __gss_get_mechanism(mechanism); 74 mechanism, 123 char *mechanism; local 141 mechanism = mech_list[i]; 142 if (__gss_mech_to_oid(mechanism, &mechOid) == GSS_S_COMPLETE) {
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 55 CK_MECHANISM mechanism; local 90 mechanism.mechanism = CKM_MD5; 91 mechanism.pParameter = NULL_PTR; 92 mechanism.ulParameterLen = 0; 94 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
|
H A D | k5_md5des.c | 56 CK_MECHANISM mechanism; local 100 mechanism.mechanism = CKM_MD5; 101 mechanism.pParameter = NULL_PTR; 102 mechanism.ulParameterLen = 0; 104 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) { 160 CK_MECHANISM mechanism; local 218 mechanism.mechanism = CKM_MD5; 219 mechanism [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 58 CK_MECHANISM mechanism; local 66 mechanism.mechanism = CKM_PKCS5_PBKD2; 67 mechanism.pParameter = ¶ms; 68 mechanism.ulParameterLen = sizeof (params); 114 rv = C_GenerateKey(krb_ctx_hSession(context), &mechanism, tmpl,
|
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | secoidt.h | 83 unsigned long mechanism; member in struct:SECOidDataStr
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEmulate.c | 40 is_hmac(CK_MECHANISM_TYPE mechanism) argument 42 switch (mechanism) {
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.h | 49 uint64_t mechanism; member in struct:ks_obj_hdr
|
H A D | softSignUtil.c | 49 * sign init routine based on the mechanism. 57 switch (pMechanism->mechanism) { 126 * sign routine based on the mechanism. 135 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local 138 switch (mechanism) { 197 pSignature, pulSignatureLen, mechanism)); 207 pSignature, pulSignatureLen, mechanism, B_FALSE)); 245 * sign update routine based on the mechanism. 252 CK_MECHANISM_TYPE mechanism local 322 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local 431 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local [all...] |
H A D | softVerifyUtil.c | 50 * verify init routine based on the mechanism. 58 switch (pMechanism->mechanism) { 127 * verify routine based on the mechanism. 136 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local 145 switch (mechanism) { 214 pSignature, ulSignatureLen, mechanism)); 224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 262 * verify update routine based on the mechanism. 269 CK_MECHANISM_TYPE mechanism local 339 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local 463 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local [all...] |
H A D | softDecryptUtil.c | 71 * decrypt init routine based on the mechanism. 76 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism 77 * CKR_MECHANISM_INVALID: invalid mechanism type 79 * with the specified mechanism 91 switch (pMechanism->mechanism) { 136 if (pMechanism->mechanism == CKM_DES_ECB) { 203 if (pMechanism->mechanism == CKM_DES_CBC) { 208 } else if (pMechanism->mechanism == CKM_DES3_CBC) { 317 if (pMechanism->mechanism != CKM_AES_CBC_PAD) { 457 * on the mechanism 468 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local 588 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local 637 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |
H A D | softAESCrypt.c | 164 * on the mechanism. 184 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 191 if (mechanism == CKM_AES_CTR) 196 * for C_Encrypt function with the mechanism CKM_AES_ECB or 200 * mechanism CKM_AES_CBC_PAD and for C_EncryptUpdate function. 202 if ((!update) && (mechanism != CKM_AES_CBC_PAD)) { 213 if (mechanism == CKM_AES_CBC_PAD) { 248 if (mechanism == CKM_AES_CBC_PAD) { 266 * the mechanism i 556 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |
H A D | softDESCrypt.c | 158 * on the mechanism. 177 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 186 pad_mechanism = (mechanism == CKM_DES_CBC_PAD || 187 mechanism == CKM_DES3_CBC_PAD); 190 * for C_Encrypt function with the mechanism CKM_DES<n>_ECB or 194 * mechanism CKM_DES<n>_CBC_PAD and for C_EncryptUpdate function. 260 * the mechanism is CKM_DES<n>_CBC_PAD, we will need to delay 422 * on the mechanism. 443 CK_MECHANISM_TYPE mechanism local [all...] |
H A D | softEncryptUtil.c | 95 * encrypt init routine based on the mechanism. 100 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism 101 * CKR_MECHANISM_INVALID: invalid mechanism type 103 * with the specified mechanism 115 switch (pMechanism->mechanism) { 159 if (pMechanism->mechanism == CKM_DES_ECB) { 226 if (pMechanism->mechanism == CKM_DES_CBC) { 231 } else if (pMechanism->mechanism == CKM_DES3_CBC) { 339 if (pMechanism->mechanism != CKM_AES_CBC_PAD) { 477 * on the mechanism 488 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 607 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 656 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_crypt.c | 59 CK_MECHANISM mechanism; local 79 * the mechanism we plan on using. 81 mechanism.mechanism = CKM_DES_ECB; 82 mechanism.pParameter = NULL; 83 mechanism.ulParameterLen = 0; 84 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 91 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism, [all...] |
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | saslbind.c | 23 BerElement * ldap_build_sasl_bind_req( LDAP *ld, char *dn, char *mechanism, struct berval *creds, LDAPControl ** serverctrls) argument 35 * mechanism LDAPString, 52 if ( ber_printf( ber, "{it{ist{s", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SASL, mechanism) == -1){ 97 * dn, mechanism, cred, serverctrls, and clientctrls are supplied. 105 char *mechanism, 120 if (strcasecmp(mechanism, LDAP_SASL_SIMPLE) == 0){ 131 if (strcasecmp(mechanism, LDAP_SASL_CRAM_MD5) == 0){ 141 if (strcasecmp(mechanism, LDAP_SASL_EXTERNAL) == 0){ 151 if (strcasecmp(mechanism, LDAP_SASL_X511_PROTECTED) == 0){ 166 if (strcasecmp(mechanism, LDAP_SASL_X511_STRON 102 ldap_sasl_bind( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp) argument 265 ldap_sasl_bind_s( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp) argument [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | saslbind.c | 30 * ldap_sasl_bind - authenticate to the ldap server. The dn, mechanism, 49 const char *mechanism, 70 * mechanism LDAPString, 83 simple = ( mechanism == LDAP_SASL_SIMPLE ); 133 mechanism ); 137 mechanism, cred->bv_val, 163 * The dn, mechanism, and credentials of the entry to which to bind are 178 const char *mechanism, 195 if ( ( err = ldap_sasl_bind( ld, dn, mechanism, cred, serverctrls, 46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument 175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument
|
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 155 char *mechanism, /* security mechanism */ 163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism, 178 char *mechanism, 185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism, 198 rpc_gss_get_mech_info(char *mechanism, rpc_gss_service_t *service) argument 202 return ((*calls.rpc_gss_get_mech_info)(mechanism, service)); 214 rpc_gss_is_installed(char *mechanism) argument 218 return ((*calls.rpc_gss_is_installed)(mechanism)); 224 char *mechanism, 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument 222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaMechManager.c | 32 * Each element in the array represents a particular mechanism type. The 33 * array is sorted by type, so that searching by mechanism can be done 34 * quickly. Each element also contains the mechanism data for each slot. 71 static boolean_t find_mech_index(CK_MECHANISM_TYPE mechanism, 163 * Also, it may not be allowed based on the mechanism policy. 210 * Get list of all slots supporting the specified mechanism. 214 * specified mechanism. The "num_supporting_slots" field 216 * many slots are found to support the mechanism. 279 * Updates a mechanism in the mechlist. If the mechanism i 613 find_mech_index(CK_MECHANISM_TYPE mechanism, unsigned long *index) argument 654 meta_mechManager_slot_supports_mech(CK_MECHANISM_TYPE mechanism, CK_ULONG slotnum, boolean_t *supports, mechinfo_t **slot_info, boolean_t force_update, CK_MECHANISM_INFO *mech_info) argument [all...] |
H A D | pkcs11SUNWExtensions.c | 193 * mechanism. 250 /* find slot with matching mechanism */ 254 /* found mechanism */ 260 /* no matching mechanism found */ 274 * mechanism from the rawkey data. 298 * Check to make sure mechanism type is not for asymmetric key 322 /* get the key type for this mechanism */ 338 /* set the attribute type flag on object based on mechanism */ 384 CK_MECHANISM mechanism; local 448 mechanism [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAESCrypt.c | 108 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 112 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 184 * on the mechanism. 204 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 211 if (mechanism == CKM_AES_CTR) 216 * for C_Encrypt function with the mechanism CKM_AES_ECB or 220 * mechanism CKM_AES_CBC_PA 486 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local 788 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 915 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |