Searched defs:mechanism (Results 1 - 25 of 43) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/
H A Dhash_md5.c46 CK_MECHANISM mechanism; local
48 mechanism.mechanism = CKM_MD5;
49 mechanism.pParameter = NULL_PTR;
50 mechanism.ulParameterLen = 0;
52 return(k5_ef_hash(context, &mechanism, icount, input, output));
H A Dhash_sha1.c42 CK_MECHANISM mechanism; local
44 mechanism.mechanism = CKM_SHA_1;
45 mechanism.pParameter = NULL_PTR;
46 mechanism.ulParameterLen = 0;
48 return(k5_ef_hash(context, &mechanism, icount, input, output));
H A Dhash_ef_generic.c10 CK_MECHANISM *mechanism,
19 if ((rv = C_DigestInit(krb_ctx_hSession(context), mechanism)) !=
9 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_mac.c83 CK_MECHANISM mechanism; local
99 mechanism.mechanism = CKM_MD5;
100 mechanism.pParameter = 0;
101 mechanism.ulParameterLen = 0;
103 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
108 rv = C_DigestInit(hSession, &mechanism);
H A Dsmb_crypt.c56 CK_MECHANISM mechanism; local
61 mechanism.mechanism = CKM_MD5;
62 mechanism.pParameter = 0;
63 mechanism.ulParameterLen = 0;
65 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
70 rv = C_DigestInit(hSession, &mechanism);
97 CK_MECHANISM mechanism; local
102 mechanism
150 CK_MECHANISM mechanism; local
[all...]
/osnet-11/usr/src/lib/libgss/
H A Dg_inquire_names.c36 gss_inquire_names_for_mech(minor_status, mechanism, name_types)
39 const gss_OID mechanism;
63 * select the approprate underlying mechanism routine and
67 mech = __gss_get_mechanism(mechanism);
74 mechanism,
123 char *mechanism; local
141 mechanism = mech_list[i];
142 if (__gss_mech_to_oid(mechanism, &mechOid) == GSS_S_COMPLETE) {
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c55 CK_MECHANISM mechanism; local
90 mechanism.mechanism = CKM_MD5;
91 mechanism.pParameter = NULL_PTR;
92 mechanism.ulParameterLen = 0;
94 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
H A Dk5_md5des.c56 CK_MECHANISM mechanism; local
100 mechanism.mechanism = CKM_MD5;
101 mechanism.pParameter = NULL_PTR;
102 mechanism.ulParameterLen = 0;
104 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
160 CK_MECHANISM mechanism; local
218 mechanism.mechanism = CKM_MD5;
219 mechanism
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dpbkdf2.c58 CK_MECHANISM mechanism; local
66 mechanism.mechanism = CKM_PKCS5_PBKD2;
67 mechanism.pParameter = &params;
68 mechanism.ulParameterLen = sizeof (params);
114 rv = C_GenerateKey(krb_ctx_hSession(context), &mechanism, tmpl,
/osnet-11/usr/src/common/crypto/ecc/
H A Dsecoidt.h83 unsigned long mechanism; member in struct:SECOidDataStr
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEmulate.c40 is_hmac(CK_MECHANISM_TYPE mechanism) argument
42 switch (mechanism) {
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeystore.h49 uint64_t mechanism; member in struct:ks_obj_hdr
H A DsoftSignUtil.c49 * sign init routine based on the mechanism.
57 switch (pMechanism->mechanism) {
126 * sign routine based on the mechanism.
135 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
138 switch (mechanism) {
197 pSignature, pulSignatureLen, mechanism));
207 pSignature, pulSignatureLen, mechanism, B_FALSE));
245 * sign update routine based on the mechanism.
252 CK_MECHANISM_TYPE mechanism local
322 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
431 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
[all...]
H A DsoftVerifyUtil.c50 * verify init routine based on the mechanism.
58 switch (pMechanism->mechanism) {
127 * verify routine based on the mechanism.
136 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
145 switch (mechanism) {
214 pSignature, ulSignatureLen, mechanism));
224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
262 * verify update routine based on the mechanism.
269 CK_MECHANISM_TYPE mechanism local
339 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
463 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
[all...]
H A DsoftDecryptUtil.c71 * decrypt init routine based on the mechanism.
76 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism
77 * CKR_MECHANISM_INVALID: invalid mechanism type
79 * with the specified mechanism
91 switch (pMechanism->mechanism) {
136 if (pMechanism->mechanism == CKM_DES_ECB) {
203 if (pMechanism->mechanism == CKM_DES_CBC) {
208 } else if (pMechanism->mechanism == CKM_DES3_CBC) {
317 if (pMechanism->mechanism != CKM_AES_CBC_PAD) {
457 * on the mechanism
468 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
588 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
637 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]
H A DsoftAESCrypt.c164 * on the mechanism.
184 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
191 if (mechanism == CKM_AES_CTR)
196 * for C_Encrypt function with the mechanism CKM_AES_ECB or
200 * mechanism CKM_AES_CBC_PAD and for C_EncryptUpdate function.
202 if ((!update) && (mechanism != CKM_AES_CBC_PAD)) {
213 if (mechanism == CKM_AES_CBC_PAD) {
248 if (mechanism == CKM_AES_CBC_PAD) {
266 * the mechanism i
556 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]
H A DsoftDESCrypt.c158 * on the mechanism.
177 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
186 pad_mechanism = (mechanism == CKM_DES_CBC_PAD ||
187 mechanism == CKM_DES3_CBC_PAD);
190 * for C_Encrypt function with the mechanism CKM_DES<n>_ECB or
194 * mechanism CKM_DES<n>_CBC_PAD and for C_EncryptUpdate function.
260 * the mechanism is CKM_DES<n>_CBC_PAD, we will need to delay
422 * on the mechanism.
443 CK_MECHANISM_TYPE mechanism local
[all...]
H A DsoftEncryptUtil.c95 * encrypt init routine based on the mechanism.
100 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism
101 * CKR_MECHANISM_INVALID: invalid mechanism type
103 * with the specified mechanism
115 switch (pMechanism->mechanism) {
159 if (pMechanism->mechanism == CKM_DES_ECB) {
226 if (pMechanism->mechanism == CKM_DES_CBC) {
231 } else if (pMechanism->mechanism == CKM_DES3_CBC) {
339 if (pMechanism->mechanism != CKM_AES_CBC_PAD) {
477 * on the mechanism
488 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
607 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
656 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_crypt.c59 CK_MECHANISM mechanism; local
79 * the mechanism we plan on using.
81 mechanism.mechanism = CKM_DES_ECB;
82 mechanism.pParameter = NULL;
83 mechanism.ulParameterLen = 0;
84 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
91 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism,
[all...]
/osnet-11/usr/src/lib/libldap4/common/
H A Dsaslbind.c23 BerElement * ldap_build_sasl_bind_req( LDAP *ld, char *dn, char *mechanism, struct berval *creds, LDAPControl ** serverctrls) argument
35 * mechanism LDAPString,
52 if ( ber_printf( ber, "{it{ist{s", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SASL, mechanism) == -1){
97 * dn, mechanism, cred, serverctrls, and clientctrls are supplied.
105 char *mechanism,
120 if (strcasecmp(mechanism, LDAP_SASL_SIMPLE) == 0){
131 if (strcasecmp(mechanism, LDAP_SASL_CRAM_MD5) == 0){
141 if (strcasecmp(mechanism, LDAP_SASL_EXTERNAL) == 0){
151 if (strcasecmp(mechanism, LDAP_SASL_X511_PROTECTED) == 0){
166 if (strcasecmp(mechanism, LDAP_SASL_X511_STRON
102 ldap_sasl_bind( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp) argument
265 ldap_sasl_bind_s( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp) argument
[all...]
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dsaslbind.c30 * ldap_sasl_bind - authenticate to the ldap server. The dn, mechanism,
49 const char *mechanism,
70 * mechanism LDAPString,
83 simple = ( mechanism == LDAP_SASL_SIMPLE );
133 mechanism );
137 mechanism, cred->bv_val,
163 * The dn, mechanism, and credentials of the entry to which to bind are
178 const char *mechanism,
195 if ( ( err = ldap_sasl_bind( ld, dn, mechanism, cred, serverctrls,
46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument
175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument
/osnet-11/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c155 char *mechanism, /* security mechanism */
163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism,
178 char *mechanism,
185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism,
198 rpc_gss_get_mech_info(char *mechanism, rpc_gss_service_t *service) argument
202 return ((*calls.rpc_gss_get_mech_info)(mechanism, service));
214 rpc_gss_is_installed(char *mechanism) argument
218 return ((*calls.rpc_gss_is_installed)(mechanism));
224 char *mechanism,
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument
222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaMechManager.c32 * Each element in the array represents a particular mechanism type. The
33 * array is sorted by type, so that searching by mechanism can be done
34 * quickly. Each element also contains the mechanism data for each slot.
71 static boolean_t find_mech_index(CK_MECHANISM_TYPE mechanism,
163 * Also, it may not be allowed based on the mechanism policy.
210 * Get list of all slots supporting the specified mechanism.
214 * specified mechanism. The "num_supporting_slots" field
216 * many slots are found to support the mechanism.
279 * Updates a mechanism in the mechlist. If the mechanism i
613 find_mech_index(CK_MECHANISM_TYPE mechanism, unsigned long *index) argument
654 meta_mechManager_slot_supports_mech(CK_MECHANISM_TYPE mechanism, CK_ULONG slotnum, boolean_t *supports, mechinfo_t **slot_info, boolean_t force_update, CK_MECHANISM_INFO *mech_info) argument
[all...]
H A Dpkcs11SUNWExtensions.c193 * mechanism.
250 /* find slot with matching mechanism */
254 /* found mechanism */
260 /* no matching mechanism found */
274 * mechanism from the rawkey data.
298 * Check to make sure mechanism type is not for asymmetric key
322 /* get the key type for this mechanism */
338 /* set the attribute type flag on object based on mechanism */
384 CK_MECHANISM mechanism; local
448 mechanism
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsAESCrypt.c108 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
112 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
184 * on the mechanism.
204 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
211 if (mechanism == CKM_AES_CTR)
216 * for C_Encrypt function with the mechanism CKM_AES_ECB or
220 * mechanism CKM_AES_CBC_PA
486 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
788 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
915 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]

Completed in 430 milliseconds

12