/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaRand.c | 60 meta_session_t *session; local 66 rv = meta_handle2session(hSession, &session); 69 REFRELEASE(session); 94 meta_session_t *session; local 100 rv = meta_handle2session(hSession, &session); 103 REFRELEASE(session);
|
H A D | metaDigest.c | 41 meta_session_t *session; local 46 rv = meta_handle2session(hSession, &session); 50 rv = meta_operation_init_defer(CKF_DIGEST, session, pMechanism, NULL); 52 REFRELEASE(session); 67 meta_session_t *session; local 73 rv = meta_handle2session(hSession, &session); 77 rv = meta_do_operation(CKF_DIGEST, MODE_SINGLE, session, NULL, 80 REFRELEASE(session); 95 meta_session_t *session; local 101 rv = meta_handle2session(hSession, &session); 128 meta_session_t *session; local 161 meta_session_t *session; local [all...] |
H A D | metaSign.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init(CKF_SIGN, session, pMechanism, key); 64 REFRELEASE(session); 80 meta_session_t *session; local 82 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_SIGN, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_SIGN, MODE_SINGLE, session, NUL 110 meta_session_t *session; local 140 meta_session_t *session; local 169 meta_session_t *session; local 203 meta_session_t *session; local [all...] |
H A D | metaVerify.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init(CKF_VERIFY, session, pMechanism, key); 64 REFRELEASE(session); 79 meta_session_t *session; local 81 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_VERIFY, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_VERIFY, MODE_SINGLE, session, NUL 110 meta_session_t *session; local 140 meta_session_t *session; local 174 meta_session_t *session; local 208 meta_session_t *session; local [all...] |
H A D | metaSessionManager.c | 34 * searching each session object list for matching objects. 58 * by the session manager. 104 * successful, a write-lock on the session will be held to indicate 109 meta_handle2session(CK_SESSION_HANDLE hSession, meta_session_t **session) argument 125 /* Make sure this session is not in the process of being deleted */ 135 *session = tmp_session; 144 meta_session_alloc(meta_session_t **session) argument 148 /* Allocate memory for the session. */ 166 *session = new_session; 174 * Create and add a session t 177 meta_session_activate(meta_session_t *session) argument 195 meta_session_deactivate(meta_session_t *session, boolean_t have_sessionlist_lock) argument 303 meta_session_dealloc(meta_session_t *session) argument [all...] |
H A D | metaCrypt.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key); 64 REFRELEASE(session); 80 meta_session_t *session; local 82 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_ENCRYPT, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_ENCRYPT, MODE_SINGLE, session, NUL 111 meta_session_t *session; local 141 meta_session_t *session; local 171 meta_session_t *session; local 206 meta_session_t *session; local 237 meta_session_t *session; local 267 meta_session_t *session; local [all...] |
H A D | metaSlotToken.c | 379 meta_session_t *session; local 382 rv = meta_handle2session(hSession, &session); 386 if (IS_READ_ONLY_SESSION(session->session_flags)) { 387 REFRELEASE(session); 392 session->session_flags); 394 REFRELEASE(session); 403 REFRELEASE(session);
|
H A D | pkcs11Crypt.c | 56 * Make sure this session is not in the process \ 70 session = tmp_session; 74 * C_EncryptInit will verify that the session handle is valid within 76 * associated with this session, and then redirect to the underlying 103 /* Obtain the session pointer */ 153 /* Obtain the session pointer */ 162 meta_session_t *session; local 168 meta_operation_cleanup(session, CKF_ENCRYPT, FALSE); 169 REFRELEASE(session); 173 rv = meta_do_operation(CKF_ENCRYPT, MODE_SINGLE, session, NUL 223 meta_session_t *session; local 382 meta_session_t *session; local 443 meta_session_t *session; local [all...] |
H A D | metaAttrManager.c | 44 get_master_attributes_by_object(slot_session_t *session, argument 57 rv = FUNCLIST(session->fw_st_id)->C_GetAttributeValue( 58 session->hSession, slot_object->hObject, &attr, 1); 86 rv = FUNCLIST(session->fw_st_id)->C_GetAttributeValue( 87 session->hSession, slot_object->hObject, &attr, 1);
|
H A D | metaKeys.c | 42 meta_session_t *session; local 48 rv = meta_handle2session(hSession, &session); 53 rv = meta_object_alloc(session, &key); 57 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key, 69 (void) meta_object_dealloc(session, key, B_TRUE); 72 REFRELEASE(session); 89 meta_session_t *session; local 95 rv = meta_handle2session(hSession, &session); 100 rv = meta_object_alloc(session, &key1); 104 rv = meta_object_alloc(session, 144 meta_session_t *session; local 190 meta_session_t *session; local 250 meta_session_t *session; local [all...] |
H A D | metaSession.c | 108 meta_session_t *session; local 111 rv = meta_handle2session(hSession, &session); 115 /* save info about session flags before they are destroyed */ 116 flags = session->session_flags; 118 rv = meta_session_deactivate(session, B_FALSE); 121 meta_session_dealloc(session); 143 meta_session_t *session; local 153 while ((session = meta_sessionlist_head) != NULL) { 154 rv = meta_handle2session((CK_SESSION_HANDLE)session, &session); 182 meta_session_t *session; local 216 meta_getopstatelen(meta_session_t *session, CK_ULONG *out_length) argument 242 meta_session_t *session; local 444 meta_session_t *session; local 593 meta_session_t *session; local 667 meta_session_t *session; local [all...] |
H A D | metaSlotManager.c | 155 slot_session_t *session, *next_session; local 158 * The slotobjects associated with the session should have 163 session = slots[slot].session_pool.idle_list_head; 164 while (session) { 165 next_session = session->next; 166 (void) FUNCLIST(session->fw_st_id)->C_CloseSession( 167 session->hSession); 169 &session->object_list_lock); 170 free(session); 171 session 445 meta_get_slot_session(CK_ULONG slotnum, slot_session_t **session, CK_FLAGS flags) argument 534 meta_release_slot_session(slot_session_t *session) argument [all...] |
H A D | metaObject.c | 115 meta_session_t *session; local 126 rv = meta_handle2session(hSession, &session); 130 rv = meta_object_alloc(session, &object); 143 * otherwise, it is false (session object). 148 /* Can't create token objects in a read-only session. */ 149 if ((IS_READ_ONLY_SESSION(session->session_flags)) && object->isToken) { 181 if (meta_freeobject_check(session, object, NULL, pTemplate, ulCount, 210 session->session_flags); 241 session->session_flags); 322 REFRELEASE(session); 350 meta_session_t *session; local 613 meta_session_t *session; local 677 meta_session_t *session; local 733 meta_session_t *session; local 967 process_find_results(CK_OBJECT_HANDLE *results, CK_ULONG num_results, int *num_results_allocated, find_objs_info_t *info, CK_ULONG slotnum, boolean_t token_only, slot_session_t *slot_session, meta_session_t *session) argument 1033 meta_search_for_objects(meta_session_t *session, find_objs_info_t *info, slot_session_t *slot_session, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_ULONG slotnum, boolean_t token_only, int *num_results_alloc) argument 1102 meta_session_t *session; local 1236 meta_session_t *session; local 1281 meta_session_t *session; local [all...] |
H A D | metaUtil.c | 35 #define META_DESTROY_KEY(session, hObject) \ 36 if ((session) && \ 38 CK_SLOT_ID fw_st_id = (session)->fw_st_id; \ 39 CK_SESSION_HANDLE hSession = (session)->hSession; \ 50 meta_operation_init_defer(CK_FLAGS optype, meta_session_t *session, argument 54 if (session->init.pMech == NULL) { 55 session->init.pMech = malloc(sizeof (CK_MECHANISM)); 56 if (session->init.pMech == NULL) 59 (void) memcpy(session->init.pMech, pMechanism, 64 session 123 meta_operation_init(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument 340 meta_operation_init_softtoken(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument 522 meta_do_operation(CK_FLAGS optype, int mode, meta_session_t *session, meta_object_t *object, CK_BYTE *in, CK_ULONG inLen, CK_BYTE *out, CK_ULONG *outLen) argument 754 free_session_mechanism(meta_session_t *session) argument 775 meta_operation_cleanup(meta_session_t *session, CK_FLAGS optype, boolean_t finished_normally) argument 932 meta_generate_keys(meta_session_t *session, CK_MECHANISM *pMechanism, CK_ATTRIBUTE *k1Template, CK_ULONG k1AttrCount, meta_object_t *key1, CK_ATTRIBUTE *k2Template, CK_ULONG k2AttrCount, meta_object_t *key2) argument 1206 meta_wrap_key(meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *wrappingkey, meta_object_t *inputkey, CK_BYTE *wrapped_key, CK_ULONG *wrapped_key_len) argument 1326 meta_unwrap_key(meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *unwrapping_key, CK_BYTE *wrapped_key, CK_ULONG wrapped_key_len, CK_ATTRIBUTE *template, CK_ULONG template_size, meta_object_t *unwrapped_key) argument 1485 meta_derive_key(meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *basekey1, meta_object_t *basekey2, CK_OBJECT_HANDLE *phBaseKey2, CK_ATTRIBUTE *pTemplate, CK_ULONG ulAttributeCount, meta_object_t *newKey1, meta_object_t *newKey2, meta_object_t *newKey3, meta_object_t *newKey4) argument [all...] |
/osnet-11/usr/src/lib/libndmp/common/ |
H A D | libndmp.c | 163 ndmp_terminate_session(int session) argument 173 ndmp_door_put_uint32(enc_ctx, session); 221 * with the intention of getting the session
|
/osnet-11/usr/src/cmd/hal/addons/network-devices/ |
H A D | snmp.c | 69 struct snmp_session session, *ss; local 81 /* initialize the SNMP session */ 82 snmp_sess_init(&session); 83 session.peername = network; 84 session.community = (uchar_t *)community; 85 session.community_len = strlen((const char *)session.community); 86 session.version = SNMP_VERSION_1; 88 if ((ss = snmp_open(&session)) == NULL)
|
/osnet-11/usr/src/lib/libcommputil/common/ |
H A D | sdp_parse_helper.c | 204 sdp_free_session(sdp_session_t *session) argument 206 if (session == NULL) 208 if (session->s_origin != NULL) 209 sdp_free_origin(session->s_origin); 210 if (session->s_name != NULL) 211 free(session->s_name); 212 if (session->s_info != NULL) 213 free(session->s_info); 214 if (session->s_uri != NULL) 215 free(session [all...] |
H A D | sdp_parse.c | 56 * session-name-field (s=) 369 /* Now assign time to session structure */ 865 sdp_parse_media(sdp_session_t *session, const char *begin, const char *end, argument 883 new_media->m_session = session; 954 tmp = session->s_media; 956 session->s_media = new_media; 1059 * RFC - 4566 says that session section should 1168 sdp_parse(const char *sdp_info, int len, int flags, sdp_session_t **session, argument 1180 session == NULL) { 1181 if (session ! [all...] |
H A D | sdp.c | 291 * Adds origin field to the session. 295 sdp_add_origin(sdp_session_t *session, const char *name, uint64_t id, argument 302 if (session == NULL || name == NULL || nettype == NULL || 306 if (session->s_origin != NULL) 327 session->s_origin = origin; 335 * Adds session name field to the session. 336 * s=<session name> 339 sdp_add_name(sdp_session_t *session, const char *name) argument 341 if (session 367 sdp_add_uri(sdp_session_t *session, const char *uri) argument 381 sdp_add_email(sdp_session_t *session, const char *email) argument 394 sdp_add_phone(sdp_session_t *session, const char *phone) argument 486 sdp_add_time(sdp_session_t *session, uint64_t starttime, uint64_t stoptime, sdp_time_t **time) argument 558 sdp_add_zone(sdp_session_t *session, uint64_t time, const char *offset) argument 665 sdp_add_media(sdp_session_t *session, const char *name, uint_t port, int portcount, const char *protocol, const char *fmt, sdp_media_t **media) argument 718 sdp_get_length(const sdp_session_t *session) argument 824 sdp_clone_session(const sdp_session_t *session) argument 955 sdp_session_to_str(const sdp_session_t *session, int *error) argument 1124 sdp_delete_all_field(sdp_session_t *session, const char field) argument 1290 sdp_session_t *session = NULL; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 86 CK_SESSION_HANDLE session; member in struct:_pkinit_identity_crypto_context 105 #define C_LOGIN_DONE 0x1 /* The session is logged in. */
|
H A D | pkinit_srv.c | 611 krb5_keyblock *session = reply->ticket->enc_part2->session; local 624 * by the client and server. The existing session key meets these 627 ret = krb5_c_fx_cf2_simple(context, session, "PKINIT", 632 ret = encode_krb5_encryption_key( session, &scratch); 655 memset(session->contents, 0, session->length); 656 krb5_free_keyblock_contents(context, session); 657 *session = *new_session; 868 pkiDebug("unable to make a session ke [all...] |
/osnet-11/usr/src/cmd/hal/probing/network-printer/ |
H A D | probe-snmp.c | 56 struct snmp_session session, *ss; local 61 /* initialize the SNMP session */ 62 snmp_sess_init(&session); 63 session.peername = host; 64 session.community = (uchar_t *)community; 65 session.community_len = strlen((const char *)session.community); 66 session.version = SNMP_VERSION_1; 67 session.retries = 0; 69 if ((ss = snmp_open(&session)) [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSession.h | 59 * mechanism, if the session slot has a CRYPTO_LIMITED_HASH_SUPPORT flag set. 72 typedef struct session { struct 74 pthread_mutex_t session_mutex; /* session's mutex lock */ 75 pthread_mutex_t ses_free_mutex; /* mutex used during closing session */ 77 uint32_t ses_refcnt; /* session reference count */ 78 uint32_t ses_close_sync; /* session closing flags */ 79 crypto_session_id_t k_session; /* kernel session ID */ 80 boolean_t ses_RO; /* RO or RW session flag */ 88 /* Pointers to form the global session list */ 89 struct session *nex [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsSession.h | 74 typedef struct session { struct 76 pthread_mutex_t session_mutex; /* session's mutex lock */ 77 pthread_mutex_t ses_free_mutex; /* mutex used during closing session */ 79 uint32_t ses_refcnt; /* session reference count */ 80 uint32_t ses_close_sync; /* session closing flags */ 81 boolean_t ses_RO; /* RO or RW session flag */ 89 /* Pointers to form the global session list */ 90 struct session *next; /* points to next session on the list */ 91 struct session *pre [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSession.h | 54 /* Holds the saved session state */ 73 typedef struct session { struct 75 pthread_mutex_t session_mutex; /* session's mutex lock */ 77 uint32_t ses_refcnt; /* session reference count */ 78 uint32_t ses_close_sync; /* session closing flags */ 79 CK_STATE state; /* session state */ 86 /* Pointers to form the global session list */ 87 struct session *next; /* points to next session on the list */ 88 struct session *pre [all...] |