/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | dhmech.c | 36 {0, 0}, /* OID for mech type. */ 74 * then check that the mech is not already initialized (If so just return 75 * the mech). It will then assign the entry points that are common to the 76 * mechanism family to the uninitialized mech. After which, it allocate space 82 __dh_gss_initialize(gss_mechanism mech) argument 84 if (mech->context != NULL) 85 return (mech); /* already initialized */ 88 *mech = dh_mechanism; 91 mech->context = New(dh_context_desc, 1); 92 if (mech [all...] |
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_inq_context_oid.c | 46 gss_mechanism mech; local 60 mech = gssint_get_mechanism (ctx->mech_type); 62 if (mech != NULL) { 63 if (mech->gss_inquire_sec_context_by_oid != NULL) { 64 status = mech->gss_inquire_sec_context_by_oid(minor_status, 69 map_error(minor_status, mech);
|
H A D | g_context_time.c | 43 gss_mechanism mech; local 61 mech = __gss_get_mechanism(ctx->mech_type); 63 if (mech) { 65 if (mech->gss_context_time) { 66 status = mech->gss_context_time( 67 mech->context, 72 map_error(minor_status, mech);
|
H A D | g_process_context.c | 44 gss_mechanism mech; local 65 mech = __gss_get_mechanism(ctx->mech_type); 67 if (mech) { 69 if (mech->gss_process_context_token) { 70 status = mech->gss_process_context_token( 71 mech->context, 76 map_error(minor_status, mech);
|
H A D | g_inquire_context.c | 81 gss_mechanism mech; local 99 mech = __gss_get_mechanism(ctx->mech_type); 101 if (!mech || !mech->gss_inquire_context || !mech->gss_display_name || 102 !mech->gss_release_name) { 106 status = mech->gss_inquire_context( 107 mech->context, 119 map_error(minor_status, mech); 125 status = __gss_convert_name_to_union_name(minor_status, mech, [all...] |
H A D | g_compare_name.c | 75 gss_mechanism mech = NULL; local 99 mech = __gss_get_mechanism(union_name1->mech_type); 100 if (!mech) 102 if (!mech->gss_compare_name) 119 if (!mech) 121 if (!mech->gss_compare_name) 123 major_status = mech->gss_compare_name(mech->context, 129 map_error(minor_status, mech); 200 if (!mech) [all...] |
H A D | g_seal.c | 88 gss_mechanism mech; local 103 mech = __gss_get_mechanism(ctx->mech_type); 105 if (mech) { 106 if (mech->gss_seal) { 107 status = mech->gss_seal( 108 mech->context, 117 map_error(minor_status, mech); 165 gss_mechanism mech; local 184 mech = __gss_get_mechanism(ctx->mech_type); 186 if (!mech) [all...] |
H A D | g_store_cred.c | 100 gss_mechanism mech; local 125 mech = __gss_get_mechanism(desired_mech); 126 if (mech == NULL) 129 if (mech->gss_store_cred == NULL) 136 major_status = mech->gss_store_cred(mech->context, 146 map_error(minor_status, mech); 155 /* Get mech and cred element */ 157 mech = __gss_get_mechanism(dmech); 158 if (mech [all...] |
H A D | g_rel_cred.c | 47 gss_mechanism mech; local 76 mech = __gss_get_mechanism(&union_cred->mechs_array[j]); 80 if (mech) { 81 if (mech->gss_release_cred) { 82 temp_status = mech->gss_release_cred 83 (mech->context, minor_status, 87 map_error(minor_status, mech);
|
H A D | g_sign.c | 83 gss_mechanism mech; local 96 mech = __gss_get_mechanism(ctx->mech_type); 98 if (mech) { 99 if (mech->gss_sign) { 100 status = mech->gss_sign( 101 mech->context, 108 map_error(minor_status, mech);
|
H A D | g_unseal.c | 50 gss_mechanism mech; local 79 mech = __gss_get_mechanism(ctx->mech_type); 81 if (mech) { 82 if (mech->gss_unseal) { 83 status = mech->gss_unseal( 84 mech->context, 92 map_error(minor_status, mech);
|
H A D | g_verify.c | 47 gss_mechanism mech; local 66 mech = __gss_get_mechanism(ctx->mech_type); 68 if (mech) { 69 if (mech->gss_verify) { 70 status = mech->gss_verify( 71 mech->context, 78 map_error(minor_status, mech);
|
H A D | g_glue.c | 217 * <mech OID bytes> 310 gss_mechanism mech; local 312 mech = gssint_get_mechanism (mech_type); 313 if (mech) { 314 if (mech->gss_import_name) { 315 status = mech->gss_import_name ( 316 mech->context, /* SUNW17PACresync */ 322 map_error(minor_status, mech); 340 gss_mechanism mech; local 350 mech 464 gss_mechanism mech; local 492 gss_mechanism mech; local 522 gss_mechanism mech; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_sign_pkcs.c | 36 smb_md5_getmech(smb_sign_mech_t *mech) argument 38 mech->mechanism = CKM_MD5; 39 mech->pParameter = NULL; 40 mech->ulParameterLen = 0; 48 smb_md5_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech) argument 52 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp); 56 rv = C_DigestInit(*ctxp, mech); 97 smb2_hmac_getmech(smb_sign_mech_t *mech) argument 99 mech->mechanism = CKM_SHA256_HMAC; 100 mech 109 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, uint8_t *key, size_t key_len) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_common.c | 95 gss_mechanism (*mech_init)(gss_mechanism mech); 96 gss_mechanism mech; local 116 if ((mech = mech_init(dhmech)) == NULL) { 121 mech->mech_type = mech_type; 124 context = (dh_context_t)mech->context; 130 context->mech = &mech->mech_type; 132 return (mech);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | encr_mgr.c | 34 CK_MECHANISM * mech, 45 if (! sess || ! ctx || ! mech) { 88 switch (mech->mechanism) { 91 if (mech->ulParameterLen != 0) { 114 if (mech->ulParameterLen > 0) { 115 ptr = (CK_BYTE *)malloc(mech->ulParameterLen); 119 (void) memcpy(ptr, mech->pParameter, mech->ulParameterLen); 123 ctx->mech.ulParameterLen = mech 31 encr_mgr_init(SESSION * sess, ENCR_DECR_CONTEXT * ctx, CK_ULONG operation, CK_MECHANISM * mech, CK_OBJECT_HANDLE key_handle) argument [all...] |
H A D | decr_mgr.c | 36 CK_MECHANISM *mech, 88 switch (mech->mechanism) { 91 if (mech->ulParameterLen != 0) 115 if (mech->ulParameterLen > 0) { 116 ptr = (CK_BYTE *)malloc(mech->ulParameterLen); 120 (void) memcpy(ptr, mech->pParameter, mech->ulParameterLen); 124 ctx->mech.ulParameterLen = mech->ulParameterLen; 125 ctx->mech 32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument [all...] |
H A D | sign_mgr.c | 33 CK_MECHANISM * mech, 66 switch (mech->mechanism) { 139 if (mech->ulParameterLen != 0) { 164 (CK_MAC_GENERAL_PARAMS *)mech->pParameter; 166 if (mech->ulParameterLen != 171 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) && 175 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) && 200 if (mech->ulParameterLen > 0 && mech->pParameter == NULL) 203 if (mech 31 sign_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument [all...] |
H A D | verify_mgr.c | 33 CK_MECHANISM * mech, 70 switch (mech->mechanism) { 161 (CK_MAC_GENERAL_PARAMS *)mech->pParameter; 163 if (mech->ulParameterLen != 167 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) && 171 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) && 197 ctx->mech.ulParameterLen = mech->ulParameterLen; 198 ctx->mech.mechanism = mech 31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | ef_crypto.c | 22 crypto_mechanism_t mech; local 45 mech.cm_type = key->kef_mt; 46 if (mech.cm_type == CRYPTO_MECH_INVALID) { 48 "k5_ef_crypto - invalid crypto mech type: 0x%llx", 54 mech.cm_param_len = ivec->length; 55 mech.cm_param = (char *)ivec->data; 57 mech.cm_param_len = 0; 58 mech.cm_param = NULL; 62 rv = crypto_encrypt(&mech, &d1, 68 rv = crypto_decrypt(&mech, [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_token.c | 47 /* XXXX this code currently makes the assumption that a mech oid will 70 the sequence tag and length octets, the mech OID DER encoding, and the 147 /* returns the length of a token, given the mech oid and the body size */ 149 unsigned int g_token_size(mech, body_size) 150 const gss_OID_desc * mech; 154 body_size += 4 + (int) mech->length; /* NEED overflow check */ 161 void g_make_token_header(mech, body_size, buf, tok_type) 162 const gss_OID_desc * mech; 169 (tok_type == -1) ? 2 : (int) (4 + mech->length + body_size)); 171 *(*buf)++ = (unsigned char) mech [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | util_errmap.c | 50 gss_OID_desc mech; member in struct:mecherror 72 if (m1.mech.length < m2.mech.length) 74 if (m1.mech.length > m2.mech.length) 76 if (m1.mech.length == 0) 78 return memcmp(m1.mech.elements, m2.mech.elements, m1.mech.length); 91 dest->mech [all...] |
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.h | 15 void *ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm );
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/ |
H A D | Makefile | 28 PROTOCOL_DIR = mech 32 DERIVED_FILES = mech/dhmech_prot.h mech/xdr_token.c 65 mech/xdr_token.c: $(PROTOCOL_DIR)/dhmech_prot.x 69 mech/dhmech_prot.h: mech/dhmech_prot.x 85 $(XGETTEXT) $(XGETFLAGS) `$(GREP) -l gettext mech/*.[ch]`
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_keys.c | 41 crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count, 52 rv = kcf_get_hardware_provider(mech->cm_type, NULL, 62 mech, attrs, count, handle, KCF_SWFP_RHNDL(crq)); 66 mech, attrs, count, handle, NULL, 0, NULL, NULL, NULL, 0); 78 crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs, 91 rv = kcf_get_hardware_provider(mech->cm_type, NULL, 100 rv = KCF_PROV_KEY_GENERATE_PAIR(real_provider, sid, mech, 106 sid, mech, pub_attrs, pub_count, pub_handle, pri_attrs, 119 crypto_mechanism_t *mech, crypto_key_t *wrapping_key, 131 rv = kcf_get_hardware_provider(mech 40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *handle, crypto_call_req_t *crq) argument 77 crypto_key_generate_pair(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs, uint_t pub_count, crypto_object_attribute_t *pri_attrs, uint_t pri_count, crypto_object_id_t *pub_handle, crypto_object_id_t *pri_handle, crypto_call_req_t *crq) argument 118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument 157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument 198 crypto_key_derive(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *base_key, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *new_key, crypto_call_req_t *crq) argument [all...] |