Searched refs:mech (Results 101 - 125 of 173) sorted by relevance

1234567

/illumos-gate/usr/src/lib/gss_mechs/mech_dummy/mech/
H A Ddmech.c104 static int g_token_size(gss_OID mech, unsigned int body_size);
105 static void g_make_token_header(gss_OID mech, int body_size,
107 static int g_verify_token_header(gss_OID mech, int *body_size,
1326 g_token_size(mech, body_size)
1327 gss_OID mech;
1331 body_size += 4 + (int)mech->length; /* NEED overflow check */
1336 g_make_token_header(mech, body_size, buf, tok_type)
1337 gss_OID mech;
1343 der_write_length(buf, 4 + mech->length + body_size);
1345 *(*buf)++ = (unsigned char) mech
[all...]
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dsasl.c656 const char *mech = NULL; local
702 (mech ? mech : ""), 0, 0 );
710 &mech );
713 stepnum, (mech ? mech : ""), 0 );
737 stepnum, (mech ? mech : ""), 0 );
741 rc = ldap_sasl_bind_s(ld, dn, mech, &ccred,
780 clientstepnum, stepnum, (mech
839 char **values, **v, *mech, *m; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Ddprov.c1941 cmn_err(CE_WARN, "dprov_digest_init: unexpected mech type "
2077 cmn_err(CE_WARN, "dprov_digest_atomic: unexpected mech type "
2132 cmn_err(CE_WARN, "dprov_mac_init: unexpected mech type "
2237 cmn_err(CE_WARN, "dprov_mac_atomic: unexpected mech type "
2272 cmn_err(CE_WARN, "dprov_mac_verify_atomic: unexpected mech "
2353 cmn_err(CE_WARN, "dprov_encrypt_init: unexpected mech type "
2461 cmn_err(CE_WARN, "dprov_encrypt_atomic: unexpected mech type "
2494 cmn_err(CE_WARN, "dprov_decrypt_init: unexpected mech type "
2603 cmn_err(CE_WARN, "dprov_atomic_init: unexpected mech type "
2666 cmn_err(CE_WARN, "dprov_sign_init: unexpected mech typ
4828 dprov_free_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *mech) argument
5411 crypto_mechanism_t mech; local
5528 crypto_mechanism_t mech; local
5644 crypto_mechanism_t mech; local
5864 crypto_mechanism_t mech; local
6122 crypto_mechanism_t mech; local
7791 crypto_mechanism_t mech, *mechp; local
7916 crypto_mechanism_t mech, *mechp; local
8307 crypto_mechanism_t mech, *mechp; local
8445 crypto_mechanism_t mech; local
8704 dprov_get_sw_prov(crypto_mechanism_t *mech, kcf_provider_desc_t **pd, crypto_mech_type_t *provider_mech_type) argument
[all...]
H A Dcrypto.c2109 STRUCT_DECL(crypto_mechanism, mech);
2116 STRUCT_INIT(mech, mode);
2117 bcopy(in_mech, STRUCT_BUF(mech), STRUCT_SIZE(mech));
2118 param = STRUCT_FGETP(mech, cm_param);
2119 param_len = STRUCT_FGET(mech, cm_param_len);
2120 out_mech->cm_type = STRUCT_FGET(mech, cm_type);
2531 /* get the provider's mech number */
2563 /* get the provider's mech number */
2579 crypto_mechanism_t *mech)
2578 crypto_free_mech(kcf_provider_desc_t *pd, boolean_t allocated_by_crypto_module, crypto_mechanism_t *mech) argument
2609 crypto_mechanism_t mech; local
3191 crypto_mechanism_t mech; local
3858 crypto_mechanism_t mech; local
5309 crypto_mechanism_t mech; local
5435 crypto_mechanism_t mech; local
5571 crypto_mechanism_t mech; local
5729 crypto_mechanism_t mech; local
5919 crypto_mechanism_t mech; local
6078 crypto_mechanism_t mech; local
6246 crypto_mechanism_t mech; local
6404 crypto_mechanism_t mech; local
[all...]
/illumos-gate/usr/src/uts/common/gssapi/
H A Dgssd_clnt_stubs.c872 kctx->mech = &default_gc;
905 * in the wrapper context to point to the kernel mech.
907 __kgss_reset_mech(&kctx->mech, *actual_mech_type);
910 * If the mech oid was allocated for us, free it.
1068 * move mech type returned to mech_type
1147 kctx->mech = &default_gc;
1172 __kgss_reset_mech(&kctx->mech, *mech_type);
1175 * If the mech oid was allocated for us, free it.
1489 if (kctx->mech->gss_import_sec_context) {
2708 gss_mechanism mech; local
2800 __kgss_add_mechanism(gss_mechanism mech) argument
2822 gss_mechanism mech; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh1024/
H A DMakefile.com43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/
H A DMakefile.com43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh640/
H A DMakefile.com43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
/illumos-gate/usr/src/lib/libcryptoutil/common/
H A Dcryptoutil.h186 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech);
187 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech);
/illumos-gate/usr/src/uts/common/rpc/
H A Drpcsec_gss.h242 char *mech,
249 char *mech,
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSession.h41 CK_MECHANISM mech; member in struct:crypto_active_op
H A DkernelDigest.c79 session_p->digest.mech.mechanism = pMechanism->mechanism;
80 session_p->digest.mech.pParameter = NULL;
81 session_p->digest.mech.ulParameterLen = 0;
209 pMechanism = &(opp->mech);
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_init.c148 display_status_1(m, code, type, mech)
152 const gss_OID mech;
163 type, mech,
196 * mech kerberos mech
204 display_status(msg, maj_stat, min_stat, mech)
208 char *mech;
212 if (!rpc_gss_mech_to_oid(mech, (rpc_gss_OID *)&mech_oid)) {
215 "Invalid mechanism oid <%s>"), mech);
317 char mech[] local
530 mech); local
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A DgssapiP_generic.h194 unsigned int g_token_size (const gss_OID_desc * mech, unsigned int body_size);
196 void g_make_token_header (const gss_OID_desc * mech, unsigned int body_size,
199 gss_int32 g_verify_token_header (const gss_OID_desc * mech,
/illumos-gate/usr/src/cmd/gss/gsscred/
H A Dgsscred.c70 *uid = NULL, *comment = NULL, *mech = NULL, local
101 mech = optarg;
128 addUser(userName, nameTypeOID, uid, comment, mech);
132 removeUsers(userName, nameTypeOID, uid, mech);
136 listUsers(userName, nameTypeOID, uid, mech);
370 /* are we retrieving everyone ? or searching by mech ? */
391 /* Are we searching by uid or uid and mech? */
517 /* must make the name header whic contains mech oid */
591 /* are we deleting the entire table or an entire mech ? */
612 /* are we deleting by uid or uid and mech
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftRSA.c228 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
232 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
499 session_p->sign.mech.mechanism = pMechanism->mechanism;
502 session_p->verify.mech.mechanism = pMechanism->mechanism;
960 get_rsa_sha1_prefix(CK_MECHANISM_PTR mech, CK_BYTE_PTR *prefix) { argument
961 if (mech->pParameter == NULL) {
1035 switch (session_p->digest.mech.mechanism) {
1042 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech),
1123 switch (session_p->digest.mech.mechanism) {
1130 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech),
[all...]
H A DsoftDESCrypt.c75 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
79 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism;
501 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism;
895 session_p->sign.mech.mechanism = pMechanism->mechanism;
898 session_p->verify.mech.mechanism =
H A DsoftMAC.h142 void sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *, uint64_t *, uint64_t *,
H A DsoftSession.h60 CK_MECHANISM mech; member in struct:crypto_active_op
/illumos-gate/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss.c101 __rpc_gss_seccreate(clnt, server_name, mech, service, qop, options_req,
105 char *mech; /* security mechanism */
125 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) {
129 if (!__rpc_gss_mech_to_oid(mech, &mech_type)) {
422 char *mech; local
437 if ((mech = __rpc_gss_oid_to_mech(ap->mech_type)) == NULL)
440 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num))
/illumos-gate/usr/src/uts/common/io/
H A Dcryptmod.c670 crypto_mechanism_t mech; local
673 mech.cm_type = digest_type;
674 mech.cm_param = 0;
675 mech.cm_param_len = 0;
693 rv = crypto_digest(&mech, &d1, &d2, NULL);
731 * the userland kerberos mech.
1119 crypto_mechanism_t mech; local
1150 mech.cm_type = cdata->mech_type;
1151 mech.cm_param = cdata->block;
1156 mech
1179 do_hmac(crypto_mech_type_t mech, crypto_key_t *key, char *data, int datalen, char *hmac, int hmaclen) argument
1252 crypto_mechanism_t mech; local
1412 crypto_mechanism_t mech; local
1761 crypto_mechanism_t mech; local
1993 crypto_mechanism_t mech; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_spnego/mech/
H A Dspnego_mech.c288 mech_spnego.mech = &spnego_mechanism;
617 /* determine negotiation mech set */
638 * need to pull the first mech from mechSet to do first
721 * mech not finished and mech token missing
779 * the old Kerberos mech OID, even though we sent the new one.
780 * So we will treat all the Kerberos mech OIDS as the same.
794 * init_sec_context(). Acceptor sends no mech
802 * Reject missing mech token when optimistic
803 * mech selecte
1641 gss_mechanism mech = NULL; local
2886 put_mech_oid(unsigned char **buf_out, gss_OID_const mech, unsigned int buflen) argument
3730 g_token_size(gss_OID_const mech, unsigned int body_size) argument
3761 g_make_token_header(gss_OID_const mech, unsigned int body_size, unsigned char **buf, unsigned int totallen) argument
3880 g_verify_token_header(gss_OID_const mech, unsigned int *body_size, unsigned char **buf_in, int tok_type, unsigned int toksize) argument
[all...]
/illumos-gate/usr/src/cmd/keyserv/
H A Dsetkey.c152 struct mechentry mech; member in struct:algtypelist
233 mutex_init(&ap->mech.mech_lock, USYNC_THREAD, NULL);
234 mutex_init(&ap->mech.ps_lock, USYNC_THREAD, NULL);
235 ap->mech.mechdata = NULL;
236 ap->mech.psdata = NULL;
265 debug(KEYSERV_DEBUG0, ("getmechtype return %x", &(*app)->mech));
266 return (&(*app)->mech);
666 mutex_lock(&ap->mech.mech_lock);
667 if ((mdp = ap->mech.mechdata) == NULL) {
668 mutex_unlock(&ap->mech
[all...]
/illumos-gate/usr/src/common/crypto/ecc/
H A Doid.c140 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext }
142 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext }
/illumos-gate/usr/src/lib/libsasl/include/
H A Dsasl.h320 #define SASL_NEED_PROXY 0x0008 /* require a mech that allows proxying */
899 * NULL if mech doesn't include initial client challenge
900 * mech -- set to mechansm name of selected mechanism (may be NULL)
913 const char **mech);
1039 * mech -- the mechanism name client requested
1052 const char *mech,

Completed in 151 milliseconds

1234567