/illumos-gate/usr/src/lib/gss_mechs/mech_dummy/mech/ |
H A D | dmech.c | 104 static int g_token_size(gss_OID mech, unsigned int body_size); 105 static void g_make_token_header(gss_OID mech, int body_size, 107 static int g_verify_token_header(gss_OID mech, int *body_size, 1326 g_token_size(mech, body_size) 1327 gss_OID mech; 1331 body_size += 4 + (int)mech->length; /* NEED overflow check */ 1336 g_make_token_header(mech, body_size, buf, tok_type) 1337 gss_OID mech; 1343 der_write_length(buf, 4 + mech->length + body_size); 1345 *(*buf)++ = (unsigned char) mech [all...] |
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 656 const char *mech = NULL; local 702 (mech ? mech : ""), 0, 0 ); 710 &mech ); 713 stepnum, (mech ? mech : ""), 0 ); 737 stepnum, (mech ? mech : ""), 0 ); 741 rc = ldap_sasl_bind_s(ld, dn, mech, &ccred, 780 clientstepnum, stepnum, (mech 839 char **values, **v, *mech, *m; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dprov.c | 1941 cmn_err(CE_WARN, "dprov_digest_init: unexpected mech type " 2077 cmn_err(CE_WARN, "dprov_digest_atomic: unexpected mech type " 2132 cmn_err(CE_WARN, "dprov_mac_init: unexpected mech type " 2237 cmn_err(CE_WARN, "dprov_mac_atomic: unexpected mech type " 2272 cmn_err(CE_WARN, "dprov_mac_verify_atomic: unexpected mech " 2353 cmn_err(CE_WARN, "dprov_encrypt_init: unexpected mech type " 2461 cmn_err(CE_WARN, "dprov_encrypt_atomic: unexpected mech type " 2494 cmn_err(CE_WARN, "dprov_decrypt_init: unexpected mech type " 2603 cmn_err(CE_WARN, "dprov_atomic_init: unexpected mech type " 2666 cmn_err(CE_WARN, "dprov_sign_init: unexpected mech typ 4828 dprov_free_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *mech) argument 5411 crypto_mechanism_t mech; local 5528 crypto_mechanism_t mech; local 5644 crypto_mechanism_t mech; local 5864 crypto_mechanism_t mech; local 6122 crypto_mechanism_t mech; local 7791 crypto_mechanism_t mech, *mechp; local 7916 crypto_mechanism_t mech, *mechp; local 8307 crypto_mechanism_t mech, *mechp; local 8445 crypto_mechanism_t mech; local 8704 dprov_get_sw_prov(crypto_mechanism_t *mech, kcf_provider_desc_t **pd, crypto_mech_type_t *provider_mech_type) argument [all...] |
H A D | crypto.c | 2109 STRUCT_DECL(crypto_mechanism, mech); 2116 STRUCT_INIT(mech, mode); 2117 bcopy(in_mech, STRUCT_BUF(mech), STRUCT_SIZE(mech)); 2118 param = STRUCT_FGETP(mech, cm_param); 2119 param_len = STRUCT_FGET(mech, cm_param_len); 2120 out_mech->cm_type = STRUCT_FGET(mech, cm_type); 2531 /* get the provider's mech number */ 2563 /* get the provider's mech number */ 2579 crypto_mechanism_t *mech) 2578 crypto_free_mech(kcf_provider_desc_t *pd, boolean_t allocated_by_crypto_module, crypto_mechanism_t *mech) argument 2609 crypto_mechanism_t mech; local 3191 crypto_mechanism_t mech; local 3858 crypto_mechanism_t mech; local 5309 crypto_mechanism_t mech; local 5435 crypto_mechanism_t mech; local 5571 crypto_mechanism_t mech; local 5729 crypto_mechanism_t mech; local 5919 crypto_mechanism_t mech; local 6078 crypto_mechanism_t mech; local 6246 crypto_mechanism_t mech; local 6404 crypto_mechanism_t mech; local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/ |
H A D | gssd_clnt_stubs.c | 872 kctx->mech = &default_gc; 905 * in the wrapper context to point to the kernel mech. 907 __kgss_reset_mech(&kctx->mech, *actual_mech_type); 910 * If the mech oid was allocated for us, free it. 1068 * move mech type returned to mech_type 1147 kctx->mech = &default_gc; 1172 __kgss_reset_mech(&kctx->mech, *mech_type); 1175 * If the mech oid was allocated for us, free it. 1489 if (kctx->mech->gss_import_sec_context) { 2708 gss_mechanism mech; local 2800 __kgss_add_mechanism(gss_mechanism mech) argument 2822 gss_mechanism mech; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh1024/ |
H A D | Makefile.com | 43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | Makefile.com | 43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh640/ |
H A D | Makefile.com | 43 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/illumos-gate/usr/src/lib/libcryptoutil/common/ |
H A D | cryptoutil.h | 186 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech); 187 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech);
|
/illumos-gate/usr/src/uts/common/rpc/ |
H A D | rpcsec_gss.h | 242 char *mech, 249 char *mech,
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSession.h | 41 CK_MECHANISM mech; member in struct:crypto_active_op
|
H A D | kernelDigest.c | 79 session_p->digest.mech.mechanism = pMechanism->mechanism; 80 session_p->digest.mech.pParameter = NULL; 81 session_p->digest.mech.ulParameterLen = 0; 209 pMechanism = &(opp->mech);
|
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_init.c | 148 display_status_1(m, code, type, mech) 152 const gss_OID mech; 163 type, mech, 196 * mech kerberos mech 204 display_status(msg, maj_stat, min_stat, mech) 208 char *mech; 212 if (!rpc_gss_mech_to_oid(mech, (rpc_gss_OID *)&mech_oid)) { 215 "Invalid mechanism oid <%s>"), mech); 317 char mech[] local 530 mech); local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | gssapiP_generic.h | 194 unsigned int g_token_size (const gss_OID_desc * mech, unsigned int body_size); 196 void g_make_token_header (const gss_OID_desc * mech, unsigned int body_size, 199 gss_int32 g_verify_token_header (const gss_OID_desc * mech,
|
/illumos-gate/usr/src/cmd/gss/gsscred/ |
H A D | gsscred.c | 70 *uid = NULL, *comment = NULL, *mech = NULL, local 101 mech = optarg; 128 addUser(userName, nameTypeOID, uid, comment, mech); 132 removeUsers(userName, nameTypeOID, uid, mech); 136 listUsers(userName, nameTypeOID, uid, mech); 370 /* are we retrieving everyone ? or searching by mech ? */ 391 /* Are we searching by uid or uid and mech? */ 517 /* must make the name header whic contains mech oid */ 591 /* are we deleting the entire table or an entire mech ? */ 612 /* are we deleting by uid or uid and mech [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 228 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 232 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 499 session_p->sign.mech.mechanism = pMechanism->mechanism; 502 session_p->verify.mech.mechanism = pMechanism->mechanism; 960 get_rsa_sha1_prefix(CK_MECHANISM_PTR mech, CK_BYTE_PTR *prefix) { argument 961 if (mech->pParameter == NULL) { 1035 switch (session_p->digest.mech.mechanism) { 1042 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech), 1123 switch (session_p->digest.mech.mechanism) { 1130 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech), [all...] |
H A D | softDESCrypt.c | 75 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 79 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 501 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; 895 session_p->sign.mech.mechanism = pMechanism->mechanism; 898 session_p->verify.mech.mechanism =
|
H A D | softMAC.h | 142 void sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *, uint64_t *, uint64_t *,
|
H A D | softSession.h | 60 CK_MECHANISM mech; member in struct:crypto_active_op
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss.c | 101 __rpc_gss_seccreate(clnt, server_name, mech, service, qop, options_req, 105 char *mech; /* security mechanism */ 125 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) { 129 if (!__rpc_gss_mech_to_oid(mech, &mech_type)) { 422 char *mech; local 437 if ((mech = __rpc_gss_oid_to_mech(ap->mech_type)) == NULL) 440 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num))
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | cryptmod.c | 670 crypto_mechanism_t mech; local 673 mech.cm_type = digest_type; 674 mech.cm_param = 0; 675 mech.cm_param_len = 0; 693 rv = crypto_digest(&mech, &d1, &d2, NULL); 731 * the userland kerberos mech. 1119 crypto_mechanism_t mech; local 1150 mech.cm_type = cdata->mech_type; 1151 mech.cm_param = cdata->block; 1156 mech 1179 do_hmac(crypto_mech_type_t mech, crypto_key_t *key, char *data, int datalen, char *hmac, int hmaclen) argument 1252 crypto_mechanism_t mech; local 1412 crypto_mechanism_t mech; local 1761 crypto_mechanism_t mech; local 1993 crypto_mechanism_t mech; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_spnego/mech/ |
H A D | spnego_mech.c | 288 mech_spnego.mech = &spnego_mechanism; 617 /* determine negotiation mech set */ 638 * need to pull the first mech from mechSet to do first 721 * mech not finished and mech token missing 779 * the old Kerberos mech OID, even though we sent the new one. 780 * So we will treat all the Kerberos mech OIDS as the same. 794 * init_sec_context(). Acceptor sends no mech 802 * Reject missing mech token when optimistic 803 * mech selecte 1641 gss_mechanism mech = NULL; local 2886 put_mech_oid(unsigned char **buf_out, gss_OID_const mech, unsigned int buflen) argument 3730 g_token_size(gss_OID_const mech, unsigned int body_size) argument 3761 g_make_token_header(gss_OID_const mech, unsigned int body_size, unsigned char **buf, unsigned int totallen) argument 3880 g_verify_token_header(gss_OID_const mech, unsigned int *body_size, unsigned char **buf_in, int tok_type, unsigned int toksize) argument [all...] |
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | setkey.c | 152 struct mechentry mech; member in struct:algtypelist 233 mutex_init(&ap->mech.mech_lock, USYNC_THREAD, NULL); 234 mutex_init(&ap->mech.ps_lock, USYNC_THREAD, NULL); 235 ap->mech.mechdata = NULL; 236 ap->mech.psdata = NULL; 265 debug(KEYSERV_DEBUG0, ("getmechtype return %x", &(*app)->mech)); 266 return (&(*app)->mech); 666 mutex_lock(&ap->mech.mech_lock); 667 if ((mdp = ap->mech.mechdata) == NULL) { 668 mutex_unlock(&ap->mech [all...] |
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | oid.c | 140 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 142 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext }
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 320 #define SASL_NEED_PROXY 0x0008 /* require a mech that allows proxying */ 899 * NULL if mech doesn't include initial client challenge 900 * mech -- set to mechansm name of selected mechanism (may be NULL) 913 const char **mech); 1039 * mech -- the mechanism name client requested 1052 const char *mech,
|