/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/hash_provider/ |
H A D | hash_kef_generic.c | 24 crypto_mechanism_t mech; local 40 mech.cm_type = context->kef_cksum_mt; 41 if (mech.cm_type == CRYPTO_MECH_INVALID) { 43 "k5_ef_hash() invalid mech specified: 0x%llx", 47 mech.cm_param = 0; 48 mech.cm_param_len = 0; 50 rv = crypto_digest_init(&mech, &ctxp, NULL); 97 crypto_mechanism_t mech; local 116 mech.cm_type = context->kef_hash_mt; 117 if (mech [all...] |
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_userok.c | 99 gss_mechanism mech; local 115 mech = __gss_get_mechanism(intName->mech_type); 116 if (mech == NULL) 125 if (mech->__gss_userok) 126 major = mech->__gss_userok(mech->context, minor, mechName,
|
H A D | g_inquire_cred.c | 54 gss_mechanism mech; local 78 * get_mechanism will return the first mechanism in the mech 82 if ((mech = __gss_get_mechanism(GSS_C_NULL_OID)) == NULL) 85 if (!mech->gss_inquire_cred) 88 status = mech->gss_inquire_cred(mech->context, minor_status, 95 map_error(minor_status, mech); 104 &temp_minor_status, mech, 108 map_error(minor_status, mech); 227 gss_mechanism mech; local [all...] |
H A D | g_utils.c | 143 num_str = name; /* will contain mech */ 148 qop_num_pairs[qop_num_pair_cnt].mech = strdup(name); 149 if (qop_num_pairs[qop_num_pair_cnt].mech == NULL) { 166 char *mech, 186 if ((strcasecmp(mech, qop_num_pairs[i].mech) == 0) && 198 char *mech, 215 if (mech == NULL) 222 if ((strcasecmp(mech, qop_num_pairs[i].mech) 164 __gss_qop_to_num( char *qop, char *mech, OM_uint32 *num ) argument 197 __gss_num_to_qop( char *mech, OM_uint32 num, char **qop ) argument 236 __gss_get_mech_info( char *mech, char **qops ) argument 271 __gss_mech_qops( char *mech, qop_num *mechqops, int *numqop ) argument [all...] |
H A D | g_exp_sec_context.c | 82 gss_mechanism mech; local 97 mech = __gss_get_mechanism(ctx->mech_type); 98 if (!mech) 100 if (!mech->gss_export_sec_context) 103 status = mech->gss_export_sec_context(mech->context, minor_status, 106 map_error(minor_status, mech);
|
H A D | g_imp_sec_context.c | 84 gss_mechanism mech; local 134 mech = __gss_get_mechanism(ctx->mech_type); 135 if (!mech) { 139 if (!mech->gss_import_sec_context) { 144 status = mech->gss_import_sec_context(mech->context, minor_status, 151 map_error(minor_status, mech);
|
H A D | g_inquire_names.c | 44 gss_mechanism mech; local 67 mech = __gss_get_mechanism(mechanism); 69 if (mech) { 71 if (mech->gss_inquire_names_for_mech) { 72 status = mech->gss_inquire_names_for_mech( 73 mech->context, 78 map_error(minor_status, mech);
|
H A D | g_accept_sec_context.c | 122 gss_mechanism mech; local 136 * descriptor to hold the mech type information as well as the 146 /* Get the token mech type */ 189 mech = __gss_get_mechanism(token_mech_type); 190 if (mech && mech->gss_accept_sec_context) { 191 status = mech->gss_accept_sec_context( 192 mech->context, 214 map_error(minor_status, mech); 231 &t_minstat, mech, [all...] |
H A D | g_acquire_cred_with_pw.c | 109 gss_mechanism mech; local 140 mech = __gss_get_mechanism(GSS_C_NULL_OID); 141 if (mech == NULL) 147 default_OID.length = mech->mech_type.length; 148 default_OID.elements = mech->mech_type.elements; 163 /* for each requested mech attempt to obtain a credential */ 245 gss_mechanism mech; local 280 if ((mech = __gss_get_mechanism(desired_mech)) == NULL) 304 &mech->mech_type)) 308 &mech [all...] |
H A D | g_acquire_cred.c | 152 gss_mechanism mech; local 177 mech = __gss_get_mechanism(NULL); 178 if (mech == NULL) 184 default_OID.length = mech->mech_type.length; 185 default_OID.elements = mech->mech_type.elements; 200 /* for each requested mech attempt to obtain a credential */ 335 gss_mechanism mech; local 358 mech = __gss_get_mechanism(desired_mech); 359 if (!mech) 361 else if (!mech [all...] |
H A D | g_init_sec_context.c | 109 gss_mechanism mech; local 130 mech = __gss_get_mechanism(mech_type); 131 if (mech == NULL) 134 if (mech->gss_init_sec_context == NULL) 138 mech_type = &mech->mech_type; 157 * descriptor to hold the mech type information as well as the 191 status = mech->gss_init_sec_context( 192 mech->context, 214 map_error(minor_status, mech);
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_ctxops.c | 47 * mech: crypto_mechanism_t pointer. 50 * When the mech's parameter is not NULL, its definition depends 73 * RYPTO_MECHANISM_INVALID: invalid mechanism 'mech'. 76 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument 90 if (mech == NULL) 93 error = kcf_get_sw_prov(mech->cm_type, &pd, &me, B_TRUE); 104 prov_mech.cm_type = KCF_TO_PROV_MECHNUM(pd, mech->cm_type); 105 prov_mech.cm_param = mech->cm_param; 106 prov_mech.cm_param_len = mech->cm_param_len;
|
H A D | kcf_cipher.c | 51 * CRYPTO_INVALID_MECH for problems with the 'mech'. 71 * mech: crypto_mechanism_t pointer. 74 * When the mech's parameter is not NULL, its definition depends 78 * encryption or decryption with the 'mech' using 'key'. 106 crypto_mechanism_t *mech, crypto_key_t *key, 120 error = kcf_get_hardware_provider(mech->cm_type, key, 124 error = kcf_get_hardware_provider(mech->cm_type, key, 144 lmech = *mech; 145 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, real_provider, &lmech); 164 KCF_CAN_SHARE_OPSTATE(pd, mech 105 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 229 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 445 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 727 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_mac.c | 51 * CRYPTO_INVALID_MECH for problems with the 'mech'. 67 * mech: crypto_mechanism_t pointer. 70 * When the mech's parameter is not NULL, its definition depends 76 * MAC with the 'mech' using 'key'. 'tmpl' is created by 83 * 'mech', using * the key 'key', on the specified provider with 96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, 107 rv = kcf_get_hardware_provider(mech->cm_type, key, 115 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, key, 129 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, argument 143 if ((pd = kcf_get_mech_provider(mech 95 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 219 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 253 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 371 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 434 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_sign.c | 47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 74 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, mech, 91 crypto_sign_init(crypto_mechanism_t *mech, crypto_key_t *key, argument 103 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error, 129 error = crypto_sign_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl, 228 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, 240 rv = kcf_get_hardware_provider(mech->cm_type, key, 247 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, 257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_ argument 46 crypto_sign_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 386 crypto_sign_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_verify.c | 47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 74 KCF_WRAP_VERIFY_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, mech, 92 crypto_verify_init(crypto_mechanism_t *mech, crypto_key_t *key, argument 104 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error, 130 error = crypto_verify_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl, 230 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, 242 rv = kcf_get_hardware_provider(mech->cm_type, key, 249 KCF_WRAP_VERIFY_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, 259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_ argument 46 crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 388 crypto_verify_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_digest.c | 52 * for problems with the 'mech'. 70 * mech: crypto_mechanism_t pointer. 73 * When the mech's parameter is not NULL, its definition depends 96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, 107 rv = kcf_get_hardware_provider(mech->cm_type, NULL, 114 KCF_WRAP_DIGEST_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, NULL, 130 crypto_digest(crypto_mechanism_t *mech, crypto_data_t *data, argument 140 if ((pd = kcf_get_mech_provider(mech->cm_type, NULL, NULL, &error, 151 lmech = *mech; 152 KCF_SET_PROVIDER_MECHNUM(mech 95 crypto_digest_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *crq) argument 209 crypto_digest_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 272 crypto_digest_init(crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_sign_kcf.c | 37 smb_md5_getmech(smb_sign_mech_t *mech) argument 44 mech->cm_type = t; 52 smb_md5_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech) argument 56 rv = crypto_digest_init(mech, ctxp, NULL); 107 smb2_hmac_getmech(smb_sign_mech_t *mech) argument 114 mech->cm_type = t; 122 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, argument 133 rv = crypto_mac_init(mech, &ckey, NULL, ctxp, NULL);
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Conf.h | 42 extern boolean_t pkcs11_is_dismech(CK_SLOT_ID slotid, CK_MECHANISM_TYPE mech);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | dig_mgr.c | 302 CK_MECHANISM *mech) 311 switch (mech->mechanism) { 339 ctx->mech.ulParameterLen = mech->ulParameterLen; 340 ctx->mech.mechanism = mech->mechanism; 341 ctx->mech.pParameter = mech->pParameter; 354 if (ctx->mech.mechanism == CKM_MD5) { 357 } else if (ctx->mech 300 digest_mgr_init(SESSION *sess, DIGEST_CONTEXT *ctx, CK_MECHANISM *mech) argument [all...] |
H A D | sess_mgr.c | 580 if (sess->encr_ctx.mech.pParameter) 581 free(sess->encr_ctx.mech.pParameter); 586 if (sess->decr_ctx.mech.pParameter) 587 free(sess->decr_ctx.mech.pParameter); 592 if (sess->digest_ctx.mech.pParameter) 593 free(sess->digest_ctx.mech.pParameter); 598 if (sess->sign_ctx.mech.pParameter) 599 free(sess->sign_ctx.mech.pParameter); 604 if (sess->verify_ctx.mech.pParameter) 605 free(sess->verify_ctx.mech [all...] |
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 74 __rpc_gss_mech_to_oid(char *mech, rpc_gss_OID *oid) argument 76 if (__gss_mech_to_oid(mech, (gss_OID*)oid) != GSS_S_COMPLETE) 89 __rpc_gss_qop_to_num(char *qop, char *mech, OM_uint32 *num) argument 91 if (__gss_qop_to_num(qop, mech, num) != GSS_S_COMPLETE) 97 __rpc_gss_num_to_qop(char *mech, OM_uint32 num) argument 101 if (__gss_num_to_qop(mech, num, &qop) != GSS_S_COMPLETE) 144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument 158 if (!__rpc_gss_mech_to_oid(mech, (rpc_gss_OID *) &mech_oid)) { 160 "mech oid"); 258 /* Don't know how to get the service type for a given mech 263 __rpc_gss_get_mech_info(char *mech, rpc_gss_service_t *service) argument 296 __rpc_gss_is_installed(char *mech) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | support.c | 48 gss_OID mech, /* Our OID or GSS_C_NO_OID */ 79 if (mech != GSS_C_NO_OID && 80 !__OID_equal(((dh_context_t)ctx)->mech, mech)) 44 __dh_gss_display_status(void *ctx, OM_uint32 *minor, OM_uint32 status_value, int status_type, gss_OID mech, OM_uint32* mesg_ctx, gss_buffer_t status_str ) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_spnego/ |
H A D | Makefile | 38 HDRDIR = mech
|
H A D | Makefile.com | 42 SRCDIR = ../mech 46 CPPFLAGS += -I$(SRC)/uts/common/gssapi/include $(DEBUG) -I$(SRC)/lib/gss_mechs/mech_krb5/include -I$(SRC)/uts/common/gssapi/mechs/krb5/include -I$(SRC)/lib/gss_mechs/mech_krb5/mech
|