/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/ |
H A D | Makefile.com | 47 CPPFLAGS += -I../mech -I../crypto -I$(SRC)/uts/common/gssapi/include 72 CSRCS= $(MECH:%.o=../mech/%.c) $(CRYPTO:%.o=../crypto/%.c) 95 $(OBJS): ../mech/dh_gssapi.h ../mech/token.h ../mech/oid.h 102 objs/%.o pics/%.o: ../mech/%.c
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/dummy/ |
H A D | dmech.c | 71 static int g_token_size(gss_OID mech, unsigned int body_size); 72 static void g_make_token_header(gss_OID mech, int body_size, 74 static int g_verify_token_header(gss_OID mech, int *body_size, 143 gss_mechanism mech, tmp; local 145 mech = gss_mech_initialize(); 148 tmp = __kgss_get_mechanism(&mech->mech_type); 162 __kgss_add_mechanism(mech); 163 ASSERT(__kgss_get_mechanism(&mech->mech_type) == mech); 484 g_token_size(mech, body_siz [all...] |
/illumos-gate/usr/src/lib/libcryptoutil/common/ |
H A D | mechstr.c | 45 CK_MECHANISM_TYPE mech; member in struct:__anon3096 327 return (((pkcs11_mapping_t *)mapping1)->mech - 328 ((pkcs11_mapping_t *)mapping2)->mech); 333 * pkcs11_mech2str - convert PKCS#11 mech to a string 340 *pkcs11_mech2str(CK_MECHANISM_TYPE mech) argument 345 if (mech >= CKM_VENDOR_DEFINED) { 350 target.mech = mech; 363 * pkcs11_str2mech - convert a string into a PKCS#11 mech number. 365 * Since there isn't a reserved value for an invalid mech w 370 pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_signing.c | 57 smb_sign_mech_t *mech; local 59 if ((mech = s->sign_mech) != NULL) { 60 kmem_free(mech, sizeof (*mech)); 78 smb_sign_mech_t *mech; local 93 * Get mech handle, sign_fini function. 97 mech = kmem_zalloc(sizeof (*mech), KM_SLEEP); 98 rc = smb2_hmac_getmech(mech); 100 kmem_free(mech, sizeo [all...] |
H A D | smb_signing.c | 107 smb_sign_mech_t *mech; local 109 if ((mech = s->sign_mech) != NULL) { 110 kmem_free(mech, sizeof (*mech)); 128 smb_sign_mech_t *mech; local 155 * Get the mech handle 158 mech = kmem_zalloc(sizeof (*mech), KM_SLEEP); 159 rc = smb_md5_getmech(mech); 161 kmem_free(mech, sizeo [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | server.c | 104 * which may lead to a memory leak. We keep glob_context with each mech 200 /* can't set pass for this mech */ 253 cur->mech->plug->mech_dispose(cur->context, s_conn->sparams->utils); 270 if (s_conn->mech 271 && s_conn->mech->plug->mech_dispose) { 272 s_conn->mech->plug->mech_dispose(pconn->context, 283 cur->mech->plug->mech_dispose(cur->context, s_conn->sparams->utils); 396 mechanism_t *mech; local 485 mech = sasl_ALLOC(sizeof(mechanism_t)); 487 if (! mech) { 1408 mech_permitted(sasl_conn_t *conn, mechanism_t *mech) argument [all...] |
H A D | client.c | 73 * which may lead to a memory leak. We keep glob_context with each mech 207 cmechanism_t *mech; local 284 mech = sasl_ALLOC(sizeof(cmechanism_t)); 286 if (! mech) { 290 mech->glob_context = pluglist->glob_context; 292 if (! mech) return SASL_NOMEM; 295 mech->plug=pluglist++; 296 if(_sasl_strdup(plugname, &mech->plugname, NULL) != SASL_OK) { 300 sasl_FREE(mech); 304 mech 683 have_prompts(sasl_conn_t *conn, const sasl_client_plug_t *mech) argument 733 sasl_client_start(sasl_conn_t *conn, const char *mechlist, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen, const char **mech) argument [all...] |
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | api.h | 64 extern int crypto_create_ctx_template(crypto_mechanism_t *mech, 71 extern int crypto_digest(crypto_mechanism_t *mech, crypto_data_t *data, 76 extern int crypto_digest_init(crypto_mechanism_t *mech, crypto_context_t *ctxp, 88 extern int crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, 94 extern int crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, 100 extern int crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, 113 extern int crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, 119 extern int crypto_sign_init(crypto_mechanism_t *mech, crypto_key_t *key, 131 extern int crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, 141 extern int crypto_verify(crypto_mechanism_t *mech, crypto_key_ [all...] |
H A D | impl.h | 310 /* list of crypto_mech_info_t valid as the second mech in a dual operation */ 328 crypto_mech_info_t pm_mech_info; /* Provider mech info */ 365 * threshold for using hardware providers for this mech 553 #define KCF_MECH_TAB_FULL 0x4 /* Need more room in the mech tabs. */ 604 #define KCF_PROV_CREATE_CTX_TEMPLATE(pd, mech, key, template, size, req) ( \ 607 (pd)->pd_prov_handle, mech, key, template, size, req) : \ 635 #define KCF_PROV_DIGEST_INIT(pd, ctx, mech, req) ( \ 637 KCF_PROV_DIGEST_OPS(pd)->digest_init(ctx, mech, req) : \ 664 #define KCF_PROV_DIGEST_ATOMIC(pd, session, mech, data, digest, req) ( \ 667 (pd)->pd_prov_handle, session, mech, dat [all...] |
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_imp_name.c | 192 gss_mechanism mech; local 242 if ((mech = __gss_get_mechanism(&mechOid)) == NULL) 245 if (mech->gss_import_name == NULL) 251 * if we create it; so if mech->gss_export_name == NULL, we must 254 if (mech->gss_export_name) { 255 major = mech->gss_import_name(mech->context, minor, 260 map_error(minor, mech); 281 * Additionally, the Kerberos V mech used to make display names 340 * Can a name be null? Let the mech decid [all...] |
H A D | g_dsp_status.c | 64 gss_mechanism mech; local 130 mech = __gss_get_mechanism(mech_type); 132 if (mech && mech->gss_display_status) { 136 mech_type = &mech->mech_type; 138 r = mech->gss_display_status(mech->context, minor_status, 145 map_error(minor_status, mech); 149 if (!mech)
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | cred.c | 86 !__OID_is_member(desired_mechs, cntx->mech)) 126 if (mechs && (*minor = __OID_to_OID_set(mechs, cntx->mech))) { 159 * gss_name_t name, gss_OID mech, gss_cred_usage_t usage, 227 (*minor = __OID_to_OID_set(mechs, cntx->mech)) != DH_SUCCESS) { 239 * cred and mech. Since we're a backend, mech must be our mech. 241 * We verify that passed in mech is correct and use the above routine 248 gss_OID mech, /* Along with the mechanism */ 261 if (!__OID_equal(mech, contex 245 __dh_gss_inquire_cred_by_mech(void *ctx, OM_uint32 *minor, gss_cred_id_t cred, gss_OID mech, gss_name_t *name, OM_uint32 *init_time, OM_uint32 *accept_time, gss_cred_usage_t *usage ) argument [all...] |
H A D | token.c | 95 * ~ ~ (mech->length) DER encoded length of mech->length 99 * ~ ~ mech->length OID elements (mech->elements) 117 gss_OID mech, /* The mechanism this is for */ 148 oid_size = mech->length; 149 oid_size += der_length_size(mech->length); 178 put_der_length(mech->length, &buf, oid_size); 180 memcpy(buf, mech->elements, mech 116 __make_ap_token(gss_buffer_t result, gss_OID mech, dh_token_t token, dh_key_set_t keys ) argument 295 __get_ap_token(gss_buffer_t input, gss_OID mech, dh_token_t token, dh_signature_t sig ) argument [all...] |
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 30 char *mech; member in struct:__anon728 41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, argument 49 if (mech) 50 defaults->mech = mech; 52 ldap_get_option(ld, LDAP_OPT_X_SASL_MECH, &defaults->mech);
|
/illumos-gate/usr/src/uts/common/gssapi/ |
H A D | gssapi_ext.h | 83 char *mech; member in struct:_qop_num 89 char *mech, /* input mech string */ 95 char *mech, /* input mech string */ 102 char *mech, /* input mech string */ 108 char *mech, /* input mech */ 109 qop_num *mech_qops, /* mech qop [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/ |
H A D | krb5mech.c | 132 gss_mechanism mech, tmp; local 137 mech = gss_mech_initialize(); 140 tmp = __kgss_get_mechanism(&mech->mech_type); 156 __kgss_add_mechanism(mech); 157 ASSERT(__kgss_get_mechanism(&mech->mech_type) == mech);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_template.c | 79 gss_mechanism mech; local 81 mech = __dh_generic_initialize(&dh_mech, OID, &dh_keyopts); 83 if (mech == NULL) { 87 return (mech);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dummy/ |
H A D | Makefile.com | 46 SRCDIR = ../mech
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSessionUtil.c | 493 switch (session_p->digest.mech.mechanism) { 529 switch (session_p->digest.mech.mechanism) { 565 static CK_BYTE_PTR alloc_digest(CK_ULONG mech) argument 569 switch (mech) { 598 CK_ULONG mech; local 623 mech = p_active_op->mech.mechanism; 625 if (!DIGEST_MECH_OK(mech)) { 647 (session_p->digest.mech.mechanism != mech)) { [all...] |
H A D | softDigestUtil.c | 73 session_p->digest.mech.mechanism = CKM_MD5; 91 session_p->digest.mech.mechanism = CKM_SHA_1; 92 session_p->digest.mech.pParameter = pMechanism->pParameter; 93 session_p->digest.mech.ulParameterLen = 116 session_p->digest.mech.mechanism = CKM_SHA256; 123 session_p->digest.mech.mechanism = CKM_SHA384; 130 session_p->digest.mech.mechanism = CKM_SHA512; 178 switch (session_p->digest.mech.mechanism) { 228 switch (session_p->digest.mech.mechanism) { 365 switch (session_p->digest.mech [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 234 crypto_mechanism_t mech; local 250 mech.cm_type = crypto_mech2id(SUN_CKM_AES_CCM); 251 mech.cm_param = (caddr_t)cmparam; 252 mech.cm_param_len = sizeof (CK_AES_CCM_PARAMS); 255 ieee80211_dbg(IEEE80211_MSG_CRYPTO, "cm_type=%lx", mech.cm_type); 257 ieee80211_dbg(IEEE80211_MSG_CRYPTO, "cm_type=%llx", mech.cm_type); 276 rv = crypto_encrypt(&mech, &d1, &crkey, NULL, &d2, NULL); 287 crypto_mechanism_t mech; local 303 mech.cm_type = crypto_mech2id(SUN_CKM_AES_CCM); 304 mech [all...] |
/illumos-gate/usr/src/cmd/boot/bootadm/ |
H A D | bootadm_digest.c | 112 CK_MECHANISM mech; local 196 mech.mechanism = mech_type; 197 mech.pParameter = NULL; 198 mech.ulParameterLen = 0; 207 rv = do_digest(hSession, &mech, fd, &resultbuf, &resultlen);
|
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 247 int mech; local 254 for (mech = 0; mech < MECH_ALIASES_COUNT; mech++) { 256 if (mech_aliases[mech].available == B_FALSE) 260 (void) printf("%-15s", mech_aliases[mech].alias); 262 if (mech_aliases[mech].keysize_min != ULONG_MAX && 263 mech_aliases[mech].keysize_max != 0) 265 (mech_aliases[mech].keysize_min * 266 mech_aliases[mech] 370 CK_MECHANISM mech; local [all...] |
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 721 rpc_gss_OID mech; local 728 mech = kmem_alloc(sizeof (rpc_gss_OID_desc), KM_SLEEP); 735 kmem_free(mech, sizeof (rpc_gss_OID_desc)); 738 mech->length = mech32.length; 739 mech->elements = (caddr_t)(uintptr_t)mech32.elements; 742 if (copyin(mechanism, mech, sizeof (rpc_gss_OID_desc))) { 743 kmem_free(mech, sizeof (rpc_gss_OID_desc)); 747 if (mech->length < MINAUTHLEN || 748 mech->length > MAXAUTHLEN) { 749 kmem_free(mech, sizeo [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | key_mgr.c | 60 CK_MECHANISM * mech, 76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) { 116 switch (mech->mechanism) { 145 switch (mech->mechanism) { 234 CK_MECHANISM * mech, 280 switch (mech->mechanism) { 318 switch (mech->mechanism) { 332 rc = encr_mgr_init(sess, ctx, OP_WRAP, mech, h_wrapping_key); 350 CK_MECHANISM * mech, 381 switch (mech 59 key_mgr_generate_key_pair(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * publ_tmpl, CK_ULONG publ_count, CK_ATTRIBUTE * priv_tmpl, CK_ULONG priv_count, CK_OBJECT_HANDLE * publ_key_handle, CK_OBJECT_HANDLE * priv_key_handle) argument 232 key_mgr_wrap_key(SESSION * sess, CK_BBOOL length_only, CK_MECHANISM * mech, CK_OBJECT_HANDLE h_wrapping_key, CK_OBJECT_HANDLE h_key, CK_BYTE * wrapped_key, CK_ULONG * wrapped_key_len) argument 349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument [all...] |