Searched defs:ctx (Results 126 - 150 of 380) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5seal.c379 krb5_gss_ctx_id_rec *ctx; local
409 ctx = (krb5_gss_ctx_id_rec *) context_handle;
411 if (ctx->subkey == NULL && !ctx->established) {
416 context = ctx->k5_context;
424 switch (ctx->proto)
427 code = make_seal_token_v1(context, ctx->enc, ctx->seq,
428 &ctx->seq_send, ctx
[all...]
H A Dk5unseal.c60 kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer,
64 krb5_gss_ctx_id_rec *ctx;
127 (sealalg == ctx->sealalg))) {
136 if ((ctx->sealalg == SEAL_ALG_NONE && signalg > 1) ||
137 (ctx->sealalg == SEAL_ALG_1 && signalg != SGN_ALG_3) ||
138 (ctx->sealalg == SEAL_ALG_DES3KD &&
140 (ctx->sealalg == SEAL_ALG_MICROSOFT_RC4 &&
177 ctx->seq);
179 ctx->seq);
181 ctx
660 krb5_gss_ctx_id_rec *ctx; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_digest.c213 crypto_ctx_t *ctx; local
230 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) {
242 error = KCF_PROV_DIGEST_INIT(real_provider, ctx, &lmech,
248 error = kcf_submit_request(real_provider, ctx, crq, &params,
256 *ctxp = (crypto_context_t)ctx;
259 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private);
339 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
345 if ((ctx == NULL) ||
346 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) ||
355 error = KCF_PROV_DIGEST_UPDATE(pd, ctx, dat
388 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
425 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
459 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
[all...]
H A Dkcf_mac.c376 crypto_ctx_t *ctx; local
393 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) {
405 rv = KCF_PROV_MAC_INIT(real_provider, ctx, &lmech, key, tmpl,
411 rv = kcf_submit_request(real_provider, ctx, crq, &params,
419 *ctxp = (crypto_context_t)ctx;
422 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private);
525 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
531 if ((ctx == NULL) ||
532 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) ||
541 rv = KCF_PROV_MAC_UPDATE(pd, ctx, dat
574 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
610 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
[all...]
H A Dkcf_sign.c51 crypto_ctx_t *ctx; local
68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) {
76 rv = kcf_submit_request(real_provider, ctx, crq, &params, B_FALSE);
81 *ctxp = (crypto_context_t)ctx;
84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private);
149 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
155 if ((ctx == NULL) ||
156 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) ||
163 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
177 crypto_ctx_t *ctx local
204 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
391 crypto_ctx_t *ctx; local
434 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
[all...]
H A Dkcf_verify.c51 crypto_ctx_t *ctx; local
68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) {
76 rv = kcf_submit_request(real_provider, ctx, crq, &params, B_FALSE);
81 *ctxp = (crypto_context_t)ctx;
84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private);
150 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
156 if ((ctx == NULL) ||
157 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) ||
164 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
179 crypto_ctx_t *ctx local
206 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
393 crypto_ctx_t *ctx; local
436 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Ddca_dsa.c48 int dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig,
50 int dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig,
52 int dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
57 dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, argument
60 dca_request_t *reqp = ctx->cc_provider_private;
61 dca_t *dca = ctx->cc_provider;
143 (void) dca_free_context(ctx);
194 crypto_ctx_t ctx; local
195 ctx.cc_provider_private = reqp;
196 dca_dsactxfree(&ctx);
201 dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, crypto_req_handle_t req) argument
374 crypto_ctx_t ctx; local
382 dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int mode) argument
525 crypto_ctx_t *ctx = (crypto_ctx_t *)arg; local
547 crypto_ctx_t ctx; /* on the stack */ local
[all...]
/illumos-gate/usr/src/uts/common/io/drm/
H A Ddrm_context.c309 drm_ctx_t ctx; local
323 bzero(&ctx, sizeof (ctx));
325 ctx.handle = i;
327 &ctx, sizeof (ctx));
352 drm_ctx_t ctx; local
354 DRM_COPYFROM_WITH_RETURN(&ctx, (void *)data, sizeof (ctx));
356 ctx
386 drm_ctx_t ctx; local
403 drm_ctx_t ctx; local
416 drm_ctx_t ctx; local
431 drm_ctx_t ctx; local
[all...]
/illumos-gate/usr/src/uts/i86pc/io/acpi/acpidev/
H A Dacpidev_container.c184 acpidev_container_search_dev(ACPI_HANDLE hdl, UINT32 lvl, void *ctx, argument
189 int *fp = (int *)ctx;
/illumos-gate/usr/src/uts/i86pc/io/
H A Dcpudrv_mach.c134 cpudrv_set_topspeed(void *ctx, int plat_level) argument
145 dip = ctx;
182 cpudrv_get_topspeed(void *ctx) argument
190 dip = ctx;
210 cpudrv_notify_handler(ACPI_HANDLE obj, UINT32 val, void *ctx) argument
219 dip = ctx;
234 cpudrv_redefine_topspeed(ctx);
273 cpudrv_redefine_topspeed(void *ctx) argument
289 (*cpupm_redefine_topspeed)(ctx);
H A Dppm_plat.c60 ppm_redefine_topspeed(void *ctx) argument
68 cpup = PPM_GET_PRIVATE((dev_info_t *)ctx);
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_init.c492 krb5_error_code kadm5_init_krb5_context (krb5_context *ctx) argument
505 return krb5int_init_context_kdc(ctx);
/illumos-gate/usr/src/uts/i86pc/os/cpupm/
H A Dcpupm_throttle.c326 cpupm_throttle_manage_notification(void *ctx) argument
328 cpu_t *cp = ctx;
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_context.c102 krb5_gss_ctx_id_rec *ctx; local
118 ctx = (krb5_gss_ctx_id_rec *) context_handle;
120 if (! ctx->established) {
127 context = ctx->k5_context;
137 if ((lifetime = ctx->endtime - now) < 0)
142 ctx->initiate?ctx->here:ctx->there,
157 ctx->initiate?ctx
208 krb5_gss_ctx_id_rec *ctx; local
265 krb5_gss_ctx_id_rec *ctx; local
342 krb5_gss_ctx_id_rec *ctx; local
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb2_signing.c160 smb_sign_ctx_t ctx = 0; local
170 rc = smb2_hmac_init(&ctx, s->sign_mech, sign_key->key, sign_key->len);
185 if ((rc = smb2_hmac_update(ctx, tmp_hdr, tlen)) != 0)
213 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data + offset, tlen);
228 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data, tlen);
238 if ((rc = smb2_hmac_final(ctx, digest)) != 0)
/illumos-gate/usr/src/cmd/smbsrv/smbd/
H A Dsmbd_krb5ssp.c45 get_ssnkey(authsvc_context_t *ctx);
54 * Todo: allocate ctx->ctx_backend
58 smbd_krb5ssp_init(authsvc_context_t *ctx) argument
67 ctx->ctx_backend = be;
73 * Todo: free ctx->ctx_backend
76 smbd_krb5ssp_fini(authsvc_context_t *ctx) argument
78 krb5ssp_backend_t *be = ctx->ctx_backend;
108 * State across messages is in ctx->ctx_backend
111 smbd_krb5ssp_work(authsvc_context_t *ctx) argument
115 krb5ssp_backend_t *be = ctx
305 get_ssnkey(authsvc_context_t *ctx) argument
[all...]
/illumos-gate/usr/src/common/crypto/skein/
H A Dskein.c16 void Skein_256_Process_Block(Skein_256_Ctxt_t *ctx, const uint8_t *blkPtr,
18 void Skein_512_Process_Block(Skein_512_Ctxt_t *ctx, const uint8_t *blkPtr,
20 void Skein1024_Process_Block(Skein1024_Ctxt_t *ctx, const uint8_t *blkPtr,
26 Skein_256_Init(Skein_256_Ctxt_t *ctx, size_t hashBitLen) argument
34 ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
39 bcopy(SKEIN_256_IV_256, ctx->X, sizeof (ctx->X));
42 bcopy(SKEIN_256_IV_224, ctx->X, sizeof (ctx->X));
45 bcopy(SKEIN_256_IV_160, ctx
90 Skein_256_InitExt(Skein_256_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
158 Skein_256_Update(Skein_256_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument
211 Skein_256_Final(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument
262 Skein_512_Init(Skein_512_Ctxt_t *ctx, size_t hashBitLen) argument
327 Skein_512_InitExt(Skein_512_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
394 Skein_512_Update(Skein_512_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument
447 Skein_512_Final(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument
498 Skein1024_Init(Skein1024_Ctxt_t *ctx, size_t hashBitLen) argument
560 Skein1024_InitExt(Skein1024_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
627 Skein1024_Update(Skein1024_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument
680 Skein1024_Final(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument
732 Skein_256_Final_Pad(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument
753 Skein_512_Final_Pad(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument
774 Skein1024_Final_Pad(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument
797 Skein_256_Output(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument
837 Skein_512_Output(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument
877 Skein1024_Output(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftMAC.c188 soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech)
215 SOFT_MAC_INIT_CTX(MD5, &(ctx->hc_ctx_u.md5_ctx),
255 md5_hmac_ctx_init(&ctx->hc_ctx_u.md5_ctx, md5_ipad, md5_opad);
281 SOFT_MAC_INIT_CTX(SHA1, &(ctx->hc_ctx_u.sha1_ctx),
321 sha1_hmac_ctx_init(&ctx->hc_ctx_u.sha1_ctx, sha1_ipad,
361 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx,
402 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx,
443 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx,
670 sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *ctx, uint64_t *ipad, argument
682 SHA2Init(mech, &ctx
187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dkey_mgr.c239 ENCR_DECR_CONTEXT * ctx = NULL; local
326 ctx = (ENCR_DECR_CONTEXT *)malloc(sizeof (ENCR_DECR_CONTEXT));
327 if (! ctx) {
330 (void) memset(ctx, 0x0, sizeof (ENCR_DECR_CONTEXT));
332 rc = encr_mgr_init(sess, ctx, OP_WRAP, mech, h_wrapping_key);
337 ctx, data, data_len, wrapped_key, wrapped_key_len);
342 (void) encr_mgr_cleanup(ctx);
343 free(ctx);
358 ENCR_DECR_CONTEXT * ctx = NULL; local
418 ctx
[all...]
H A Dmech_rsa.c177 ENCR_DECR_CONTEXT *ctx,
190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
220 ENCR_DECR_CONTEXT *ctx,
233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
264 SIGN_VERIFY_CONTEXT *ctx,
277 if (! sess || ! ctx || ! out_data_len) {
280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
308 SIGN_VERIFY_CONTEXT * ctx,
320 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
347 SIGN_VERIFY_CONTEXT *ctx,
175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
H A Dsess_mgr.c1015 ENCR_DECR_CONTEXT *ctx = (ENCR_DECR_CONTEXT *)cptr; local
1018 ctx->context_len + ctx->mech.ulParameterLen;
1028 ptr1 = (CK_BYTE *)ctx;
1030 ptr3 = ptr2 + ctx->context_len;
1032 if (ctx->context_len) {
1033 context = (CK_BYTE *)malloc(ctx->context_len);
1037 (void) memcpy(context, ptr2, ctx->context_len);
1040 if (ctx->mech.ulParameterLen) {
1042 ctx
1058 SIGN_VERIFY_CONTEXT *ctx = (SIGN_VERIFY_CONTEXT *)cptr; local
1100 DIGEST_CONTEXT *ctx = (DIGEST_CONTEXT *)cptr; local
[all...]
H A Dutility.c626 SHA1_CTX ctx; local
628 SHA1Init(&ctx);
630 SHA1Update(&ctx, data, len);
632 SHA1Final(hash, &ctx);
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcontext_establish.c156 gen_accept_token(dh_gss_context_t ctx, /* Diffie-Hellman context */ argument
168 token.ver.verno = ctx->proto_version;
172 accept->remote = ctx->local;
174 accept->local = ctx->remote;
176 accept->flags = ctx->flags;
178 accept->expire = ctx->expire;
182 keys.dh_key_set_len = ctx->no_keys;
183 keys.dh_key_set_val = ctx->keys;
360 __dh_gss_accept_sec_context(void *ctx, /* Per mechanism context */ argument
375 /* ctx i
889 __dh_gss_init_sec_context(void *ctx, OM_uint32 *minor, gss_cred_id_t cred, gss_ctx_id_t *context, gss_name_t target, gss_OID mech, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t channel, gss_buffer_t input_token, gss_OID *mech_rec, gss_buffer_t output_token, OM_uint32 *flags_rec, OM_uint32 *time_rec ) argument
[all...]
H A Dname.c66 __dh_gss_compare_name(void *ctx, /* Per mechanism context (not used) */ argument
72 _NOTE(ARGUNUSED(ctx))
95 __dh_gss_display_name(void * ctx, /* Per mechanism context (not used) */ argument
101 _NOTE(ARGUNUSED(ctx))
331 do_exported_netname(dh_context_t ctx, /* Diffie-Hellman mech context */ argument
374 if (mechoidlen != ctx->mech->length)
376 if (memcmp(p, ctx->mech->elements, mechoidlen) != 0)
442 __dh_gss_import_name(void *ctx, /* Per mechanism context */ argument
475 stat = do_exported_netname((dh_context_t)ctx, minor,
526 __dh_gss_release_name(void *ctx, OM_uint3 argument
554 __dh_gss_inquire_names_for_mech(void *ctx, OM_uint32 *minor, gss_OID mech, gss_OID_set *names) argument
588 __dh_pname_to_uid(void *ctx, OM_uint32 *minor, const gss_name_t pname, uid_t *uid ) argument
634 __dh_gss_export_name(void *ctx, OM_uint32 *minor, const gss_name_t input_name, gss_buffer_t exported_name ) argument
773 __dh_gss_internal_release_oid(void *ctx, OM_uint32 *minor, gss_OID *oid) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c43 kt_open(krb5_context ctx, krb5_keytab *kt) argument
51 if ((code = krb5_kt_default_name(ctx, buf, sizeof (buf))) != 0)
65 return (krb5_kt_resolve(ctx, ktstr, kt));
69 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, argument
84 if ((code = krb5_principal2salt(ctx, svc_princ, &salt)) != 0) {
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
95 code = krb5_kt_add_entry(ctx, kt, &entry);
100 krb5_free_keyblock_contents(ctx, &key);
106 * krb5_error_code krb5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str,
112 * where ctx i
158 krb5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument
274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument
363 krb5_kt_remove_by_realm(krb5_context ctx, char *realm) argument
384 krb5_kt_remove_by_svcprinc(krb5_context ctx, char *sprinc_str) argument
419 krb5_kt_ad_validate(krb5_context ctx, char *sprinc_str, uint_t flags, boolean_t *valid) argument
[all...]

Completed in 625 milliseconds

1234567891011>>