/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5seal.c | 379 krb5_gss_ctx_id_rec *ctx; local 409 ctx = (krb5_gss_ctx_id_rec *) context_handle; 411 if (ctx->subkey == NULL && !ctx->established) { 416 context = ctx->k5_context; 424 switch (ctx->proto) 427 code = make_seal_token_v1(context, ctx->enc, ctx->seq, 428 &ctx->seq_send, ctx [all...] |
H A D | k5unseal.c | 60 kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer, 64 krb5_gss_ctx_id_rec *ctx; 127 (sealalg == ctx->sealalg))) { 136 if ((ctx->sealalg == SEAL_ALG_NONE && signalg > 1) || 137 (ctx->sealalg == SEAL_ALG_1 && signalg != SGN_ALG_3) || 138 (ctx->sealalg == SEAL_ALG_DES3KD && 140 (ctx->sealalg == SEAL_ALG_MICROSOFT_RC4 && 177 ctx->seq); 179 ctx->seq); 181 ctx 660 krb5_gss_ctx_id_rec *ctx; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 213 crypto_ctx_t *ctx; local 230 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 242 error = KCF_PROV_DIGEST_INIT(real_provider, ctx, &lmech, 248 error = kcf_submit_request(real_provider, ctx, crq, ¶ms, 256 *ctxp = (crypto_context_t)ctx; 259 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 339 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 345 if ((ctx == NULL) || 346 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 355 error = KCF_PROV_DIGEST_UPDATE(pd, ctx, dat 388 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 425 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 459 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
H A D | kcf_mac.c | 376 crypto_ctx_t *ctx; local 393 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 405 rv = KCF_PROV_MAC_INIT(real_provider, ctx, &lmech, key, tmpl, 411 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, 419 *ctxp = (crypto_context_t)ctx; 422 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 525 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 531 if ((ctx == NULL) || 532 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 541 rv = KCF_PROV_MAC_UPDATE(pd, ctx, dat 574 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 610 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
H A D | kcf_sign.c | 51 crypto_ctx_t *ctx; local 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 81 *ctxp = (crypto_context_t)ctx; 84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 149 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 155 if ((ctx == NULL) || 156 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 163 error = kcf_submit_request(pd, ctx, cr, ¶ms, B_FALSE); 177 crypto_ctx_t *ctx local 204 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 391 crypto_ctx_t *ctx; local 434 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
H A D | kcf_verify.c | 51 crypto_ctx_t *ctx; local 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 81 *ctxp = (crypto_context_t)ctx; 84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 150 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 156 if ((ctx == NULL) || 157 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 164 error = kcf_submit_request(pd, ctx, cr, ¶ms, B_FALSE); 179 crypto_ctx_t *ctx local 206 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 393 crypto_ctx_t *ctx; local 436 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca_dsa.c | 48 int dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, 50 int dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, 52 int dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, 57 dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, argument 60 dca_request_t *reqp = ctx->cc_provider_private; 61 dca_t *dca = ctx->cc_provider; 143 (void) dca_free_context(ctx); 194 crypto_ctx_t ctx; local 195 ctx.cc_provider_private = reqp; 196 dca_dsactxfree(&ctx); 201 dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, crypto_req_handle_t req) argument 374 crypto_ctx_t ctx; local 382 dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int mode) argument 525 crypto_ctx_t *ctx = (crypto_ctx_t *)arg; local 547 crypto_ctx_t ctx; /* on the stack */ local [all...] |
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drm_context.c | 309 drm_ctx_t ctx; local 323 bzero(&ctx, sizeof (ctx)); 325 ctx.handle = i; 327 &ctx, sizeof (ctx)); 352 drm_ctx_t ctx; local 354 DRM_COPYFROM_WITH_RETURN(&ctx, (void *)data, sizeof (ctx)); 356 ctx 386 drm_ctx_t ctx; local 403 drm_ctx_t ctx; local 416 drm_ctx_t ctx; local 431 drm_ctx_t ctx; local [all...] |
/illumos-gate/usr/src/uts/i86pc/io/acpi/acpidev/ |
H A D | acpidev_container.c | 184 acpidev_container_search_dev(ACPI_HANDLE hdl, UINT32 lvl, void *ctx, argument 189 int *fp = (int *)ctx;
|
/illumos-gate/usr/src/uts/i86pc/io/ |
H A D | cpudrv_mach.c | 134 cpudrv_set_topspeed(void *ctx, int plat_level) argument 145 dip = ctx; 182 cpudrv_get_topspeed(void *ctx) argument 190 dip = ctx; 210 cpudrv_notify_handler(ACPI_HANDLE obj, UINT32 val, void *ctx) argument 219 dip = ctx; 234 cpudrv_redefine_topspeed(ctx); 273 cpudrv_redefine_topspeed(void *ctx) argument 289 (*cpupm_redefine_topspeed)(ctx);
|
H A D | ppm_plat.c | 60 ppm_redefine_topspeed(void *ctx) argument 68 cpup = PPM_GET_PRIVATE((dev_info_t *)ctx);
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_init.c | 492 krb5_error_code kadm5_init_krb5_context (krb5_context *ctx) argument 505 return krb5int_init_context_kdc(ctx);
|
/illumos-gate/usr/src/uts/i86pc/os/cpupm/ |
H A D | cpupm_throttle.c | 326 cpupm_throttle_manage_notification(void *ctx) argument 328 cpu_t *cp = ctx;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_context.c | 102 krb5_gss_ctx_id_rec *ctx; local 118 ctx = (krb5_gss_ctx_id_rec *) context_handle; 120 if (! ctx->established) { 127 context = ctx->k5_context; 137 if ((lifetime = ctx->endtime - now) < 0) 142 ctx->initiate?ctx->here:ctx->there, 157 ctx->initiate?ctx 208 krb5_gss_ctx_id_rec *ctx; local 265 krb5_gss_ctx_id_rec *ctx; local 342 krb5_gss_ctx_id_rec *ctx; local [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_signing.c | 160 smb_sign_ctx_t ctx = 0; local 170 rc = smb2_hmac_init(&ctx, s->sign_mech, sign_key->key, sign_key->len); 185 if ((rc = smb2_hmac_update(ctx, tmp_hdr, tlen)) != 0) 213 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data + offset, tlen); 228 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data, tlen); 238 if ((rc = smb2_hmac_final(ctx, digest)) != 0)
|
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_krb5ssp.c | 45 get_ssnkey(authsvc_context_t *ctx); 54 * Todo: allocate ctx->ctx_backend 58 smbd_krb5ssp_init(authsvc_context_t *ctx) argument 67 ctx->ctx_backend = be; 73 * Todo: free ctx->ctx_backend 76 smbd_krb5ssp_fini(authsvc_context_t *ctx) argument 78 krb5ssp_backend_t *be = ctx->ctx_backend; 108 * State across messages is in ctx->ctx_backend 111 smbd_krb5ssp_work(authsvc_context_t *ctx) argument 115 krb5ssp_backend_t *be = ctx 305 get_ssnkey(authsvc_context_t *ctx) argument [all...] |
/illumos-gate/usr/src/common/crypto/skein/ |
H A D | skein.c | 16 void Skein_256_Process_Block(Skein_256_Ctxt_t *ctx, const uint8_t *blkPtr, 18 void Skein_512_Process_Block(Skein_512_Ctxt_t *ctx, const uint8_t *blkPtr, 20 void Skein1024_Process_Block(Skein1024_Ctxt_t *ctx, const uint8_t *blkPtr, 26 Skein_256_Init(Skein_256_Ctxt_t *ctx, size_t hashBitLen) argument 34 ctx->h.hashBitLen = hashBitLen; /* output hash bit count */ 39 bcopy(SKEIN_256_IV_256, ctx->X, sizeof (ctx->X)); 42 bcopy(SKEIN_256_IV_224, ctx->X, sizeof (ctx->X)); 45 bcopy(SKEIN_256_IV_160, ctx 90 Skein_256_InitExt(Skein_256_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument 158 Skein_256_Update(Skein_256_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument 211 Skein_256_Final(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument 262 Skein_512_Init(Skein_512_Ctxt_t *ctx, size_t hashBitLen) argument 327 Skein_512_InitExt(Skein_512_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument 394 Skein_512_Update(Skein_512_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument 447 Skein_512_Final(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument 498 Skein1024_Init(Skein1024_Ctxt_t *ctx, size_t hashBitLen) argument 560 Skein1024_InitExt(Skein1024_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument 627 Skein1024_Update(Skein1024_Ctxt_t *ctx, const uint8_t *msg, size_t msgByteCnt) argument 680 Skein1024_Final(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument 732 Skein_256_Final_Pad(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument 753 Skein_512_Final_Pad(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument 774 Skein1024_Final_Pad(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument 797 Skein_256_Output(Skein_256_Ctxt_t *ctx, uint8_t *hashVal) argument 837 Skein_512_Output(Skein_512_Ctxt_t *ctx, uint8_t *hashVal) argument 877 Skein1024_Output(Skein1024_Ctxt_t *ctx, uint8_t *hashVal) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softMAC.c | 188 soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) 215 SOFT_MAC_INIT_CTX(MD5, &(ctx->hc_ctx_u.md5_ctx), 255 md5_hmac_ctx_init(&ctx->hc_ctx_u.md5_ctx, md5_ipad, md5_opad); 281 SOFT_MAC_INIT_CTX(SHA1, &(ctx->hc_ctx_u.sha1_ctx), 321 sha1_hmac_ctx_init(&ctx->hc_ctx_u.sha1_ctx, sha1_ipad, 361 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 402 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 443 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 670 sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *ctx, uint64_t *ipad, argument 682 SHA2Init(mech, &ctx 187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | key_mgr.c | 239 ENCR_DECR_CONTEXT * ctx = NULL; local 326 ctx = (ENCR_DECR_CONTEXT *)malloc(sizeof (ENCR_DECR_CONTEXT)); 327 if (! ctx) { 330 (void) memset(ctx, 0x0, sizeof (ENCR_DECR_CONTEXT)); 332 rc = encr_mgr_init(sess, ctx, OP_WRAP, mech, h_wrapping_key); 337 ctx, data, data_len, wrapped_key, wrapped_key_len); 342 (void) encr_mgr_cleanup(ctx); 343 free(ctx); 358 ENCR_DECR_CONTEXT * ctx = NULL; local 418 ctx [all...] |
H A D | mech_rsa.c | 177 ENCR_DECR_CONTEXT *ctx, 190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 220 ENCR_DECR_CONTEXT *ctx, 233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 264 SIGN_VERIFY_CONTEXT *ctx, 277 if (! sess || ! ctx || ! out_data_len) { 280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 308 SIGN_VERIFY_CONTEXT * ctx, 320 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 347 SIGN_VERIFY_CONTEXT *ctx, 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | sess_mgr.c | 1015 ENCR_DECR_CONTEXT *ctx = (ENCR_DECR_CONTEXT *)cptr; local 1018 ctx->context_len + ctx->mech.ulParameterLen; 1028 ptr1 = (CK_BYTE *)ctx; 1030 ptr3 = ptr2 + ctx->context_len; 1032 if (ctx->context_len) { 1033 context = (CK_BYTE *)malloc(ctx->context_len); 1037 (void) memcpy(context, ptr2, ctx->context_len); 1040 if (ctx->mech.ulParameterLen) { 1042 ctx 1058 SIGN_VERIFY_CONTEXT *ctx = (SIGN_VERIFY_CONTEXT *)cptr; local 1100 DIGEST_CONTEXT *ctx = (DIGEST_CONTEXT *)cptr; local [all...] |
H A D | utility.c | 626 SHA1_CTX ctx; local 628 SHA1Init(&ctx); 630 SHA1Update(&ctx, data, len); 632 SHA1Final(hash, &ctx);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context_establish.c | 156 gen_accept_token(dh_gss_context_t ctx, /* Diffie-Hellman context */ argument 168 token.ver.verno = ctx->proto_version; 172 accept->remote = ctx->local; 174 accept->local = ctx->remote; 176 accept->flags = ctx->flags; 178 accept->expire = ctx->expire; 182 keys.dh_key_set_len = ctx->no_keys; 183 keys.dh_key_set_val = ctx->keys; 360 __dh_gss_accept_sec_context(void *ctx, /* Per mechanism context */ argument 375 /* ctx i 889 __dh_gss_init_sec_context(void *ctx, OM_uint32 *minor, gss_cred_id_t cred, gss_ctx_id_t *context, gss_name_t target, gss_OID mech, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t channel, gss_buffer_t input_token, gss_OID *mech_rec, gss_buffer_t output_token, OM_uint32 *flags_rec, OM_uint32 *time_rec ) argument [all...] |
H A D | name.c | 66 __dh_gss_compare_name(void *ctx, /* Per mechanism context (not used) */ argument 72 _NOTE(ARGUNUSED(ctx)) 95 __dh_gss_display_name(void * ctx, /* Per mechanism context (not used) */ argument 101 _NOTE(ARGUNUSED(ctx)) 331 do_exported_netname(dh_context_t ctx, /* Diffie-Hellman mech context */ argument 374 if (mechoidlen != ctx->mech->length) 376 if (memcmp(p, ctx->mech->elements, mechoidlen) != 0) 442 __dh_gss_import_name(void *ctx, /* Per mechanism context */ argument 475 stat = do_exported_netname((dh_context_t)ctx, minor, 526 __dh_gss_release_name(void *ctx, OM_uint3 argument 554 __dh_gss_inquire_names_for_mech(void *ctx, OM_uint32 *minor, gss_OID mech, gss_OID_set *names) argument 588 __dh_pname_to_uid(void *ctx, OM_uint32 *minor, const gss_name_t pname, uid_t *uid ) argument 634 __dh_gss_export_name(void *ctx, OM_uint32 *minor, const gss_name_t input_name, gss_buffer_t exported_name ) argument 773 __dh_gss_internal_release_oid(void *ctx, OM_uint32 *minor, gss_OID *oid) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 43 kt_open(krb5_context ctx, krb5_keytab *kt) argument 51 if ((code = krb5_kt_default_name(ctx, buf, sizeof (buf))) != 0) 65 return (krb5_kt_resolve(ctx, ktstr, kt)); 69 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, argument 84 if ((code = krb5_principal2salt(ctx, svc_princ, &salt)) != 0) { 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 95 code = krb5_kt_add_entry(ctx, kt, &entry); 100 krb5_free_keyblock_contents(ctx, &key); 106 * krb5_error_code krb5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, 112 * where ctx i 158 krb5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument 274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument 363 krb5_kt_remove_by_realm(krb5_context ctx, char *realm) argument 384 krb5_kt_remove_by_svcprinc(krb5_context ctx, char *sprinc_str) argument 419 krb5_kt_ad_validate(krb5_context ctx, char *sprinc_str, uint_t flags, boolean_t *valid) argument [all...] |