Searched refs:mech (Results 1 - 25 of 173) sorted by relevance

1234567

/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Ddhmech.c36 {0, 0}, /* OID for mech type. */
74 * then check that the mech is not already initialized (If so just return
75 * the mech). It will then assign the entry points that are common to the
76 * mechanism family to the uninitialized mech. After which, it allocate space
82 __dh_gss_initialize(gss_mechanism mech) argument
84 if (mech->context != NULL)
85 return (mech); /* already initialized */
88 *mech = dh_mechanism;
91 mech->context = New(dh_context_desc, 1);
92 if (mech
[all...]
/illumos-gate/usr/src/lib/libgss/
H A Dg_inq_context_oid.c46 gss_mechanism mech; local
60 mech = gssint_get_mechanism (ctx->mech_type);
62 if (mech != NULL) {
63 if (mech->gss_inquire_sec_context_by_oid != NULL) {
64 status = mech->gss_inquire_sec_context_by_oid(minor_status,
69 map_error(minor_status, mech);
H A Dg_context_time.c43 gss_mechanism mech; local
61 mech = __gss_get_mechanism(ctx->mech_type);
63 if (mech) {
65 if (mech->gss_context_time) {
66 status = mech->gss_context_time(
67 mech->context,
72 map_error(minor_status, mech);
H A Dg_process_context.c44 gss_mechanism mech; local
65 mech = __gss_get_mechanism(ctx->mech_type);
67 if (mech) {
69 if (mech->gss_process_context_token) {
70 status = mech->gss_process_context_token(
71 mech->context,
76 map_error(minor_status, mech);
H A Dg_inquire_context.c81 gss_mechanism mech; local
99 mech = __gss_get_mechanism(ctx->mech_type);
101 if (!mech || !mech->gss_inquire_context || !mech->gss_display_name ||
102 !mech->gss_release_name) {
106 status = mech->gss_inquire_context(
107 mech->context,
119 map_error(minor_status, mech);
125 status = __gss_convert_name_to_union_name(minor_status, mech,
[all...]
H A Dg_compare_name.c75 gss_mechanism mech = NULL; local
99 mech = __gss_get_mechanism(union_name1->mech_type);
100 if (!mech)
102 if (!mech->gss_compare_name)
119 if (!mech)
121 if (!mech->gss_compare_name)
123 major_status = mech->gss_compare_name(mech->context,
129 map_error(minor_status, mech);
200 if (!mech)
[all...]
H A Dg_seal.c88 gss_mechanism mech; local
103 mech = __gss_get_mechanism(ctx->mech_type);
105 if (mech) {
106 if (mech->gss_seal) {
107 status = mech->gss_seal(
108 mech->context,
117 map_error(minor_status, mech);
165 gss_mechanism mech; local
184 mech = __gss_get_mechanism(ctx->mech_type);
186 if (!mech)
[all...]
H A Dg_store_cred.c100 gss_mechanism mech; local
125 mech = __gss_get_mechanism(desired_mech);
126 if (mech == NULL)
129 if (mech->gss_store_cred == NULL)
136 major_status = mech->gss_store_cred(mech->context,
146 map_error(minor_status, mech);
155 /* Get mech and cred element */
157 mech = __gss_get_mechanism(dmech);
158 if (mech
[all...]
H A Dg_rel_cred.c47 gss_mechanism mech; local
76 mech = __gss_get_mechanism(&union_cred->mechs_array[j]);
80 if (mech) {
81 if (mech->gss_release_cred) {
82 temp_status = mech->gss_release_cred
83 (mech->context, minor_status,
87 map_error(minor_status, mech);
H A Dg_sign.c83 gss_mechanism mech; local
96 mech = __gss_get_mechanism(ctx->mech_type);
98 if (mech) {
99 if (mech->gss_sign) {
100 status = mech->gss_sign(
101 mech->context,
108 map_error(minor_status, mech);
H A Dg_unseal.c50 gss_mechanism mech; local
79 mech = __gss_get_mechanism(ctx->mech_type);
81 if (mech) {
82 if (mech->gss_unseal) {
83 status = mech->gss_unseal(
84 mech->context,
92 map_error(minor_status, mech);
H A Dg_verify.c47 gss_mechanism mech; local
66 mech = __gss_get_mechanism(ctx->mech_type);
68 if (mech) {
69 if (mech->gss_verify) {
70 status = mech->gss_verify(
71 mech->context,
78 map_error(minor_status, mech);
H A Dg_glue.c217 * <mech OID bytes>
310 gss_mechanism mech; local
312 mech = gssint_get_mechanism (mech_type);
313 if (mech) {
314 if (mech->gss_import_name) {
315 status = mech->gss_import_name (
316 mech->context, /* SUNW17PACresync */
322 map_error(minor_status, mech);
340 gss_mechanism mech; local
350 mech
464 gss_mechanism mech; local
492 gss_mechanism mech; local
522 gss_mechanism mech; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_sign_pkcs.c36 smb_md5_getmech(smb_sign_mech_t *mech) argument
38 mech->mechanism = CKM_MD5;
39 mech->pParameter = NULL;
40 mech->ulParameterLen = 0;
48 smb_md5_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech) argument
52 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
56 rv = C_DigestInit(*ctxp, mech);
97 smb2_hmac_getmech(smb_sign_mech_t *mech) argument
99 mech->mechanism = CKM_SHA256_HMAC;
100 mech
109 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, uint8_t *key, size_t key_len) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_common.c95 gss_mechanism (*mech_init)(gss_mechanism mech);
96 gss_mechanism mech; local
116 if ((mech = mech_init(dhmech)) == NULL) {
121 mech->mech_type = mech_type;
124 context = (dh_context_t)mech->context;
130 context->mech = &mech->mech_type;
132 return (mech);
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dencr_mgr.c34 CK_MECHANISM * mech,
45 if (! sess || ! ctx || ! mech) {
88 switch (mech->mechanism) {
91 if (mech->ulParameterLen != 0) {
114 if (mech->ulParameterLen > 0) {
115 ptr = (CK_BYTE *)malloc(mech->ulParameterLen);
119 (void) memcpy(ptr, mech->pParameter, mech->ulParameterLen);
123 ctx->mech.ulParameterLen = mech
31 encr_mgr_init(SESSION * sess, ENCR_DECR_CONTEXT * ctx, CK_ULONG operation, CK_MECHANISM * mech, CK_OBJECT_HANDLE key_handle) argument
[all...]
H A Ddecr_mgr.c36 CK_MECHANISM *mech,
88 switch (mech->mechanism) {
91 if (mech->ulParameterLen != 0)
115 if (mech->ulParameterLen > 0) {
116 ptr = (CK_BYTE *)malloc(mech->ulParameterLen);
120 (void) memcpy(ptr, mech->pParameter, mech->ulParameterLen);
124 ctx->mech.ulParameterLen = mech->ulParameterLen;
125 ctx->mech
32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument
[all...]
H A Dsign_mgr.c33 CK_MECHANISM * mech,
66 switch (mech->mechanism) {
139 if (mech->ulParameterLen != 0) {
164 (CK_MAC_GENERAL_PARAMS *)mech->pParameter;
166 if (mech->ulParameterLen !=
171 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) &&
175 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) &&
200 if (mech->ulParameterLen > 0 && mech->pParameter == NULL)
203 if (mech
31 sign_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
[all...]
H A Dverify_mgr.c33 CK_MECHANISM * mech,
70 switch (mech->mechanism) {
161 (CK_MAC_GENERAL_PARAMS *)mech->pParameter;
163 if (mech->ulParameterLen !=
167 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) &&
171 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) &&
197 ctx->mech.ulParameterLen = mech->ulParameterLen;
198 ctx->mech.mechanism = mech
31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Def_crypto.c22 crypto_mechanism_t mech; local
45 mech.cm_type = key->kef_mt;
46 if (mech.cm_type == CRYPTO_MECH_INVALID) {
48 "k5_ef_crypto - invalid crypto mech type: 0x%llx",
54 mech.cm_param_len = ivec->length;
55 mech.cm_param = (char *)ivec->data;
57 mech.cm_param_len = 0;
58 mech.cm_param = NULL;
62 rv = crypto_encrypt(&mech, &d1,
68 rv = crypto_decrypt(&mech,
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dutil_token.c47 /* XXXX this code currently makes the assumption that a mech oid will
70 the sequence tag and length octets, the mech OID DER encoding, and the
147 /* returns the length of a token, given the mech oid and the body size */
149 unsigned int g_token_size(mech, body_size)
150 const gss_OID_desc * mech;
154 body_size += 4 + (int) mech->length; /* NEED overflow check */
161 void g_make_token_header(mech, body_size, buf, tok_type)
162 const gss_OID_desc * mech;
169 (tok_type == -1) ? 2 : (int) (4 + mech->length + body_size));
171 *(*buf)++ = (unsigned char) mech
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dutil_errmap.c50 gss_OID_desc mech; member in struct:mecherror
72 if (m1.mech.length < m2.mech.length)
74 if (m1.mech.length > m2.mech.length)
76 if (m1.mech.length == 0)
78 return memcmp(m1.mech.elements, m2.mech.elements, m1.mech.length);
91 dest->mech
[all...]
/illumos-gate/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.h15 void *ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm );
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/
H A DMakefile28 PROTOCOL_DIR = mech
32 DERIVED_FILES = mech/dhmech_prot.h mech/xdr_token.c
65 mech/xdr_token.c: $(PROTOCOL_DIR)/dhmech_prot.x
69 mech/dhmech_prot.h: mech/dhmech_prot.x
85 $(XGETTEXT) $(XGETFLAGS) `$(GREP) -l gettext mech/*.[ch]`
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_keys.c41 crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count,
52 rv = kcf_get_hardware_provider(mech->cm_type, NULL,
62 mech, attrs, count, handle, KCF_SWFP_RHNDL(crq));
66 mech, attrs, count, handle, NULL, 0, NULL, NULL, NULL, 0);
78 crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs,
91 rv = kcf_get_hardware_provider(mech->cm_type, NULL,
100 rv = KCF_PROV_KEY_GENERATE_PAIR(real_provider, sid, mech,
106 sid, mech, pub_attrs, pub_count, pub_handle, pri_attrs,
119 crypto_mechanism_t *mech, crypto_key_t *wrapping_key,
131 rv = kcf_get_hardware_provider(mech
40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *handle, crypto_call_req_t *crq) argument
77 crypto_key_generate_pair(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs, uint_t pub_count, crypto_object_attribute_t *pri_attrs, uint_t pri_count, crypto_object_id_t *pub_handle, crypto_object_id_t *pri_handle, crypto_call_req_t *crq) argument
118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument
157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
198 crypto_key_derive(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *base_key, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *new_key, crypto_call_req_t *crq) argument
[all...]

Completed in 83 milliseconds

1234567