/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_md5.c | 46 CK_MECHANISM mechanism; local 48 mechanism.mechanism = CKM_MD5; 49 mechanism.pParameter = NULL_PTR; 50 mechanism.ulParameterLen = 0; 52 return(k5_ef_hash(context, &mechanism, icount, input, output));
|
H A D | hash_sha1.c | 42 CK_MECHANISM mechanism; local 44 mechanism.mechanism = CKM_SHA_1; 45 mechanism.pParameter = NULL_PTR; 46 mechanism.ulParameterLen = 0; 48 return(k5_ef_hash(context, &mechanism, icount, input, output));
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | crypt.c | 62 CK_MECHANISM mechanism; local 90 * the mechanism we plan on using. 92 mechanism.mechanism = CKM_DES_ECB; 93 mechanism.pParameter = NULL; 94 mechanism.ulParameterLen = 0; 95 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 105 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism, 172 CK_MECHANISM mechanism; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_crypt.c | 85 CK_MECHANISM mechanism; local 90 mechanism.mechanism = CKM_MD5_HMAC; 91 mechanism.pParameter = 0; 92 mechanism.ulParameterLen = 0; 93 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 98 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism, 106 rv = C_SignInit(hSession, &mechanism, hKe 138 CK_MECHANISM mechanism; local 250 CK_MECHANISM mechanism; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_names.c | 29 * inq_names.c - Return set of nametypes supported by the KRB5 mechanism. 35 krb5_gss_inquire_names_for_mech(minor_status, mechanism, name_types) 37 gss_OID mechanism; 43 * We only know how to handle our own mechanism. 45 if ((mechanism != GSS_C_NULL_OID) && 46 !g_OID_equal(gss_mech_krb5, mechanism) && 47 !g_OID_equal(gss_mech_krb5_old, mechanism)) {
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | d3_cbc.c | 41 CK_MECHANISM mechanism; local 61 mechanism.mechanism = algos.enc_algo; 62 mechanism.pParameter = (void*)ivec; 64 mechanism.ulParameterLen = sizeof(mit_des_cblock); 66 mechanism.ulParameterLen = 0; 69 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 71 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
|
H A D | f_cbc.c | 44 CK_MECHANISM mechanism; local 64 mechanism.mechanism = algos.enc_algo; 65 mechanism.pParameter = ivec; 67 mechanism.ulParameterLen = MIT_DES_BLOCK_LENGTH; 69 mechanism.ulParameterLen = 0; 72 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 74 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerifyUtil.c | 52 * verify init routine based on the mechanism. 60 switch (pMechanism->mechanism) { 126 * verify routine based on the mechanism. 135 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local 138 switch (mechanism) { 205 pSignature, ulSignatureLen, mechanism)); 214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 252 * verify update routine based on the mechanism. 259 CK_MECHANISM_TYPE mechanism local 326 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local 443 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local [all...] |
H A D | softSignUtil.c | 51 * sign init routine based on the mechanism. 59 switch (pMechanism->mechanism) { 125 * sign routine based on the mechanism. 134 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local 137 switch (mechanism) { 194 pSignature, pulSignatureLen, mechanism)); 203 pSignature, pulSignatureLen, mechanism, B_FALSE)); 241 * sign update routine based on the mechanism. 248 CK_MECHANISM_TYPE mechanism local 315 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local 421 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local [all...] |
H A D | softRSA.c | 228 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 232 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 242 CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) 268 if (mechanism == CKM_RSA_PKCS) { 294 if (mechanism == CKM_RSA_PKCS) { 332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) 362 if (mechanism == CKM_RSA_X_509) { 375 if (mechanism 240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument 330 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument 523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism) argument 640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 971 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1087 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1181 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local [all...] |
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | secoidt.h | 83 unsigned long mechanism; member in struct:SECOidDataStr
|
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_inquire_names.c | 36 gss_inquire_names_for_mech(minor_status, mechanism, name_types) 39 const gss_OID mechanism; 63 * select the approprate underlying mechanism routine and 67 mech = __gss_get_mechanism(mechanism); 75 mechanism, 124 char *mechanism; local 142 mechanism = mech_list[i]; 143 if (__gss_mech_to_oid(mechanism, &mechOid) == GSS_S_COMPLETE) {
|
/illumos-gate/usr/src/uts/common/rpc/ |
H A D | rpcsec_gss.h | 60 * GSS-API based security mechanism type specified as 103 rpc_gss_OID mechanism; member in struct:__anon6898 106 char *mechanism; member in struct:__anon6898 158 gss_OID_desc32 mechanism; member in struct:gss_clnt_data32 172 rpc_gss_OID_desc mechanism; member in struct:gss_clnt_data 212 char *mechanism, /* security mechanism */ 222 char *mechanism, 231 char *mechanism, 237 char *mechanism [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 56 CK_MECHANISM mechanism; local 91 mechanism.mechanism = CKM_MD5; 92 mechanism.pParameter = NULL_PTR; 93 mechanism.ulParameterLen = 0; 95 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
|
H A D | k5_md5des.c | 58 CK_MECHANISM mechanism; local 99 mechanism.mechanism = CKM_MD5; 100 mechanism.pParameter = NULL_PTR; 101 mechanism.ulParameterLen = 0; 103 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) { 167 CK_MECHANISM mechanism; local 225 mechanism.mechanism = CKM_MD5; 226 mechanism [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 58 CK_MECHANISM mechanism; local 66 mechanism.mechanism = CKM_PKCS5_PBKD2; 67 mechanism.pParameter = ¶ms; 68 mechanism.ulParameterLen = sizeof (params); 114 rv = C_GenerateKey(krb_ctx_hSession(context), &mechanism, tmpl,
|
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_sign_pkcs.c | 38 mech->mechanism = CKM_MD5; 52 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp); 99 mech->mechanism = CKM_SHA256_HMAC; 115 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp); 119 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | aes.c | 250 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) argument 258 switch (mechanism->cm_type) { 287 if (param_required && mechanism->cm_param != NULL && 288 mechanism->cm_param_len != param_len) { 337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 340 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE)); 344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 347 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE)); 356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 372 if ((rv = aes_check_mech_param(mechanism, 959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1255 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 1314 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument 1431 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Keys.c | 37 * the framework, that the mechanism is not disabled for the slot 52 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 72 /* Make sure this is not a disabled mechanism */ 73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { 92 * the framework, that the mechanism is not disabled for the slot 110 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 132 /* Make sure this is not a disabled mechanism */ 133 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { 153 * the framework, that the mechanism is not disabled for the slot 169 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 66 switch (mech->mechanism) { 171 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) && 175 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) && 213 ctx->mech.mechanism = mech->mechanism; 230 ctx->mech.mechanism = 0; 277 switch (ctx->mech.mechanism) { 321 switch (ctx->mech.mechanism) { 347 switch (ctx->mech.mechanism) { 385 switch (ctx->mech.mechanism) { [all...] |
H A D | verify_mgr.c | 70 switch (mech->mechanism) { 167 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) && 171 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) && 198 ctx->mech.mechanism = mech->mechanism; 215 ctx->mech.mechanism = 0; 255 switch (ctx->mech.mechanism) { 299 switch (ctx->mech.mechanism) { 324 switch (ctx->mech.mechanism) { 360 switch (ctx->mech.mechanism) { [all...] |
H A D | dig_mgr.c | 311 switch (mech->mechanism) { 340 ctx->mech.mechanism = mech->mechanism; 354 if (ctx->mech.mechanism == CKM_MD5) { 357 } else if (ctx->mech.mechanism == CKM_SHA_1) { 363 ctx->mech.mechanism = 0; 395 switch (ctx->mech.mechanism) { 428 switch (ctx->mech.mechanism) { 494 switch (ctx->mech.mechanism) {
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 155 char *mechanism, /* security mechanism */ 163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism, 178 char *mechanism, 185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism, 198 rpc_gss_get_mech_info(char *mechanism, rpc_gss_service_t *service) argument 202 return ((*calls.rpc_gss_get_mech_info)(mechanism, service)); 214 rpc_gss_is_installed(char *mechanism) argument 218 return ((*calls.rpc_gss_is_installed)(mechanism)); 224 char *mechanism, 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument 222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument [all...] |
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | saslbind.c | 30 * ldap_sasl_bind - authenticate to the ldap server. The dn, mechanism, 49 const char *mechanism, 70 * mechanism LDAPString, 83 simple = ( mechanism == LDAP_SASL_SIMPLE ); 133 mechanism ); 137 mechanism, cred->bv_val, 163 * The dn, mechanism, and credentials of the entry to which to bind are 178 const char *mechanism, 195 if ( ( err = ldap_sasl_bind( ld, dn, mechanism, cred, serverctrls, 46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument 175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 83 CK_MECHANISM mechanism; local 134 mechanism.mechanism = algos.enc_algo; 135 mechanism.pParameter = NULL; 136 mechanism.ulParameterLen = 0; 138 rv = C_DecryptInit(session, &mechanism, *kptr); 199 CK_MECHANISM mechanism; local 236 mechanism.mechanism = algos.enc_algo; 237 mechanism [all...] |