Searched refs:mechanism (Results 1 - 25 of 123) sorted by relevance

12345

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/
H A Dhash_md5.c46 CK_MECHANISM mechanism; local
48 mechanism.mechanism = CKM_MD5;
49 mechanism.pParameter = NULL_PTR;
50 mechanism.ulParameterLen = 0;
52 return(k5_ef_hash(context, &mechanism, icount, input, output));
H A Dhash_sha1.c42 CK_MECHANISM mechanism; local
44 mechanism.mechanism = CKM_SHA_1;
45 mechanism.pParameter = NULL_PTR;
46 mechanism.ulParameterLen = 0;
48 return(k5_ef_hash(context, &mechanism, icount, input, output));
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dcrypt.c62 CK_MECHANISM mechanism; local
90 * the mechanism we plan on using.
92 mechanism.mechanism = CKM_DES_ECB;
93 mechanism.pParameter = NULL;
94 mechanism.ulParameterLen = 0;
95 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
105 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism,
172 CK_MECHANISM mechanism; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_crypt.c85 CK_MECHANISM mechanism; local
90 mechanism.mechanism = CKM_MD5_HMAC;
91 mechanism.pParameter = 0;
92 mechanism.ulParameterLen = 0;
93 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
98 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism,
106 rv = C_SignInit(hSession, &mechanism, hKe
138 CK_MECHANISM mechanism; local
250 CK_MECHANISM mechanism; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_names.c29 * inq_names.c - Return set of nametypes supported by the KRB5 mechanism.
35 krb5_gss_inquire_names_for_mech(minor_status, mechanism, name_types)
37 gss_OID mechanism;
43 * We only know how to handle our own mechanism.
45 if ((mechanism != GSS_C_NULL_OID) &&
46 !g_OID_equal(gss_mech_krb5, mechanism) &&
47 !g_OID_equal(gss_mech_krb5_old, mechanism)) {
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Dd3_cbc.c41 CK_MECHANISM mechanism; local
61 mechanism.mechanism = algos.enc_algo;
62 mechanism.pParameter = (void*)ivec;
64 mechanism.ulParameterLen = sizeof(mit_des_cblock);
66 mechanism.ulParameterLen = 0;
69 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
71 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
H A Df_cbc.c44 CK_MECHANISM mechanism; local
64 mechanism.mechanism = algos.enc_algo;
65 mechanism.pParameter = ivec;
67 mechanism.ulParameterLen = MIT_DES_BLOCK_LENGTH;
69 mechanism.ulParameterLen = 0;
72 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
74 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerifyUtil.c52 * verify init routine based on the mechanism.
60 switch (pMechanism->mechanism) {
126 * verify routine based on the mechanism.
135 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
138 switch (mechanism) {
205 pSignature, ulSignatureLen, mechanism));
214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
252 * verify update routine based on the mechanism.
259 CK_MECHANISM_TYPE mechanism local
326 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
443 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
[all...]
H A DsoftSignUtil.c51 * sign init routine based on the mechanism.
59 switch (pMechanism->mechanism) {
125 * sign routine based on the mechanism.
134 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
137 switch (mechanism) {
194 pSignature, pulSignatureLen, mechanism));
203 pSignature, pulSignatureLen, mechanism, B_FALSE));
241 * sign update routine based on the mechanism.
248 CK_MECHANISM_TYPE mechanism local
315 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
421 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; local
[all...]
H A DsoftRSA.c228 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
232 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
242 CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism)
268 if (mechanism == CKM_RSA_PKCS) {
294 if (mechanism == CKM_RSA_PKCS) {
332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism)
362 if (mechanism == CKM_RSA_X_509) {
375 if (mechanism
240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
330 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument
523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism) argument
640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
971 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
1087 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
1181 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; local
[all...]
/illumos-gate/usr/src/common/crypto/ecc/
H A Dsecoidt.h83 unsigned long mechanism; member in struct:SECOidDataStr
/illumos-gate/usr/src/lib/libgss/
H A Dg_inquire_names.c36 gss_inquire_names_for_mech(minor_status, mechanism, name_types)
39 const gss_OID mechanism;
63 * select the approprate underlying mechanism routine and
67 mech = __gss_get_mechanism(mechanism);
75 mechanism,
124 char *mechanism; local
142 mechanism = mech_list[i];
143 if (__gss_mech_to_oid(mechanism, &mechOid) == GSS_S_COMPLETE) {
/illumos-gate/usr/src/uts/common/rpc/
H A Drpcsec_gss.h60 * GSS-API based security mechanism type specified as
103 rpc_gss_OID mechanism; member in struct:__anon6898
106 char *mechanism; member in struct:__anon6898
158 gss_OID_desc32 mechanism; member in struct:gss_clnt_data32
172 rpc_gss_OID_desc mechanism; member in struct:gss_clnt_data
212 char *mechanism, /* security mechanism */
222 char *mechanism,
231 char *mechanism,
237 char *mechanism
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c56 CK_MECHANISM mechanism; local
91 mechanism.mechanism = CKM_MD5;
92 mechanism.pParameter = NULL_PTR;
93 mechanism.ulParameterLen = 0;
95 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
H A Dk5_md5des.c58 CK_MECHANISM mechanism; local
99 mechanism.mechanism = CKM_MD5;
100 mechanism.pParameter = NULL_PTR;
101 mechanism.ulParameterLen = 0;
103 if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
167 CK_MECHANISM mechanism; local
225 mechanism.mechanism = CKM_MD5;
226 mechanism
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dpbkdf2.c58 CK_MECHANISM mechanism; local
66 mechanism.mechanism = CKM_PKCS5_PBKD2;
67 mechanism.pParameter = &params;
68 mechanism.ulParameterLen = sizeof (params);
114 rv = C_GenerateKey(krb_ctx_hSession(context), &mechanism, tmpl,
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_sign_pkcs.c38 mech->mechanism = CKM_MD5;
52 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
99 mech->mechanism = CKM_SHA256_HMAC;
115 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
119 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
/illumos-gate/usr/src/uts/common/crypto/io/
H A Daes.c250 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) argument
258 switch (mechanism->cm_type) {
287 if (param_required && mechanism->cm_param != NULL &&
288 mechanism->cm_param_len != param_len) {
337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
340 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE));
344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
347 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE));
356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
372 if ((rv = aes_check_mech_param(mechanism,
959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1255 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
1314 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument
1431 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Keys.c37 * the framework, that the mechanism is not disabled for the slot
52 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
72 /* Make sure this is not a disabled mechanism */
73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
92 * the framework, that the mechanism is not disabled for the slot
110 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
132 /* Make sure this is not a disabled mechanism */
133 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
153 * the framework, that the mechanism is not disabled for the slot
169 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dsign_mgr.c66 switch (mech->mechanism) {
171 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) &&
175 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) &&
213 ctx->mech.mechanism = mech->mechanism;
230 ctx->mech.mechanism = 0;
277 switch (ctx->mech.mechanism) {
321 switch (ctx->mech.mechanism) {
347 switch (ctx->mech.mechanism) {
385 switch (ctx->mech.mechanism) {
[all...]
H A Dverify_mgr.c70 switch (mech->mechanism) {
167 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) &&
171 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) &&
198 ctx->mech.mechanism = mech->mechanism;
215 ctx->mech.mechanism = 0;
255 switch (ctx->mech.mechanism) {
299 switch (ctx->mech.mechanism) {
324 switch (ctx->mech.mechanism) {
360 switch (ctx->mech.mechanism) {
[all...]
H A Ddig_mgr.c311 switch (mech->mechanism) {
340 ctx->mech.mechanism = mech->mechanism;
354 if (ctx->mech.mechanism == CKM_MD5) {
357 } else if (ctx->mech.mechanism == CKM_SHA_1) {
363 ctx->mech.mechanism = 0;
395 switch (ctx->mech.mechanism) {
428 switch (ctx->mech.mechanism) {
494 switch (ctx->mech.mechanism) {
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c155 char *mechanism, /* security mechanism */
163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism,
178 char *mechanism,
185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism,
198 rpc_gss_get_mech_info(char *mechanism, rpc_gss_service_t *service) argument
202 return ((*calls.rpc_gss_get_mech_info)(mechanism, service));
214 rpc_gss_is_installed(char *mechanism) argument
218 return ((*calls.rpc_gss_is_installed)(mechanism));
224 char *mechanism,
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument
222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
[all...]
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dsaslbind.c30 * ldap_sasl_bind - authenticate to the ldap server. The dn, mechanism,
49 const char *mechanism,
70 * mechanism LDAPString,
83 simple = ( mechanism == LDAP_SASL_SIMPLE );
133 mechanism );
137 mechanism, cred->bv_val,
163 * The dn, mechanism, and credentials of the entry to which to bind are
178 const char *mechanism,
195 if ( ( err = ldap_sasl_bind( ld, dn, mechanism, cred, serverctrls,
46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument
175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Darcfour_provider.c83 CK_MECHANISM mechanism; local
134 mechanism.mechanism = algos.enc_algo;
135 mechanism.pParameter = NULL;
136 mechanism.ulParameterLen = 0;
138 rv = C_DecryptInit(session, &mechanism, *kptr);
199 CK_MECHANISM mechanism; local
236 mechanism.mechanism = algos.enc_algo;
237 mechanism
[all...]

Completed in 80 milliseconds

12345