/illumos-gate/usr/src/lib/libresolv2/common/isc/ |
H A D | ctl_srvr.c | 67 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \ 118 LIST(struct ctl_sess) sess; member in struct:ctl_sctx 208 INIT_LIST(ctx->sess); 280 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p", 281 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess); 290 for (this = HEAD(ctx->sess); this != NULL; this = next) { 302 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument 308 struct ctl_sctx *ctx = sess->ctx; 312 REQUIRE(sess->state == initializing || 313 sess 376 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument 387 ctl_getcsctx(struct ctl_sess *sess) argument 392 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument 408 struct ctl_sess *sess = NULL; local 469 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument 483 ctl_close(struct ctl_sess *sess) argument 521 ctl_start_read(struct ctl_sess *sess) argument 551 ctl_stop_read(struct ctl_sess *sess) argument 569 struct ctl_sess *sess = uap; local 631 struct ctl_sess *sess = uap; local 658 struct ctl_sess *sess = uap; local 679 ctl_docommand(struct ctl_sess *sess) argument 722 struct ctl_sess *sess = uap; local 760 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument 780 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 450 SESSION * sess = NULL; local 465 sess = session_mgr_find(hSession); 466 if (! sess) { 471 if (pin_locked(&sess->session_info, 477 if (sess->session_info.state != CKS_RW_SO_FUNCTIONS) { 482 rc = token_specific.t_init_pin(sess->hContext, pPin, ulPinLen); 513 SESSION * sess = NULL; local 522 sess = session_mgr_find(hSession); 523 if (! sess) { 528 if (pin_locked(&sess 552 SESSION *sess; local 602 SESSION *sess = NULL; local 649 SESSION * sess = NULL; local 679 SESSION * sess = NULL; local 716 SESSION * sess = NULL; local 746 SESSION * sess = NULL; local 846 SESSION * sess = NULL; local 883 SESSION * sess = NULL; local 918 SESSION * sess = NULL; local 950 SESSION * sess = NULL; local 982 SESSION * sess = NULL; local 1009 SESSION * sess = NULL; local 1036 SESSION * sess = NULL; local 1062 SESSION * sess = NULL; local 1100 SESSION * sess = NULL; local 1146 SESSION * sess = NULL; local 1185 SESSION * sess = NULL; local 1231 SESSION * sess = NULL; local 1368 SESSION * sess = NULL; local 1414 SESSION * sess = NULL; local 1459 SESSION * sess = NULL; local 1504 SESSION * sess = NULL; local 1549 SESSION * sess = NULL; local 1589 SESSION * sess = NULL; local 1623 SESSION * sess = NULL; local 1667 SESSION * sess = NULL; local 1712 SESSION * sess = NULL; local 1756 SESSION * sess = NULL; local 1795 SESSION * sess = NULL; local 1839 SESSION * sess = NULL; local 1883 SESSION * sess = NULL; local 1927 SESSION * sess = NULL; local 1971 SESSION * sess = NULL; local 2009 SESSION * sess = NULL; local 2048 SESSION * sess = NULL; local 2087 SESSION * sess = NULL; local 2131 SESSION * sess = NULL; local 2180 SESSION * sess = NULL; local 2225 SESSION * sess = NULL; local 2274 SESSION * sess = NULL; local 2331 SESSION *sess = NULL; local [all...] |
H A D | sess_mgr.c | 332 * SESSION ** sess : new session pointer (OUTPUT) 337 session_mgr_new(CK_ULONG flags, SESSION **sess) argument 425 *sess = new_session; 555 session_mgr_close_session(SESSION *sess) argument 560 if (! sess) 566 node = dlist_find(sess_list, sess); 572 (void) object_mgr_purge_session_objects(sess, ALL); 574 if (sess->find_list) 575 free(sess->find_list); 577 if (sess 647 SESSION *sess = (SESSION *)sess_list->data; local 764 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument 987 session_mgr_set_op_state( SESSION *sess, CK_OBJECT_HANDLE encr_key, CK_OBJECT_HANDLE auth_key, CK_BYTE *data) argument [all...] |
H A D | mech_md5.c | 297 md5_hash(SESSION *sess, argument 305 if (! sess || ! ctx || ! out_data_len) { 321 md5_hmac_sign(SESSION * sess, argument 340 if (! sess || ! ctx || ! out_data_len) { 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 380 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 387 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 421 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 427 rc = digest_mgr_digest_update(sess, &digest_ctx, 434 rc = digest_mgr_digest_update(sess, 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | mech_sha.c | 30 sha1_hash(SESSION *sess, argument 38 if (! sess || ! ctx || ! out_data_len) { 56 sha1_hmac_sign(SESSION * sess, argument 74 if (! sess || ! ctx || ! out_data_len) { 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 112 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 119 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 157 rc = digest_mgr_digest_update(sess, &digest_ctx, 164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len); 171 rc = digest_mgr_digest_final(sess, 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument [all...] |
H A D | sign_mgr.c | 31 sign_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 250 sign_mgr_sign(SESSION * sess, argument 258 if (! sess || ! ctx) { 279 return (rsa_pkcs_sign(sess, length_only, ctx, 284 return (rsa_hash_pkcs_sign(sess, length_only, ctx, 290 return (md5_hmac_sign(sess, length_only, ctx, 295 return (sha1_hmac_sign(sess, length_only, ctx, 304 sign_mgr_sign_update(SESSION * sess, argument 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 31 verify_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 231 verify_mgr_verify(SESSION * sess, argument 238 if (! sess || ! ctx) { 257 return (rsa_pkcs_verify(sess, ctx, 262 return (rsa_hash_pkcs_verify(sess, ctx, 268 return (md5_hmac_verify(sess, ctx, 273 return (sha1_hmac_verify(sess, ctx, 282 verify_mgr_verify_update(SESSION * sess, argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | dig_mgr.c | 300 digest_mgr_init(SESSION *sess, argument 304 if (! sess || ! ctx) { 372 digest_mgr_digest(SESSION *sess, argument 381 if (! sess || ! ctx) { 399 return (sha1_hash(sess, length_only, ctx, 405 return (md5_hash(sess, length_only, ctx, 414 digest_mgr_digest_update(SESSION *sess, argument 419 if (! sess || ! ctx) { 442 digest_mgr_digest_key(SESSION * sess, argument 451 if (!sess || !ct 478 digest_mgr_digest_final(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *hash, CK_ULONG *hash_len) argument [all...] |
H A D | obj_mgr.c | 305 check_object_access(SESSION *sess, OBJECT *o) argument 324 if (sess->session_info.state == CKS_RO_PUBLIC_SESSION) { 336 if (sess->session_info.state == CKS_RO_USER_FUNCTIONS) { 343 if (sess->session_info.state == CKS_RW_PUBLIC_SESSION) { 350 if (sess->session_info.state == CKS_RW_SO_FUNCTIONS) { 361 object_mgr_add(SESSION * sess, argument 370 if (! sess || ! pTemplate || ! handle) { 382 rc = check_object_access(sess, o); 394 o->session = sess; 434 rc = save_token_object(sess 500 object_mgr_add_to_map(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 542 object_mgr_copy(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE old_handle, CK_OBJECT_HANDLE * new_handle) argument 686 object_mgr_create_skel(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_ULONG mode, CK_ULONG obj_type, CK_ULONG sub_class, OBJECT ** obj) argument 751 object_mgr_create_final(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 869 object_mgr_destroy_object(SESSION * sess, CK_OBJECT_HANDLE handle) argument 1146 object_mgr_find_init(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1217 object_mgr_find_build_list(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, DL_NODE * obj_list, CK_BBOOL public_only) argument 1324 object_mgr_find_final(SESSION *sess) argument 1342 object_mgr_get_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1478 object_mgr_purge_session_objects(SESSION * sess, SESS_OBJ_TYPE type) argument 1712 object_mgr_set_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 2199 object_mgr_purge_map( SESSION *sess, SESS_OBJ_TYPE type) argument [all...] |
H A D | key_mgr.c | 59 key_mgr_generate_key_pair(SESSION * sess, argument 76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) { 130 rc = object_mgr_create_skel(sess, 137 rc = object_mgr_create_skel(sess, 148 sess->hContext, 207 rc = object_mgr_create_final(sess, publ_key_obj, publ_key_handle); 211 rc = object_mgr_create_final(sess, priv_key_obj, priv_key_handle); 213 (void) object_mgr_destroy_object(sess, *publ_key_handle); 232 key_mgr_wrap_key(SESSION * sess, argument 250 if (! sess || ! wrapped_key_le 349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument [all...] |
H A D | mech_rsa.c | 175 rsa_pkcs_encrypt(SESSION *sess, argument 190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 211 rc = ckm_rsa_encrypt(sess->hContext, in_data, in_data_len, out_data, 218 rsa_pkcs_decrypt(SESSION *sess, argument 233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 251 rc = ckm_rsa_decrypt(sess->hContext, in_data, 262 rsa_pkcs_sign(SESSION *sess, argument 277 if (! sess || ! ctx || ! out_data_len) { 280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 300 rc = ckm_rsa_sign(sess 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | decr_mgr.c | 33 SESSION *sess, 46 if (! sess) { 54 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 70 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 160 decr_mgr_decrypt(SESSION *sess, argument 168 if (! sess || ! ctx) { 182 return (rsa_pkcs_decrypt(sess, length_only, 32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument
|
H A D | encr_mgr.c | 31 encr_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx || ! mech) { 53 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 69 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 159 encr_mgr_encrypt(SESSION *sess, argument 167 if (! sess || ! ctx) { 181 return (rsa_pkcs_encrypt(sess, length_only,
|
H A D | tpm_specific.c | 1790 SESSION *sess = session_mgr_find(session.sessionh); local 1796 if (!sess) { 1807 if (token_load_srk(sess->hContext, &hSRK)) { 1817 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS || 1818 sess->session_info.state == CKS_RW_PUBLIC_SESSION) { 1830 if ((rc = token_create_private_tree(sess->hContext, 1848 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS) { 1855 if ((rc = verify_user_pin(sess->hContext, 1866 if (tss_change_auth(sess->hContext, 1872 } else if (sess [all...] |
/illumos-gate/usr/src/uts/common/sys/ |
H A D | session.h | 85 typedef struct sess { struct
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.h | 87 extern void final_pk11(CK_SESSION_HANDLE sess); 90 CK_ULONG pinlen, CK_SESSION_HANDLE_PTR sess); 94 CK_SESSION_HANDLE_PTR sess);
|
H A D | common.c | 166 final_pk11(CK_SESSION_HANDLE sess) argument 174 close_sess(sess); 185 close_sess(CK_SESSION_HANDLE sess) argument 188 if (sess == NULL) { 197 logout_token(sess); 199 (void) C_CloseSession(sess); 207 logout_token(CK_SESSION_HANDLE sess) argument 210 if (sess == NULL) { 218 (void) C_Logout(sess);
|
/illumos-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 906 CK_SESSION_HANDLE sess; local 930 rv = C_OpenSession(cipher->slot, CKF_SERIAL_SESSION, NULL, NULL, &sess); 949 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, 952 (void) C_CloseSession(sess); 1057 getkeyfromtoken(CK_SESSION_HANDLE sess, argument 1098 rv = C_Login(sess, CKU_USER, (CK_UTF8CHAR_PTR)pass, passlen); 1152 rv = C_FindObjectsInit(sess, key_tmpl, attrs); 1156 rv = C_FindObjects(sess, &obj, 1, &num_objs); 1157 (void) C_FindObjectsFinal(sess); 1173 rv = pkcs11_ObjectToKey(sess, ob 1301 end_crypto(CK_SESSION_HANDLE sess) argument 1311 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument 2119 CK_SESSION_HANDLE sess; local [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/idm/ |
H A D | idm.c | 178 static int iscsi_print_ini_sess(uintptr_t addr, iscsi_sess_t *sess, 243 int tpgt = 0, conn = 0, sess = 0, portal = 0; local 252 's', MDB_OPT_SETBITS, TRUE, &sess, 267 idc.u.child.idc_sess = sess; 1181 /* Walk sess tree */ 1185 mdb_warn("target sess list walk failed"); 1562 iscsi_print_ini_sess(uintptr_t addr, iscsi_sess_t *sess, argument 1580 sess->sess_type, sess->sess_state); 1584 sess [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/pppt/ |
H A D | pppt.c | 1324 pppt_sess_t *sess; local 1335 for (sess = avl_first(&tgt->target_sess_list); sess != NULL; 1336 sess = AVL_NEXT(&tgt->target_sess_list, sess)) { 1337 mutex_enter(&sess->ps_mutex); 1338 if ((result = avl_find(&sess->ps_task_list, 1344 mutex_exit(&sess->ps_mutex); 1349 mutex_exit(&sess->ps_mutex);
|
/illumos-gate/usr/src/uts/common/io/comstar/port/srpt/ |
H A D | srpt_stp.c | 1375 srpt_session_t sess; local 1384 bzero(&sess, sizeof (srpt_session_t)); 1385 (void) strlcpy(sess.ss_i_gid, remote_gid, SRPT_ALIAS_LEN); 1386 (void) strlcpy(sess.ss_t_gid, local_gid, SRPT_ALIAS_LEN); 1387 EUI_STR(sess.ss_i_name, 1389 EUI_STR(sess.ss_t_name, 1391 ALIAS_STR(sess.ss_i_alias, 1394 ALIAS_STR(sess.ss_t_alias, 1398 DTRACE_SRP_2(login__command, srpt_session_t, &sess, 1593 DTRACE_SRP_3(login__response, srpt_session_t, &sess, [all...] |
H A D | srpt_ioc.c | 963 srpt_session_t sess; local 1047 bzero(&sess, sizeof (srpt_session_t)); 1048 ALIAS_STR(sess.ss_t_gid, new_gid.gid_prefix, new_gid.gid_guid); 1049 EUI_STR(sess.ss_t_name, tgt->tp_ibt_svc_id); 1051 DTRACE_SRP_1(service__up, srpt_session_t, &sess); 1063 srpt_session_t sess; local 1078 bzero(&sess, sizeof (srpt_session_t)); 1079 ALIAS_STR(sess.ss_t_gid, port->hwp_gid.gid_prefix, 1081 EUI_STR(sess.ss_t_name, tgt->tp_ibt_svc_id); 1083 DTRACE_SRP_1(service__down, srpt_session_t, &sess); [all...] |
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2412 get_bigint_attr(CK_SESSION_HANDLE sess, CK_OBJECT_HANDLE obj, argument 2422 if ((ckrv = C_GetAttributeValue(sess, obj, 2435 if ((ckrv = C_GetAttributeValue(sess, obj, 2453 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2465 if ((ckrv = C_GetAttributeValue(sess, obj, 2491 if ((ckrv = C_GetAttributeValue(sess, obj, 2502 rv = get_bigint_attr(sess, obj, CKA_PRIVATE_EXPONENT, &rawrsa->priexp); 2505 rv = get_bigint_attr(sess, obj, CKA_PRIME_1, &rawrsa->prime1); 2508 rv = get_bigint_attr(sess, obj, CKA_PRIME_2, &rawrsa->prime2); 2511 rv = get_bigint_attr(sess, ob 2615 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2674 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2742 CK_SESSION_HANDLE sess = kmfh->pk11handle; local [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_tgt.c | 1156 iscsit_tgt_bind_sess(iscsit_tgt_t *tgt, iscsit_sess_t *sess) argument 1159 sess->ist_lport = tgt->target_stmf_lport; 1163 avl_add(&tgt->target_sess_list, sess); 1167 sess->ist_lport = NULL; 1169 avl_add(&iscsit_global.global_discovery_sessions, sess); 1175 iscsit_tgt_unbind_sess(iscsit_tgt_t *tgt, iscsit_sess_t *sess) argument 1179 avl_remove(&tgt->target_sess_list, sess); 1181 sess->ist_tgt = (iscsit_tgt_t *)SESS_UNBOUND_FROM_TGT; 1187 avl_remove(&iscsit_global.global_discovery_sessions, sess);
|
H A D | iscsit.h | 800 iscsit_tgt_bind_sess(iscsit_tgt_t *tgt, iscsit_sess_t *sess); 803 iscsit_tgt_unbind_sess(iscsit_tgt_t *tgt, iscsit_sess_t *sess);
|