Searched refs:qop (Results 1 - 17 of 17) sorted by relevance

/osnet-11/usr/src/lib/libgss/
H A Dg_utils.c43 static const char QOP_NUM_FILE[] = "/etc/gss/qop";
50 * This routine fetches qop and num from "/etc/gss/qop".
55 * we don't expect the qop file to be changed and reread often.
71 if (!qop_num_pairs[0].qop) {
110 qopname = name; /* will contain qop name */
118 qop_num_pairs[qop_num_pair_cnt].qop = strdup(name);
119 if (qop_num_pairs[qop_num_pair_cnt].qop == NULL)
126 free(qop_num_pairs[qop_num_pair_cnt].qop);
140 free(qop_num_pairs[qop_num_pair_cnt].qop);
164 __gss_qop_to_num( char *qop, char *mech, OM_uint32 *num ) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c290 * __dh_is_valid_QOP: Return true if qop is valid entry into the QOP
294 __dh_is_valid_QOP(dh_qop_t qop) argument
298 is_valid = qop < QOP_ENTRIES;
309 __alloc_sig(dh_qop_t qop, dh_signature_t sig) argument
315 if (!__dh_is_valid_QOP(qop))
319 v = QOP_table[qop].verifier;
340 __get_sig_size(dh_qop_t qop, unsigned int *size) argument
343 if (__dh_is_valid_QOP(qop)) {
345 verifier_t v = QOP_table[qop].verifier;
358 * __mk_sig: Generate a signature using a given qop ove
364 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument
403 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument
504 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument
557 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument
[all...]
H A Dcrypto.h57 __dh_is_valid_QOP(dh_qop_t qop);
60 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req,
64 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req,
H A DMICwrap.c38 * __dh_gss_sign: Sign (Caluculate a check sum as specified by the qop
39 * and encrypt it with a cipher also determined by the qop using the context
40 * session keys). the message with the given qop and return
48 int qop_req, /* Requested qop */
86 /* Set the token qop, seq_number and client flag */
87 mic->qop = qop_req;
109 * major return value is GSS_S_COMPLETE, then *qop will be the qop that
119 int *qop /* qop use
[all...]
H A Ddhmech_prot.x101 dh_qop_t qop;
H A Dtoken.c69 return (body->dh_token_body_desc_u.sign.qop);
71 return (body->dh_token_body_desc_u.seal.mic.qop);
H A Dcontext.c258 * qop, whether confidentiality is specified, and an output size, return
287 /* Find the signature size for this qop. */
297 * requested qop. Since we can't support privacy the cipher pad
310 wrap->mic.qop = qop_req;
/osnet-11/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss_misc.c113 __rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs, xdr_func,
115 OM_uint32 qop;
167 if (gss_seal(&minor, context, TRUE, qop, &in_buf,
175 if (gss_sign(&minor, context, qop, &in_buf,
222 int qop; local
237 &qop);
254 if (!conf || qop != qop_check)
260 major = gss_verify(&minor, context, &in_buf, &out_buf, &qop);
270 if (qop != qop_check)
309 __find_max_data_length(service, context, qop, max_tp_unit_le
[all...]
H A Drpcsec_gss.c82 OM_uint32 qop; /* requested QOP */ member in struct:_rpc_gss_data
101 __rpc_gss_seccreate(clnt, server_name, mech, service, qop, options_req,
107 char *qop; /* requested QOP */
125 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) {
178 ap->qop = qop_num;
415 __rpc_gss_set_defaults(auth, service, qop)
418 char *qop;
440 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num))
443 ap->qop = qop_num;
524 if ((major = gss_sign(&minor, ap->context, ap->qop,
[all...]
H A Drpcsec_gss_utils.c89 __rpc_gss_qop_to_num(char *qop, char *mech, OM_uint32 *num) argument
91 if (__gss_qop_to_num(qop, mech, num) != GSS_S_COMPLETE)
99 char *qop; local
101 if (__gss_num_to_qop(mech, num, &qop) != GSS_S_COMPLETE)
103 return (qop);
H A Dsvc_rpcsec_gss.c84 OM_uint32 qop; member in struct:_svc_rpc_gss_data
485 svcauth->raw_cred.qop = __rpc_gss_num_to_qop(
692 gss_parms->qop_rcvd = (uint_t)client_data->qop;
979 client_data->qop = gss_parms->qop_rcvd;
980 client_data->raw_cred.qop = __rpc_gss_num_to_qop(
996 gss_parms->qop_rcvd != client_data->qop) {
1161 if (gss_sign(&minor, cl->context, cl->qop, &in_buf,
1196 client_data->qop = GSS_C_QOP_DEFAULT;
/osnet-11/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c157 char *qop, /* requested QOP */
164 service_type, qop, options_req, options_ret));
168 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, char *qop) argument
172 return ((*calls.rpc_gss_set_defaults)(auth, service, qop));
261 rpc_gss_qop_to_num(char *qop, char *mech, uint_t *num) argument
265 return ((*calls.rpc_gss_qop_to_num)(qop, mech, num));
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
/osnet-11/usr/src/lib/libnsl/nis/gen/
H A Dnis_sec_mechs.c267 if (mp->qop)
268 free(mp->qop);
375 const int qp_offset = 5; /* qop */
409 * qop: optional field
410 * Make qop NULL if the field was empty or was "default" or
417 m->qop = NULL;
419 m->qop = strdup(*(flds + qp_offset));
501 tp->qop = mp->qop ? strdup(mp->qop)
[all...]
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c334 unsigned char *pszQop, /* qop-value: "", "auth",
338 HASHHEX HEntity, /* H(entity body) if qop="auth-int" */
2381 char *qop,
2392 if (qop == NULL)
2393 qop = "auth";
2408 (unsigned char *) qop, /* qop-value: "", "auth",
2412 HEntity, /* H(entity body) if qop="auth-int" */
2432 (unsigned char *) qop, /* qop
2376 create_response(context_t * text, const sasl_utils_t * utils, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, char *digesturi, HASH Secret, char *authorization_id, char **response_value) argument
2571 char qop[1024], cipheropts[1024]; local
2859 char *qop = NULL; local
3859 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
3960 char *qop = NULL; local
[all...]
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h80 char *qop; member in struct:__anon2017
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Ddigest_md5.c74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon1919
289 if (attr->qlen != 4 || strncasecmp(attr->qop, "auth", 4) != 0) {
316 MD5Update(&ctx, (CONST_UCHAR *) attr->qop, attr->qlen);
352 static const char qstr[] = ",qop=auth";
362 attr->qop == NULL || attr->qlen == 0 ||
459 static const char qstr[] = "qop";
557 attr_out->qop = val;
/osnet-11/usr/src/lib/libnsl/common/
H A Dllib-lnsl664 rpc_gss_service_t service_type, char *qop,
667 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, char *qop);
680 bool_t rpc_gss_qop_to_num(char *qop, char *mech, u_int *num);

Completed in 61 milliseconds