/osnet-11/usr/src/lib/libresolv2/common/isc/ |
H A D | ctl_srvr.c | 67 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \ 118 LIST(struct ctl_sess) sess; member in struct:ctl_sctx 208 INIT_LIST(ctx->sess); 280 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p", 281 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess); 290 for (this = HEAD(ctx->sess); this != NULL; this = next) { 302 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument 308 struct ctl_sctx *ctx = sess->ctx; 312 REQUIRE(sess->state == initializing || 313 sess 376 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument 387 ctl_getcsctx(struct ctl_sess *sess) argument 392 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument 408 struct ctl_sess *sess = NULL; local 469 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument 483 ctl_close(struct ctl_sess *sess) argument 521 ctl_start_read(struct ctl_sess *sess) argument 551 ctl_stop_read(struct ctl_sess *sess) argument 569 struct ctl_sess *sess = uap; local 631 struct ctl_sess *sess = uap; local 658 struct ctl_sess *sess = uap; local 679 ctl_docommand(struct ctl_sess *sess) argument 722 struct ctl_sess *sess = uap; local 760 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument 780 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 442 SESSION * sess = NULL; local 457 sess = session_mgr_find(hSession); 458 if (! sess) { 463 if (pin_locked(&sess->session_info, 469 if (sess->session_info.state != CKS_RW_SO_FUNCTIONS) { 474 rc = token_specific.t_init_pin(sess->hContext, pPin, ulPinLen); 505 SESSION * sess = NULL; local 514 sess = session_mgr_find(hSession); 515 if (! sess) { 520 if (pin_locked(&sess 544 SESSION *sess; local 594 SESSION *sess = NULL; local 641 SESSION * sess = NULL; local 671 SESSION * sess = NULL; local 708 SESSION * sess = NULL; local 738 SESSION * sess = NULL; local 838 SESSION * sess = NULL; local 875 SESSION * sess = NULL; local 910 SESSION * sess = NULL; local 942 SESSION * sess = NULL; local 974 SESSION * sess = NULL; local 1001 SESSION * sess = NULL; local 1028 SESSION * sess = NULL; local 1054 SESSION * sess = NULL; local 1092 SESSION * sess = NULL; local 1138 SESSION * sess = NULL; local 1177 SESSION * sess = NULL; local 1223 SESSION * sess = NULL; local 1360 SESSION * sess = NULL; local 1406 SESSION * sess = NULL; local 1451 SESSION * sess = NULL; local 1496 SESSION * sess = NULL; local 1541 SESSION * sess = NULL; local 1581 SESSION * sess = NULL; local 1615 SESSION * sess = NULL; local 1659 SESSION * sess = NULL; local 1704 SESSION * sess = NULL; local 1748 SESSION * sess = NULL; local 1787 SESSION * sess = NULL; local 1831 SESSION * sess = NULL; local 1875 SESSION * sess = NULL; local 1919 SESSION * sess = NULL; local 1963 SESSION * sess = NULL; local 2001 SESSION * sess = NULL; local 2040 SESSION * sess = NULL; local 2079 SESSION * sess = NULL; local 2123 SESSION * sess = NULL; local 2172 SESSION * sess = NULL; local 2217 SESSION * sess = NULL; local 2266 SESSION * sess = NULL; local 2323 SESSION *sess = NULL; local [all...] |
H A D | sess_mgr.c | 331 * SESSION ** sess : new session pointer (OUTPUT) 336 session_mgr_new(CK_ULONG flags, SESSION **sess) argument 423 *sess = new_session; 553 session_mgr_close_session(SESSION *sess) argument 558 if (! sess) 564 node = dlist_find(sess_list, sess); 570 (void) object_mgr_purge_session_objects(sess, ALL); 572 if (sess->find_list) 573 free(sess->find_list); 575 if (sess 645 SESSION *sess = (SESSION *)sess_list->data; local 762 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument 985 session_mgr_set_op_state( SESSION *sess, CK_OBJECT_HANDLE encr_key, CK_OBJECT_HANDLE auth_key, CK_BYTE *data) argument [all...] |
H A D | mech_md5.c | 297 md5_hash(SESSION *sess, argument 305 if (! sess || ! ctx || ! out_data_len) { 321 md5_hmac_sign(SESSION * sess, argument 340 if (! sess || ! ctx || ! out_data_len) { 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 380 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 387 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 421 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 427 rc = digest_mgr_digest_update(sess, &digest_ctx, 434 rc = digest_mgr_digest_update(sess, 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | mech_sha.c | 30 sha1_hash(SESSION *sess, argument 38 if (! sess || ! ctx || ! out_data_len) { 56 sha1_hmac_sign(SESSION * sess, argument 74 if (! sess || ! ctx || ! out_data_len) { 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 112 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 119 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 157 rc = digest_mgr_digest_update(sess, &digest_ctx, 164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len); 171 rc = digest_mgr_digest_final(sess, 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument [all...] |
H A D | sign_mgr.c | 31 sign_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 250 sign_mgr_sign(SESSION * sess, argument 258 if (! sess || ! ctx) { 279 return (rsa_pkcs_sign(sess, length_only, ctx, 284 return (rsa_hash_pkcs_sign(sess, length_only, ctx, 290 return (md5_hmac_sign(sess, length_only, ctx, 295 return (sha1_hmac_sign(sess, length_only, ctx, 304 sign_mgr_sign_update(SESSION * sess, argument 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 31 verify_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 231 verify_mgr_verify(SESSION * sess, argument 238 if (! sess || ! ctx) { 257 return (rsa_pkcs_verify(sess, ctx, 262 return (rsa_hash_pkcs_verify(sess, ctx, 268 return (md5_hmac_verify(sess, ctx, 273 return (sha1_hmac_verify(sess, ctx, 282 verify_mgr_verify_update(SESSION * sess, argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | dig_mgr.c | 300 digest_mgr_init(SESSION *sess, argument 304 if (! sess || ! ctx) { 372 digest_mgr_digest(SESSION *sess, argument 381 if (! sess || ! ctx) { 399 return (sha1_hash(sess, length_only, ctx, 405 return (md5_hash(sess, length_only, ctx, 414 digest_mgr_digest_update(SESSION *sess, argument 419 if (! sess || ! ctx) { 442 digest_mgr_digest_key(SESSION * sess, argument 451 if (!sess || !ct 478 digest_mgr_digest_final(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *hash, CK_ULONG *hash_len) argument [all...] |
H A D | obj_mgr.c | 304 check_object_access(SESSION *sess, OBJECT *o) argument 323 if (sess->session_info.state == CKS_RO_PUBLIC_SESSION) { 335 if (sess->session_info.state == CKS_RO_USER_FUNCTIONS) { 342 if (sess->session_info.state == CKS_RW_PUBLIC_SESSION) { 349 if (sess->session_info.state == CKS_RW_SO_FUNCTIONS) { 360 object_mgr_add(SESSION * sess, argument 369 if (! sess || ! pTemplate || ! handle) { 381 rc = check_object_access(sess, o); 393 o->session = sess; 433 rc = save_token_object(sess 499 object_mgr_add_to_map(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 542 object_mgr_copy(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE old_handle, CK_OBJECT_HANDLE * new_handle) argument 686 object_mgr_create_skel(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_ULONG mode, CK_ULONG obj_type, CK_ULONG sub_class, OBJECT ** obj) argument 751 object_mgr_create_final(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 869 object_mgr_destroy_object(SESSION * sess, CK_OBJECT_HANDLE handle) argument 1146 object_mgr_find_init(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1217 object_mgr_find_build_list(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, DL_NODE * obj_list, CK_BBOOL public_only) argument 1324 object_mgr_find_final(SESSION *sess) argument 1342 object_mgr_get_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1478 object_mgr_purge_session_objects(SESSION * sess, SESS_OBJ_TYPE type) argument 1712 object_mgr_set_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 2199 object_mgr_purge_map( SESSION *sess, SESS_OBJ_TYPE type) argument [all...] |
H A D | key_mgr.c | 59 key_mgr_generate_key_pair(SESSION * sess, argument 76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) { 130 rc = object_mgr_create_skel(sess, 137 rc = object_mgr_create_skel(sess, 148 sess->hContext, 207 rc = object_mgr_create_final(sess, publ_key_obj, publ_key_handle); 211 rc = object_mgr_create_final(sess, priv_key_obj, priv_key_handle); 213 (void) object_mgr_destroy_object(sess, *publ_key_handle); 232 key_mgr_wrap_key(SESSION * sess, argument 250 if (! sess || ! wrapped_key_le 349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument [all...] |
H A D | mech_rsa.c | 175 rsa_pkcs_encrypt(SESSION *sess, argument 190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 211 rc = ckm_rsa_encrypt(sess->hContext, in_data, in_data_len, out_data, 218 rsa_pkcs_decrypt(SESSION *sess, argument 233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 251 rc = ckm_rsa_decrypt(sess->hContext, in_data, 262 rsa_pkcs_sign(SESSION *sess, argument 277 if (! sess || ! ctx || ! out_data_len) { 280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 300 rc = ckm_rsa_sign(sess 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | decr_mgr.c | 33 SESSION *sess, 46 if (! sess) { 54 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 70 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 160 decr_mgr_decrypt(SESSION *sess, argument 168 if (! sess || ! ctx) { 182 return (rsa_pkcs_decrypt(sess, length_only, 32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument
|
H A D | encr_mgr.c | 31 encr_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx || ! mech) { 53 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 69 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 159 encr_mgr_encrypt(SESSION *sess, argument 167 if (! sess || ! ctx) { 181 return (rsa_pkcs_encrypt(sess, length_only,
|
H A D | tpm_specific.c | 1841 SESSION *sess = session_mgr_find(session.sessionh); local 1847 if (!sess) { 1858 if (token_load_srk(sess->hContext, &hSRK)) { 1868 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS || 1869 sess->session_info.state == CKS_RW_PUBLIC_SESSION) { 1881 if ((rc = token_create_private_tree(sess->hContext, 1899 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS) { 1906 if ((rc = verify_user_pin(sess->hContext, 1917 if (tss_change_auth(sess->hContext, 1923 } else if (sess [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2441 get_bigint_attr(CK_SESSION_HANDLE sess, CK_OBJECT_HANDLE obj, argument 2451 if ((ckrv = C_GetAttributeValue(sess, obj, 2464 if ((ckrv = C_GetAttributeValue(sess, obj, 2482 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2494 if ((ckrv = C_GetAttributeValue(sess, obj, 2520 if ((ckrv = C_GetAttributeValue(sess, obj, 2531 rv = get_bigint_attr(sess, obj, CKA_PRIVATE_EXPONENT, &rawrsa->priexp); 2534 rv = get_bigint_attr(sess, obj, CKA_PRIME_1, &rawrsa->prime1); 2537 rv = get_bigint_attr(sess, obj, CKA_PRIME_2, &rawrsa->prime2); 2540 rv = get_bigint_attr(sess, ob 2645 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2704 CK_SESSION_HANDLE sess = kmfh->pk11handle; local 2772 CK_SESSION_HANDLE sess = kmfh->pk11handle; local [all...] |