/osnet-11/usr/src/lib/libgss/ |
H A D | g_utils.c | 43 static const char QOP_NUM_FILE[] = "/etc/gss/qop"; 50 * This routine fetches qop and num from "/etc/gss/qop". 55 * we don't expect the qop file to be changed and reread often. 71 if (!qop_num_pairs[0].qop) { 110 qopname = name; /* will contain qop name */ 118 qop_num_pairs[qop_num_pair_cnt].qop = strdup(name); 119 if (qop_num_pairs[qop_num_pair_cnt].qop == NULL) 126 free(qop_num_pairs[qop_num_pair_cnt].qop); 140 free(qop_num_pairs[qop_num_pair_cnt].qop); 164 __gss_qop_to_num( char *qop, char *mech, OM_uint32 *num ) argument [all...] |
/osnet-11/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_misc.c | 113 __rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs, xdr_func, 115 OM_uint32 qop; 167 if (gss_seal(&minor, context, TRUE, qop, &in_buf, 175 if (gss_sign(&minor, context, qop, &in_buf, 222 int qop; local 237 &qop); 254 if (!conf || qop != qop_check) 260 major = gss_verify(&minor, context, &in_buf, &out_buf, &qop); 270 if (qop != qop_check) 309 __find_max_data_length(service, context, qop, max_tp_unit_le [all...] |
H A D | rpcsec_gss_utils.c | 89 __rpc_gss_qop_to_num(char *qop, char *mech, OM_uint32 *num) argument 91 if (__gss_qop_to_num(qop, mech, num) != GSS_S_COMPLETE) 99 char *qop; local 101 if (__gss_num_to_qop(mech, num, &qop) != GSS_S_COMPLETE) 103 return (qop);
|
H A D | rpcsec_gss.c | 82 OM_uint32 qop; /* requested QOP */ member in struct:_rpc_gss_data 101 __rpc_gss_seccreate(clnt, server_name, mech, service, qop, options_req, 107 char *qop; /* requested QOP */ 125 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) { 178 ap->qop = qop_num; 415 __rpc_gss_set_defaults(auth, service, qop) 418 char *qop; 440 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) 443 ap->qop = qop_num; 524 if ((major = gss_sign(&minor, ap->context, ap->qop, [all...] |
H A D | svc_rpcsec_gss.c | 84 OM_uint32 qop; member in struct:_svc_rpc_gss_data 485 svcauth->raw_cred.qop = __rpc_gss_num_to_qop( 692 gss_parms->qop_rcvd = (uint_t)client_data->qop; 979 client_data->qop = gss_parms->qop_rcvd; 980 client_data->raw_cred.qop = __rpc_gss_num_to_qop( 996 gss_parms->qop_rcvd != client_data->qop) { 1161 if (gss_sign(&minor, cl->context, cl->qop, &in_buf, 1196 client_data->qop = GSS_C_QOP_DEFAULT;
|
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 80 char *qop; member in struct:__anon2017
|
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 157 char *qop, /* requested QOP */ 164 service_type, qop, options_req, options_ret)); 168 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, char *qop) argument 172 return ((*calls.rpc_gss_set_defaults)(auth, service, qop)); 261 rpc_gss_qop_to_num(char *qop, char *mech, uint_t *num) argument 265 return ((*calls.rpc_gss_qop_to_num)(qop, mech, num)); 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 290 * __dh_is_valid_QOP: Return true if qop is valid entry into the QOP 294 __dh_is_valid_QOP(dh_qop_t qop) argument 298 is_valid = qop < QOP_ENTRIES; 309 __alloc_sig(dh_qop_t qop, dh_signature_t sig) argument 315 if (!__dh_is_valid_QOP(qop)) 319 v = QOP_table[qop].verifier; 340 __get_sig_size(dh_qop_t qop, unsigned int *size) argument 343 if (__dh_is_valid_QOP(qop)) { 345 verifier_t v = QOP_table[qop].verifier; 358 * __mk_sig: Generate a signature using a given qop ove 364 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument 403 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument 504 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument 557 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon1919 289 if (attr->qlen != 4 || strncasecmp(attr->qop, "auth", 4) != 0) { 316 MD5Update(&ctx, (CONST_UCHAR *) attr->qop, attr->qlen); 352 static const char qstr[] = ",qop=auth"; 362 attr->qop == NULL || attr->qlen == 0 || 459 static const char qstr[] = "qop"; 557 attr_out->qop = val;
|
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 334 unsigned char *pszQop, /* qop-value: "", "auth", 338 HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 2381 char *qop, 2392 if (qop == NULL) 2393 qop = "auth"; 2408 (unsigned char *) qop, /* qop-value: "", "auth", 2412 HEntity, /* H(entity body) if qop="auth-int" */ 2432 (unsigned char *) qop, /* qop 2376 create_response(context_t * text, const sasl_utils_t * utils, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, char *digesturi, HASH Secret, char *authorization_id, char **response_value) argument 2571 char qop[1024], cipheropts[1024]; local 2859 char *qop = NULL; local 3859 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument 3960 char *qop = NULL; local [all...] |