/netbsd-current/external/bsd/openldap/dist/libraries/libldap/ |
H A D | cyrus.c | 449 const char *mech; local 598 mech = NULL; 609 &mech ); 611 if( pmech == NULL && mech != NULL ) { 612 pmech = mech; 613 *rmech = mech; 658 mech = *rmech; 659 if ( rc == LDAP_SUCCESS && mech == NULL ) { 710 rc = ldap_sasl_bind( ld, dn, mech, &ccred, sctrls, cctrls, msgid );
|
H A D | vc.c | 336 LDAP_CONST char *mech, 356 assert(!mech); 333 ldap_verify_credentials_interactive( LDAP *ld, LDAP_CONST char *dn, LDAP_CONST char *mech, LDAPControl **vcControls, LDAPControl **serverControls, LDAPControl **clientControls, unsigned flags, LDAP_SASL_INTERACT_PROC *proc, void *defaults, void *context; LDAPMessage *result, const char **rmech, int *msgid ) argument
|
H A D | gssapi.c | 53 gss_OID mech, 72 gss_oid_to_str(&min2, mech, &mech_msg); 75 mech, &msg_ctx, &gss_msg); 77 mech, &msg_ctx, &minor_msg); 79 snprintf(buf, buf_len, "gss_rc[%d:%*s] mech[%*s] minor[%u:%*s]", 357 gss_OID mech, 364 gsserrstr( msg, sizeof(msg), mech, gss_rc, minor_status )); 50 gsserrstr( char *buf, ber_len_t buf_len, gss_OID mech, int gss_rc, OM_uint32 minor_status ) argument 355 map_gsserr2ldap( LDAP *ld, gss_OID mech, int gss_rc, OM_uint32 minor_status ) argument
|
/netbsd-current/external/bsd/openldap/dist/servers/lloadd/ |
H A D | bind.c | 199 struct berval binddn, auth, mech = BER_BVNULL; local 314 if ( ber_get_stringbv( copy, &mech, LBER_BV_NOTERM ) == LBER_ERROR ) { 317 if ( !ber_bvcmp( &mech, &mech_external ) ) { 331 ber_dupbv( &client->c_sasl_bind_mech, &mech ); 332 } else if ( ber_bvcmp( &mech, &client->c_sasl_bind_mech ) ) { 333 ber_bvreplace( &client->c_sasl_bind_mech, &mech ); 468 if ( BER_BVISNULL( &mech ) ) { 473 } else if ( ber_bvcmp( &upstream->c_sasl_bind_mech, &mech ) ) { 474 ber_bvreplace( &upstream->c_sasl_bind_mech, &mech );
|
H A D | upstream.c | 288 const char *mech = NULL; local 359 &mech ); 369 ber_str2bv( mech, 0, 0, &c->c_sasl_bind_mech ); 394 "connid=%lu mech=%s setting up a new SASL security layer\n", 403 "connid=%lu next step for SASL bind mech=%s rc=%d\n",
|
/netbsd-current/external/bsd/openldap/dist/servers/slapd/ |
H A D | slapcommon.h | 81 #define mech tool_globals.tv_mech macro
|
H A D | slapauth.c | 102 conn.c_sasl_bind_mech = mech;
|
H A D | sasl.c | 739 * ignore it, some other mech will process it. 776 * The SASL EXTERNAL mech is backwards from all the other mechs, 1630 "==> sasl_bind: dn=\"%s\" mech=%s datalen=%ld\n", 1642 #define START( ctx, mech, cred, clen, resp, rlen, err ) \ 1643 sasl_server_start( ctx, mech, cred, clen, resp, rlen ) 1882 struct berval dn2, *mech; local 1914 mech = &conn->c_sasl_bind_mech; 1916 mech = &conn->c_authmech; 1925 if( bvmatch( mech, &ext_bv )) { 1987 if ( !BER_BVISNULL( mech ) ) { [all...] |
/netbsd-current/external/ibm-public/postfix/dist/src/xsasl/ |
H A D | xsasl_cyrus_server.c | 117 #define SASL_SERVER_START(conn, mech, clin, clinlen, srvout, srvoutlen, err) \ 118 sasl_server_start(conn, mech, clin, clinlen, srvout, srvoutlen, err) 134 #define SASL_SERVER_START(conn, mech, clin, clinlen, srvout, srvoutlen, err) \ 135 sasl_server_start(conn, mech, clin, clinlen, srvout, srvoutlen)
|
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | pkcs11rsa_link.c | 61 CK_MECHANISM mech = { 0, NULL, 0 }; local 225 mech.mechanism = CKM_SHA1_RSA_PKCS; 228 mech.mechanism = CKM_SHA256_RSA_PKCS; 231 mech.mechanism = CKM_SHA512_RSA_PKCS; 237 PK11_RET(pkcs_C_SignInit, (pk11_ctx->session, &mech, pk11_ctx->object), 280 CK_MECHANISM mech = { 0, NULL, 0 }; local 384 mech.mechanism = CKM_SHA1_RSA_PKCS; 387 mech.mechanism = CKM_SHA256_RSA_PKCS; 390 mech.mechanism = CKM_SHA512_RSA_PKCS; 397 (pk11_ctx->session, &mech, pk11_ct 555 CK_MECHANISM mech = { 0, NULL, 0 }; local 670 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local 902 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local 1091 CK_MECHANISM mech = { CKM_RSA_PKCS_KEY_PAIR_GEN, NULL, 0 }; local [all...] |
H A D | pkcs11ecdsa_link.c | 78 CK_MECHANISM mech = { 0, NULL, 0 }; local 89 mech.mechanism = CKM_SHA256; 91 mech.mechanism = CKM_SHA384; 107 PK11_RET(pkcs_C_DigestInit, (pk11_ctx->session, &mech), ISC_R_FAILURE); 158 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local 244 (pk11_ctx->session, &mech, 281 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local 349 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 469 CK_MECHANISM mech = { CKM_EC_KEY_PAIR_GEN, NULL, 0 }; local 525 (pk11_ctx->session, &mech, pubTemplat [all...] |
H A D | pkcs11eddsa_link.c | 119 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local 213 (pk11_ctx->session, &mech, 254 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local 321 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 442 CK_MECHANISM mech = { CKM_EC_EDWARDS_KEY_PAIR_GEN, NULL, 0 }; local 498 (pk11_ctx->session, &mech, pubTemplate, (CK_ULONG)6,
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/spnego/ |
H A D | cred_stubs.c | 159 sname ? &sname->mech : NULL, 203 sname ? &sname->mech : NULL,
|
H A D | accept_sec_context.c | 68 acceptor_approved(gss_name_t target_name, gss_OID mech) argument 78 gss_add_oid_set_member(&junk, mech, &oidset); 615 /* Call glue layer to find first mech we support */ 664 name->mech = ctx->mech_src_name; 852 name->mech = ctx->mech_src_name;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/gssapi/ |
H A D | gssapi.h | 958 * mech option 962 gss_mo_set(gss_const_OID mech, gss_const_OID option, 966 gss_mo_get(gss_const_OID mech, gss_const_OID option, gss_buffer_t value); 969 gss_mo_list(gss_const_OID mech, gss_OID_set *options); 972 gss_mo_name(gss_const_OID mech, gss_const_OID options, gss_buffer_t name); 975 * SASL glue functions and mech inquire 999 gss_const_OID mech,
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/ipc/ |
H A D | server.c | 48 void *mech; member in struct:heim_sipc 332 ctx->mech = s; 343 struct mach_service *st = sctx->mech; 360 struct mach_service *s = ctx->mech; 1045 struct client *c = ctx->mech; 1077 ct->mech = c; 1129 struct client *c = (*ctx)->mech;
|
/netbsd-current/external/bsd/openldap/dist/contrib/slapd-modules/passwd/totp/ |
H A D | slapd-totp.c | 121 "DESC 'last successful authentication using any method/mech' " 383 const void *mech) 405 do_hmac(mech, key, &data, &digval); 428 const void *mech, 491 generate(&key, t, DIGITS, &out, mech); 507 generate(&key, t - 1, DIGITS, &out, mech); 525 const void *mech) 561 rc_otp = chk_totp(&passwd_otp, &cred_otp, mech, text); 378 generate( myval *key, uint64_t tval, int digits, myval *out, const void *mech) argument 425 chk_totp( const struct berval *passwd, const struct berval *cred, const void *mech, const char **text) argument 520 chk_totp_and_pw( const struct berval *scheme, const struct berval *passwd, const struct berval *cred, const char **text, const void *mech) argument
|
/netbsd-current/crypto/external/bsd/heimdal/include/ |
H A D | gsskrb5-private.h | 78 const gss_OID mech ); 85 const gss_OID /*mech*/); 92 const gss_OID mech ); 108 const gss_OID /*mech*/); 196 gss_OID /*mech*/); 464 const gss_OID /*mech*/); 472 const gss_OID mech ); 655 const gss_OID /*mech*/);
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | gsskrb5-private.h | 81 const gss_OID mech ); 88 const gss_OID /*mech*/); 95 const gss_OID mech ); 111 const gss_OID /*mech*/); 199 gss_OID /*mech*/); 467 const gss_OID /*mech*/); 475 const gss_OID mech ); 658 const gss_OID /*mech*/);
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | ssh-pkcs11.c | 350 CK_MECHANISM mech; local 393 memset(&mech, 0, sizeof(mech)); 394 mech.mechanism = mech_type; 395 mech.pParameter = NULL_PTR; 396 mech.ulParameterLen = 0; 398 if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) { 1320 CK_MECHANISM mech = { local 1358 if ((rv = f->C_GenerateKeyPair(session, &mech, tpub, npub, tpriv, npriv, 1427 CK_MECHANISM mech local [all...] |
H A D | sshconnect2.c | 792 gss_OID mech = NULL; local 803 mech = &authctxt->gss_supported_mechs-> 806 if (mech->length < 128 && ssh_gssapi_check_mechanism(&gssctxt, 807 mech, authctxt->host)) { 814 if (!ok || mech == NULL) 824 (r = sshpkt_put_u32(ssh, (mech->length) + 2)) != 0 || 826 (r = sshpkt_put_u8(ssh, mech->length)) != 0 || 827 (r = sshpkt_put(ssh, mech->elements, mech->length)) != 0 ||
|
/netbsd-current/external/bsd/openldap/dist/contrib/ldapc++/src/ |
H A D | LDAPConnection.cpp | 63 void LDAPConnection::saslInteractiveBind( const std::string &mech, argument 72 msg = LDAPAsynConnection::saslInteractiveBind(mech, flags, sih, cons);
|
/netbsd-current/crypto/external/bsd/libsaslc/dist/src/ |
H A D | mech_gssapi.c | 52 #include "mech.h" 146 * @param mech mechanism 150 saslc__mech_gssapi_err(OM_uint32 maj_s, OM_uint32 min_s, gss_OID mech) argument 165 mech, &msg_ctx, &maj_error_message); 167 mech, &msg_ctx, &min_error_message);
|
H A D | parser.c | 61 #define SASLC__CONFIG_MECH_DIRECTORY "mech" 354 mech_node->mech->name, SASLC__CONFIG_SUFFIX);
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | ad.c | 132 const char *mech; local 159 ret = tsasl_find_best_mech(peer, vals, &mech); 167 ret = tsasl_select_mech(peer, mech); 191 rc = ldap_sasl_bind_s(ld, dn, mech, &ccred,
|