Searched refs:mech (Results 51 - 75 of 81) sorted by relevance

1234

/netbsd-current/external/bsd/openldap/dist/libraries/libldap/
H A Dcyrus.c449 const char *mech; local
598 mech = NULL;
609 &mech );
611 if( pmech == NULL && mech != NULL ) {
612 pmech = mech;
613 *rmech = mech;
658 mech = *rmech;
659 if ( rc == LDAP_SUCCESS && mech == NULL ) {
710 rc = ldap_sasl_bind( ld, dn, mech, &ccred, sctrls, cctrls, msgid );
H A Dvc.c336 LDAP_CONST char *mech,
356 assert(!mech);
333 ldap_verify_credentials_interactive( LDAP *ld, LDAP_CONST char *dn, LDAP_CONST char *mech, LDAPControl **vcControls, LDAPControl **serverControls, LDAPControl **clientControls, unsigned flags, LDAP_SASL_INTERACT_PROC *proc, void *defaults, void *context; LDAPMessage *result, const char **rmech, int *msgid ) argument
H A Dgssapi.c53 gss_OID mech,
72 gss_oid_to_str(&min2, mech, &mech_msg);
75 mech, &msg_ctx, &gss_msg);
77 mech, &msg_ctx, &minor_msg);
79 snprintf(buf, buf_len, "gss_rc[%d:%*s] mech[%*s] minor[%u:%*s]",
357 gss_OID mech,
364 gsserrstr( msg, sizeof(msg), mech, gss_rc, minor_status ));
50 gsserrstr( char *buf, ber_len_t buf_len, gss_OID mech, int gss_rc, OM_uint32 minor_status ) argument
355 map_gsserr2ldap( LDAP *ld, gss_OID mech, int gss_rc, OM_uint32 minor_status ) argument
/netbsd-current/external/bsd/openldap/dist/servers/lloadd/
H A Dbind.c199 struct berval binddn, auth, mech = BER_BVNULL; local
314 if ( ber_get_stringbv( copy, &mech, LBER_BV_NOTERM ) == LBER_ERROR ) {
317 if ( !ber_bvcmp( &mech, &mech_external ) ) {
331 ber_dupbv( &client->c_sasl_bind_mech, &mech );
332 } else if ( ber_bvcmp( &mech, &client->c_sasl_bind_mech ) ) {
333 ber_bvreplace( &client->c_sasl_bind_mech, &mech );
468 if ( BER_BVISNULL( &mech ) ) {
473 } else if ( ber_bvcmp( &upstream->c_sasl_bind_mech, &mech ) ) {
474 ber_bvreplace( &upstream->c_sasl_bind_mech, &mech );
H A Dupstream.c288 const char *mech = NULL; local
359 &mech );
369 ber_str2bv( mech, 0, 0, &c->c_sasl_bind_mech );
394 "connid=%lu mech=%s setting up a new SASL security layer\n",
403 "connid=%lu next step for SASL bind mech=%s rc=%d\n",
/netbsd-current/external/bsd/openldap/dist/servers/slapd/
H A Dslapcommon.h81 #define mech tool_globals.tv_mech macro
H A Dslapauth.c102 conn.c_sasl_bind_mech = mech;
H A Dsasl.c739 * ignore it, some other mech will process it.
776 * The SASL EXTERNAL mech is backwards from all the other mechs,
1630 "==> sasl_bind: dn=\"%s\" mech=%s datalen=%ld\n",
1642 #define START( ctx, mech, cred, clen, resp, rlen, err ) \
1643 sasl_server_start( ctx, mech, cred, clen, resp, rlen )
1882 struct berval dn2, *mech; local
1914 mech = &conn->c_sasl_bind_mech;
1916 mech = &conn->c_authmech;
1925 if( bvmatch( mech, &ext_bv )) {
1987 if ( !BER_BVISNULL( mech ) ) {
[all...]
/netbsd-current/external/ibm-public/postfix/dist/src/xsasl/
H A Dxsasl_cyrus_server.c117 #define SASL_SERVER_START(conn, mech, clin, clinlen, srvout, srvoutlen, err) \
118 sasl_server_start(conn, mech, clin, clinlen, srvout, srvoutlen, err)
134 #define SASL_SERVER_START(conn, mech, clin, clinlen, srvout, srvoutlen, err) \
135 sasl_server_start(conn, mech, clin, clinlen, srvout, srvoutlen)
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/
H A Dpkcs11rsa_link.c61 CK_MECHANISM mech = { 0, NULL, 0 }; local
225 mech.mechanism = CKM_SHA1_RSA_PKCS;
228 mech.mechanism = CKM_SHA256_RSA_PKCS;
231 mech.mechanism = CKM_SHA512_RSA_PKCS;
237 PK11_RET(pkcs_C_SignInit, (pk11_ctx->session, &mech, pk11_ctx->object),
280 CK_MECHANISM mech = { 0, NULL, 0 }; local
384 mech.mechanism = CKM_SHA1_RSA_PKCS;
387 mech.mechanism = CKM_SHA256_RSA_PKCS;
390 mech.mechanism = CKM_SHA512_RSA_PKCS;
397 (pk11_ctx->session, &mech, pk11_ct
555 CK_MECHANISM mech = { 0, NULL, 0 }; local
670 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local
902 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local
1091 CK_MECHANISM mech = { CKM_RSA_PKCS_KEY_PAIR_GEN, NULL, 0 }; local
[all...]
H A Dpkcs11ecdsa_link.c78 CK_MECHANISM mech = { 0, NULL, 0 }; local
89 mech.mechanism = CKM_SHA256;
91 mech.mechanism = CKM_SHA384;
107 PK11_RET(pkcs_C_DigestInit, (pk11_ctx->session, &mech), ISC_R_FAILURE);
158 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local
244 (pk11_ctx->session, &mech,
281 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local
349 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey),
469 CK_MECHANISM mech = { CKM_EC_KEY_PAIR_GEN, NULL, 0 }; local
525 (pk11_ctx->session, &mech, pubTemplat
[all...]
H A Dpkcs11eddsa_link.c119 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local
213 (pk11_ctx->session, &mech,
254 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local
321 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey),
442 CK_MECHANISM mech = { CKM_EC_EDWARDS_KEY_PAIR_GEN, NULL, 0 }; local
498 (pk11_ctx->session, &mech, pubTemplate, (CK_ULONG)6,
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/spnego/
H A Dcred_stubs.c159 sname ? &sname->mech : NULL,
203 sname ? &sname->mech : NULL,
H A Daccept_sec_context.c68 acceptor_approved(gss_name_t target_name, gss_OID mech) argument
78 gss_add_oid_set_member(&junk, mech, &oidset);
615 /* Call glue layer to find first mech we support */
664 name->mech = ctx->mech_src_name;
852 name->mech = ctx->mech_src_name;
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/gssapi/
H A Dgssapi.h958 * mech option
962 gss_mo_set(gss_const_OID mech, gss_const_OID option,
966 gss_mo_get(gss_const_OID mech, gss_const_OID option, gss_buffer_t value);
969 gss_mo_list(gss_const_OID mech, gss_OID_set *options);
972 gss_mo_name(gss_const_OID mech, gss_const_OID options, gss_buffer_t name);
975 * SASL glue functions and mech inquire
999 gss_const_OID mech,
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/ipc/
H A Dserver.c48 void *mech; member in struct:heim_sipc
332 ctx->mech = s;
343 struct mach_service *st = sctx->mech;
360 struct mach_service *s = ctx->mech;
1045 struct client *c = ctx->mech;
1077 ct->mech = c;
1129 struct client *c = (*ctx)->mech;
/netbsd-current/external/bsd/openldap/dist/contrib/slapd-modules/passwd/totp/
H A Dslapd-totp.c121 "DESC 'last successful authentication using any method/mech' "
383 const void *mech)
405 do_hmac(mech, key, &data, &digval);
428 const void *mech,
491 generate(&key, t, DIGITS, &out, mech);
507 generate(&key, t - 1, DIGITS, &out, mech);
525 const void *mech)
561 rc_otp = chk_totp(&passwd_otp, &cred_otp, mech, text);
378 generate( myval *key, uint64_t tval, int digits, myval *out, const void *mech) argument
425 chk_totp( const struct berval *passwd, const struct berval *cred, const void *mech, const char **text) argument
520 chk_totp_and_pw( const struct berval *scheme, const struct berval *passwd, const struct berval *cred, const char **text, const void *mech) argument
/netbsd-current/crypto/external/bsd/heimdal/include/
H A Dgsskrb5-private.h78 const gss_OID mech );
85 const gss_OID /*mech*/);
92 const gss_OID mech );
108 const gss_OID /*mech*/);
196 gss_OID /*mech*/);
464 const gss_OID /*mech*/);
472 const gss_OID mech );
655 const gss_OID /*mech*/);
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Dgsskrb5-private.h81 const gss_OID mech );
88 const gss_OID /*mech*/);
95 const gss_OID mech );
111 const gss_OID /*mech*/);
199 gss_OID /*mech*/);
467 const gss_OID /*mech*/);
475 const gss_OID mech );
658 const gss_OID /*mech*/);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dssh-pkcs11.c350 CK_MECHANISM mech; local
393 memset(&mech, 0, sizeof(mech));
394 mech.mechanism = mech_type;
395 mech.pParameter = NULL_PTR;
396 mech.ulParameterLen = 0;
398 if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) {
1320 CK_MECHANISM mech = { local
1358 if ((rv = f->C_GenerateKeyPair(session, &mech, tpub, npub, tpriv, npriv,
1427 CK_MECHANISM mech local
[all...]
H A Dsshconnect2.c792 gss_OID mech = NULL; local
803 mech = &authctxt->gss_supported_mechs->
806 if (mech->length < 128 && ssh_gssapi_check_mechanism(&gssctxt,
807 mech, authctxt->host)) {
814 if (!ok || mech == NULL)
824 (r = sshpkt_put_u32(ssh, (mech->length) + 2)) != 0 ||
826 (r = sshpkt_put_u8(ssh, mech->length)) != 0 ||
827 (r = sshpkt_put(ssh, mech->elements, mech->length)) != 0 ||
/netbsd-current/external/bsd/openldap/dist/contrib/ldapc++/src/
H A DLDAPConnection.cpp63 void LDAPConnection::saslInteractiveBind( const std::string &mech, argument
72 msg = LDAPAsynConnection::saslInteractiveBind(mech, flags, sih, cons);
/netbsd-current/crypto/external/bsd/libsaslc/dist/src/
H A Dmech_gssapi.c52 #include "mech.h"
146 * @param mech mechanism
150 saslc__mech_gssapi_err(OM_uint32 maj_s, OM_uint32 min_s, gss_OID mech) argument
165 mech, &msg_ctx, &maj_error_message);
167 mech, &msg_ctx, &min_error_message);
H A Dparser.c61 #define SASLC__CONFIG_MECH_DIRECTORY "mech"
354 mech_node->mech->name, SASLC__CONFIG_SUFFIX);
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/
H A Dad.c132 const char *mech; local
159 ret = tsasl_find_best_mech(peer, vals, &mech);
167 ret = tsasl_select_mech(peer, mech);
191 rc = ldap_sasl_bind_s(ld, dn, mech, &ccred,

Completed in 339 milliseconds

1234