/opensolaris-onvv-gate/usr/src/uts/common/sys/ |
H A D | sha2.h | 86 extern void SHA2Init(uint64_t mech, SHA2_CTX *);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/cryptoadm/ |
H A D | adm_metaslot.c | 285 CK_MECHANISM_TYPE mech = pmech_list[i]; local 287 if (mech >= CKM_VENDOR_DEFINED) { 288 (void) printf("%#lx", mech); 290 (void) printf("%-29s", pkcs11_mech2str(mech)); 296 mech, &mech_info);
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 134 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; 248 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; 315 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; 421 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; 454 switch (active_op->mech.mechanism) {
|
H A D | softSSL.c | 421 soft_ssl_master_key_derive(soft_session_t *sp, CK_MECHANISM_PTR mech, argument 449 mkd_params = (CK_SSL3_MASTER_KEY_DERIVE_PARAMS *)mech->pParameter; 452 mech->ulParameterLen != sizeof (CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) 457 switch (mech->mechanism) { 616 soft_ssl_key_and_mac_derive(soft_session_t *sp, CK_MECHANISM_PTR mech, argument 646 km_params = (CK_SSL3_KEY_MAT_PARAMS *)mech->pParameter; 649 mech->ulParameterLen != sizeof (CK_SSL3_KEY_MAT_PARAMS) || 694 if (mech->mechanism == CKM_SSL3_KEY_AND_MAC_DERIVE) { 752 if (mech->mechanism == CKM_SSL3_KEY_AND_MAC_DERIVE) { 867 soft_ssl_weaken_key(mech, k 1054 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |
H A D | softRSA.c | 236 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 240 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 507 session_p->sign.mech.mechanism = pMechanism->mechanism; 510 session_p->verify.mech.mechanism = pMechanism->mechanism; 968 get_rsa_sha1_prefix(CK_MECHANISM_PTR mech, CK_BYTE_PTR *prefix) { argument 969 if (mech->pParameter == NULL) { 1043 switch (session_p->digest.mech.mechanism) { 1050 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech), 1131 switch (session_p->digest.mech.mechanism) { 1138 der_len = get_rsa_sha1_prefix(&(session_p->digest.mech), [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_wep.c | 325 crypto_mechanism_t mech; local 336 mech.cm_type = crypto_mech2id(SUN_CKM_RC4); 337 mech.cm_param = NULL; 338 mech.cm_param_len = 0; 340 rv = crypto_encrypt_init(&mech, &crkey, NULL, ctx, NULL);
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dummy/mech/ |
H A D | dmech.c | 107 static int g_token_size(gss_OID mech, unsigned int body_size); 108 static void g_make_token_header(gss_OID mech, int body_size, 110 static int g_verify_token_header(gss_OID mech, int *body_size, 1343 g_token_size(mech, body_size) 1344 gss_OID mech; 1348 body_size += 4 + (int)mech->length; /* NEED overflow check */ 1353 g_make_token_header(mech, body_size, buf, tok_type) 1354 gss_OID mech; 1360 der_write_length(buf, 4 + mech->length + body_size); 1362 *(*buf)++ = (unsigned char) mech [all...] |
/opensolaris-onvv-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 656 const char *mech = NULL; local 702 (mech ? mech : ""), 0, 0 ); 710 &mech ); 713 stepnum, (mech ? mech : ""), 0 ); 737 stepnum, (mech ? mech : ""), 0 ); 741 rc = ldap_sasl_bind_s(ld, dn, mech, &ccred, 780 clientstepnum, stepnum, (mech 839 char **values, **v, *mech, *m; local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/ |
H A D | dprov.c | 1941 cmn_err(CE_WARN, "dprov_digest_init: unexpected mech type " 2077 cmn_err(CE_WARN, "dprov_digest_atomic: unexpected mech type " 2132 cmn_err(CE_WARN, "dprov_mac_init: unexpected mech type " 2237 cmn_err(CE_WARN, "dprov_mac_atomic: unexpected mech type " 2272 cmn_err(CE_WARN, "dprov_mac_verify_atomic: unexpected mech " 2353 cmn_err(CE_WARN, "dprov_encrypt_init: unexpected mech type " 2461 cmn_err(CE_WARN, "dprov_encrypt_atomic: unexpected mech type " 2494 cmn_err(CE_WARN, "dprov_decrypt_init: unexpected mech type " 2603 cmn_err(CE_WARN, "dprov_atomic_init: unexpected mech type " 2666 cmn_err(CE_WARN, "dprov_sign_init: unexpected mech typ 4828 dprov_free_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *mech) argument 5411 crypto_mechanism_t mech; local 5528 crypto_mechanism_t mech; local 5644 crypto_mechanism_t mech; local 5864 crypto_mechanism_t mech; local 6122 crypto_mechanism_t mech; local 7791 crypto_mechanism_t mech, *mechp; local 7916 crypto_mechanism_t mech, *mechp; local 8307 crypto_mechanism_t mech, *mechp; local 8445 crypto_mechanism_t mech; local 8704 dprov_get_sw_prov(crypto_mechanism_t *mech, kcf_provider_desc_t **pd, crypto_mech_type_t *provider_mech_type) argument [all...] |
H A D | crypto.c | 2109 STRUCT_DECL(crypto_mechanism, mech); 2116 STRUCT_INIT(mech, mode); 2117 bcopy(in_mech, STRUCT_BUF(mech), STRUCT_SIZE(mech)); 2118 param = STRUCT_FGETP(mech, cm_param); 2119 param_len = STRUCT_FGET(mech, cm_param_len); 2120 out_mech->cm_type = STRUCT_FGET(mech, cm_type); 2531 /* get the provider's mech number */ 2563 /* get the provider's mech number */ 2579 crypto_mechanism_t *mech) 2578 crypto_free_mech(kcf_provider_desc_t *pd, boolean_t allocated_by_crypto_module, crypto_mechanism_t *mech) argument 2609 crypto_mechanism_t mech; local 3191 crypto_mechanism_t mech; local 3858 crypto_mechanism_t mech; local 5309 crypto_mechanism_t mech; local 5435 crypto_mechanism_t mech; local 5571 crypto_mechanism_t mech; local 5729 crypto_mechanism_t mech; local 5919 crypto_mechanism_t mech; local 6078 crypto_mechanism_t mech; local 6246 crypto_mechanism_t mech; local 6404 crypto_mechanism_t mech; local [all...] |
/opensolaris-onvv-gate/exception_lists/ |
H A D | copyright | 192 usr/src/lib/gss_mechs/mech_krb5/mech/add_cred.c 193 usr/src/lib/gss_mechs/mech_krb5/mech/compare_name.c 194 usr/src/lib/gss_mechs/mech_krb5/mech/context_time.c 195 usr/src/lib/gss_mechs/mech_krb5/mech/copy_ccache.c 196 usr/src/lib/gss_mechs/mech_krb5/mech/disp_com_err_status.c 197 usr/src/lib/gss_mechs/mech_krb5/mech/disp_major_status.c 198 usr/src/lib/gss_mechs/mech_krb5/mech/disp_name.c 199 usr/src/lib/gss_mechs/mech_krb5/mech/disp_status.c 200 usr/src/lib/gss_mechs/mech_krb5/mech/export_name.c 201 usr/src/lib/gss_mechs/mech_krb5/mech/export_sec_contex [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/ |
H A D | gssd_clnt_stubs.c | 895 kctx->mech = &default_gc; 927 * in the wrapper context to point to the kernel mech. 929 __kgss_reset_mech(&kctx->mech, *actual_mech_type); 932 * If the mech oid was allocated for us, free it. 1095 * move mech type returned to mech_type 1174 kctx->mech = &default_gc; 1198 __kgss_reset_mech(&kctx->mech, *mech_type); 1201 * If the mech oid was allocated for us, free it. 1515 if (kctx->mech->gss_import_sec_context) { 2740 gss_mechanism mech; local 2832 __kgss_add_mechanism(gss_mechanism mech) argument 2854 gss_mechanism mech; local [all...] |
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/dh1024/ |
H A D | Makefile.com | 48 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | Makefile.com | 48 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/dh640/ |
H A D | Makefile.com | 48 CPPFLAGS += -I../../backend/mech -I../../backend/crypto
|
/opensolaris-onvv-gate/usr/src/lib/libcryptoutil/common/ |
H A D | cryptoutil.h | 182 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech); 183 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech);
|
/opensolaris-onvv-gate/usr/src/uts/common/rpc/ |
H A D | rpcsec_gss.h | 242 char *mech, 249 char *mech,
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSession.h | 41 CK_MECHANISM mech; member in struct:crypto_active_op
|
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_init.c | 148 display_status_1(m, code, type, mech) 152 const gss_OID mech; 163 type, mech, 196 * mech kerberos mech 204 display_status(msg, maj_stat, min_stat, mech) 208 char *mech; 212 if (!rpc_gss_mech_to_oid(mech, (rpc_gss_OID *)&mech_oid)) { 215 "Invalid mechanism oid <%s>"), mech); 317 char mech[] local 530 mech); local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | gssapiP_generic.h | 194 unsigned int g_token_size (const gss_OID_desc * mech, unsigned int body_size); 196 void g_make_token_header (const gss_OID_desc * mech, unsigned int body_size, 199 gss_int32 g_verify_token_header (const gss_OID_desc * mech,
|
/opensolaris-onvv-gate/usr/src/cmd/gss/gsscred/ |
H A D | gsscred.c | 70 *uid = NULL, *comment = NULL, *mech = NULL, local 101 mech = optarg; 128 addUser(userName, nameTypeOID, uid, comment, mech); 132 removeUsers(userName, nameTypeOID, uid, mech); 136 listUsers(userName, nameTypeOID, uid, mech); 370 /* are we retrieving everyone ? or searching by mech ? */ 391 /* Are we searching by uid or uid and mech? */ 517 /* must make the name header whic contains mech oid */ 591 /* are we deleting the entire table or an entire mech ? */ 612 /* are we deleting by uid or uid and mech [all...] |
/opensolaris-onvv-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss.c | 101 __rpc_gss_seccreate(clnt, server_name, mech, service, qop, options_req, 105 char *mech; /* security mechanism */ 125 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num)) { 129 if (!__rpc_gss_mech_to_oid(mech, &mech_type)) { 422 char *mech; local 437 if ((mech = __rpc_gss_oid_to_mech(ap->mech_type)) == NULL) 440 if (!__rpc_gss_qop_to_num(qop, mech, &qop_num))
|
/opensolaris-onvv-gate/usr/src/uts/common/io/ |
H A D | cryptmod.c | 670 crypto_mechanism_t mech; local 673 mech.cm_type = digest_type; 674 mech.cm_param = 0; 675 mech.cm_param_len = 0; 693 rv = crypto_digest(&mech, &d1, &d2, NULL); 731 * the userland kerberos mech. 1119 crypto_mechanism_t mech; local 1150 mech.cm_type = cdata->mech_type; 1151 mech.cm_param = cdata->block; 1156 mech 1179 do_hmac(crypto_mech_type_t mech, crypto_key_t *key, char *data, int datalen, char *hmac, int hmaclen) argument 1252 crypto_mechanism_t mech; local 1412 crypto_mechanism_t mech; local 1761 crypto_mechanism_t mech; local 1993 crypto_mechanism_t mech; local [all...] |
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_spnego/mech/ |
H A D | spnego_mech.c | 302 mech_spnego.mech = &spnego_mechanism; 631 /* determine negotiation mech set */ 652 * need to pull the first mech from mechSet to do first 735 * mech not finished and mech token missing 793 * the old Kerberos mech OID, even though we sent the new one. 794 * So we will treat all the Kerberos mech OIDS as the same. 808 * init_sec_context(). Acceptor sends no mech 816 * Reject missing mech token when optimistic 817 * mech selecte 1655 gss_mechanism mech = NULL; local 2900 put_mech_oid(unsigned char **buf_out, gss_OID_const mech, unsigned int buflen) argument 3744 g_token_size(gss_OID_const mech, unsigned int body_size) argument 3775 g_make_token_header(gss_OID_const mech, unsigned int body_size, unsigned char **buf, unsigned int totallen) argument 3894 g_verify_token_header(gss_OID_const mech, unsigned int *body_size, unsigned char **buf_in, int tok_type, unsigned int toksize) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/keyserv/ |
H A D | setkey.c | 152 struct mechentry mech; member in struct:algtypelist 233 mutex_init(&ap->mech.mech_lock, USYNC_THREAD, NULL); 234 mutex_init(&ap->mech.ps_lock, USYNC_THREAD, NULL); 235 ap->mech.mechdata = NULL; 236 ap->mech.psdata = NULL; 265 debug(KEYSERV_DEBUG0, ("getmechtype return %x", &(*app)->mech)); 266 return (&(*app)->mech); 666 mutex_lock(&ap->mech.mech_lock); 667 if ((mdp = ap->mech.mechdata) == NULL) { 668 mutex_unlock(&ap->mech [all...] |