Searched refs:mech (Results 26 - 50 of 187) sorted by relevance

12345678

/opensolaris-onvv-gate/usr/src/uts/common/crypto/api/
H A Dkcf_keys.c41 crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count,
52 rv = kcf_get_hardware_provider(mech->cm_type, NULL,
62 mech, attrs, count, handle, KCF_SWFP_RHNDL(crq));
66 mech, attrs, count, handle, NULL, 0, NULL, NULL, NULL, 0);
78 crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs,
91 rv = kcf_get_hardware_provider(mech->cm_type, NULL,
100 rv = KCF_PROV_KEY_GENERATE_PAIR(real_provider, sid, mech,
106 sid, mech, pub_attrs, pub_count, pub_handle, pri_attrs,
119 crypto_mechanism_t *mech, crypto_key_t *wrapping_key,
131 rv = kcf_get_hardware_provider(mech
40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *handle, crypto_call_req_t *crq) argument
77 crypto_key_generate_pair(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *pub_attrs, uint_t pub_count, crypto_object_attribute_t *pri_attrs, uint_t pri_count, crypto_object_id_t *pub_handle, crypto_object_id_t *pri_handle, crypto_call_req_t *crq) argument
118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument
157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
198 crypto_key_derive(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *base_key, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *new_key, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_ctxops.c47 * mech: crypto_mechanism_t pointer.
50 * When the mech's parameter is not NULL, its definition depends
73 * RYPTO_MECHANISM_INVALID: invalid mechanism 'mech'.
76 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument
90 if (mech == NULL)
93 error = kcf_get_sw_prov(mech->cm_type, &pd, &me, B_TRUE);
104 prov_mech.cm_type = KCF_TO_PROV_MECHNUM(pd, mech->cm_type);
105 prov_mech.cm_param = mech->cm_param;
106 prov_mech.cm_param_len = mech->cm_param_len;
H A Dkcf_cipher.c51 * CRYPTO_INVALID_MECH for problems with the 'mech'.
71 * mech: crypto_mechanism_t pointer.
74 * When the mech's parameter is not NULL, its definition depends
78 * encryption or decryption with the 'mech' using 'key'.
106 crypto_mechanism_t *mech, crypto_key_t *key,
120 error = kcf_get_hardware_provider(mech->cm_type, key,
124 error = kcf_get_hardware_provider(mech->cm_type, key,
144 lmech = *mech;
145 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, real_provider, &lmech);
164 KCF_CAN_SHARE_OPSTATE(pd, mech
105 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
229 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
445 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
727 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_mac.c51 * CRYPTO_INVALID_MECH for problems with the 'mech'.
67 * mech: crypto_mechanism_t pointer.
70 * When the mech's parameter is not NULL, its definition depends
76 * MAC with the 'mech' using 'key'. 'tmpl' is created by
83 * 'mech', using * the key 'key', on the specified provider with
96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key,
107 rv = kcf_get_hardware_provider(mech->cm_type, key,
115 KCF_WRAP_MAC_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech, key,
129 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, argument
143 if ((pd = kcf_get_mech_provider(mech
95 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
219 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
253 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
371 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
434 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_sign.c47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl,
59 rv = kcf_get_hardware_provider(mech->cm_type, key,
74 KCF_WRAP_SIGN_OPS_PARAMS(&params, KCF_OP_INIT, sid, mech,
91 crypto_sign_init(crypto_mechanism_t *mech, crypto_key_t *key, argument
103 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
129 error = crypto_sign_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl,
228 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data,
240 rv = kcf_get_hardware_provider(mech->cm_type, key,
247 KCF_WRAP_SIGN_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech,
257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_ argument
46 crypto_sign_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
386 crypto_sign_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_verify.c47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl,
59 rv = kcf_get_hardware_provider(mech->cm_type, key,
74 KCF_WRAP_VERIFY_OPS_PARAMS(&params, KCF_OP_INIT, sid, mech,
92 crypto_verify_init(crypto_mechanism_t *mech, crypto_key_t *key, argument
104 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
130 error = crypto_verify_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl,
230 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data,
242 rv = kcf_get_hardware_provider(mech->cm_type, key,
249 KCF_WRAP_VERIFY_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech,
259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_ argument
46 crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
388 crypto_verify_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dverify_mgr.c33 CK_MECHANISM * mech,
70 switch (mech->mechanism) {
161 (CK_MAC_GENERAL_PARAMS *)mech->pParameter;
163 if (mech->ulParameterLen !=
167 if ((mech->mechanism == CKM_MD5_HMAC_GENERAL) &&
171 if ((mech->mechanism == CKM_SHA_1_HMAC_GENERAL) &&
197 ctx->mech.ulParameterLen = mech->ulParameterLen;
198 ctx->mech.mechanism = mech
31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
[all...]
H A Ddig_mgr.c302 CK_MECHANISM *mech)
311 switch (mech->mechanism) {
339 ctx->mech.ulParameterLen = mech->ulParameterLen;
340 ctx->mech.mechanism = mech->mechanism;
341 ctx->mech.pParameter = mech->pParameter;
354 if (ctx->mech.mechanism == CKM_MD5) {
357 } else if (ctx->mech
300 digest_mgr_init(SESSION *sess, DIGEST_CONTEXT *ctx, CK_MECHANISM *mech) argument
[all...]
H A Dsess_mgr.c580 if (sess->encr_ctx.mech.pParameter)
581 free(sess->encr_ctx.mech.pParameter);
586 if (sess->decr_ctx.mech.pParameter)
587 free(sess->decr_ctx.mech.pParameter);
592 if (sess->digest_ctx.mech.pParameter)
593 free(sess->digest_ctx.mech.pParameter);
598 if (sess->sign_ctx.mech.pParameter)
599 free(sess->sign_ctx.mech.pParameter);
604 if (sess->verify_ctx.mech.pParameter)
605 free(sess->verify_ctx.mech
[all...]
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/
H A DMakefile102 mech/krb5_gss_glue.c+
113 < mech/krb5_gss_glue.c > mech/krb5_gss_glue.c+
114 $(MV) mech/krb5_gss_glue.c+ mech/krb5_gss_glue.c
127 mech/krb5_gss_glue.c
134 $(RM) Makefile+ mech/krb5_gss_glue.c+
137 > mech/krb5_gss_glue.c+ < mech/krb5_gss_glue.c
138 $(MV) mech/krb5_gss_glu
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/hash_provider/
H A Dhash_kef_generic.c24 crypto_mechanism_t mech; local
40 mech.cm_type = context->kef_cksum_mt;
41 if (mech.cm_type == CRYPTO_MECH_INVALID) {
43 "k5_ef_hash() invalid mech specified: 0x%llx",
47 mech.cm_param = 0;
48 mech.cm_param_len = 0;
50 rv = crypto_digest_init(&mech, &ctxp, NULL);
97 crypto_mechanism_t mech; local
116 mech.cm_type = context->kef_hash_mt;
117 if (mech
[all...]
/opensolaris-onvv-gate/usr/src/lib/libgss/
H A Dg_userok.c99 gss_mechanism mech; local
115 mech = __gss_get_mechanism(intName->mech_type);
116 if (mech == NULL)
125 if (mech->__gss_userok)
126 major = mech->__gss_userok(mech->context, minor, mechName,
H A Dg_inquire_cred.c54 gss_mechanism mech; local
78 * get_mechanism will return the first mechanism in the mech
82 if ((mech = __gss_get_mechanism(GSS_C_NULL_OID)) == NULL)
85 if (!mech->gss_inquire_cred)
88 status = mech->gss_inquire_cred(mech->context, minor_status,
95 map_error(minor_status, mech);
104 &temp_minor_status, mech,
108 map_error(minor_status, mech);
227 gss_mechanism mech; local
[all...]
H A Dg_accept_sec_context.c122 gss_mechanism mech; local
136 * descriptor to hold the mech type information as well as the
146 /* Get the token mech type */
189 mech = __gss_get_mechanism(token_mech_type);
190 if (mech && mech->gss_accept_sec_context) {
191 status = mech->gss_accept_sec_context(
192 mech->context,
214 map_error(minor_status, mech);
229 &t_minstat, mech,
[all...]
H A Dg_utils.c143 num_str = name; /* will contain mech */
148 qop_num_pairs[qop_num_pair_cnt].mech = strdup(name);
149 if (qop_num_pairs[qop_num_pair_cnt].mech == NULL) {
166 char *mech,
186 if ((strcasecmp(mech, qop_num_pairs[i].mech) == 0) &&
198 char *mech,
215 if (mech == NULL)
222 if ((strcasecmp(mech, qop_num_pairs[i].mech)
164 __gss_qop_to_num( char *qop, char *mech, OM_uint32 *num ) argument
197 __gss_num_to_qop( char *mech, OM_uint32 num, char **qop ) argument
236 __gss_get_mech_info( char *mech, char **qops ) argument
271 __gss_mech_qops( char *mech, qop_num *mechqops, int *numqop ) argument
[all...]
H A Dg_exp_sec_context.c82 gss_mechanism mech; local
97 mech = __gss_get_mechanism(ctx->mech_type);
98 if (!mech)
100 if (!mech->gss_export_sec_context)
103 status = mech->gss_export_sec_context(mech->context, minor_status,
106 map_error(minor_status, mech);
H A Dg_imp_sec_context.c84 gss_mechanism mech; local
134 mech = __gss_get_mechanism(ctx->mech_type);
135 if (!mech) {
139 if (!mech->gss_import_sec_context) {
144 status = mech->gss_import_sec_context(mech->context, minor_status,
151 map_error(minor_status, mech);
H A Dg_inquire_names.c44 gss_mechanism mech; local
67 mech = __gss_get_mechanism(mechanism);
69 if (mech) {
71 if (mech->gss_inquire_names_for_mech) {
72 status = mech->gss_inquire_names_for_mech(
73 mech->context,
78 map_error(minor_status, mech);
H A Dg_acquire_cred_with_pw.c109 gss_mechanism mech; local
140 mech = __gss_get_mechanism(GSS_C_NULL_OID);
141 if (mech == NULL)
147 default_OID.length = mech->mech_type.length;
148 default_OID.elements = mech->mech_type.elements;
163 /* for each requested mech attempt to obtain a credential */
245 gss_mechanism mech; local
280 if ((mech = __gss_get_mechanism(desired_mech)) == NULL)
304 &mech->mech_type))
308 &mech
[all...]
H A Dg_acquire_cred.c152 gss_mechanism mech; local
177 mech = __gss_get_mechanism(NULL);
178 if (mech == NULL)
184 default_OID.length = mech->mech_type.length;
185 default_OID.elements = mech->mech_type.elements;
200 /* for each requested mech attempt to obtain a credential */
335 gss_mechanism mech; local
358 mech = __gss_get_mechanism(desired_mech);
359 if (!mech)
361 else if (!mech
[all...]
H A Dg_init_sec_context.c109 gss_mechanism mech; local
130 mech = __gss_get_mechanism(mech_type);
131 if (mech == NULL)
134 if (mech->gss_init_sec_context == NULL)
138 mech_type = &mech->mech_type;
157 * descriptor to hold the mech type information as well as the
191 status = mech->gss_init_sec_context(
192 mech->context,
214 map_error(minor_status, mech);
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Conf.h42 extern boolean_t pkcs11_is_dismech(CK_SLOT_ID slotid, CK_MECHANISM_TYPE mech);
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh/
H A Dgss-clnt.c68 gss_OID mech; local
109 mech = &acquired->elements[i];
111 if (ssh_gssapi_is_spnego(mech))
114 ssh_gssapi_build_ctx(&ctxt, 1, mech);
131 ssh_gssapi_oid_to_name(mech), errmsg);
138 maj = gss_add_oid_set_member(&min, mech, &supported);
182 NULL, /* actual mech type */
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftFipsPostUtil.c81 CK_MECHANISM mech = {0, NULL, 0}; local
114 mech.mechanism = CKM_SHA1_RSA_PKCS;
119 mech.mechanism = CKM_DSA_SHA1;
124 mech.mechanism = CKM_ECDSA_SHA1;
138 rv = soft_sign_init(session_p, &mech, privateKey);
152 rv = soft_verify_init(session_p, &mech, publicKey);
/opensolaris-onvv-gate/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss_utils.c74 __rpc_gss_mech_to_oid(char *mech, rpc_gss_OID *oid) argument
76 if (__gss_mech_to_oid(mech, (gss_OID*)oid) != GSS_S_COMPLETE)
89 __rpc_gss_qop_to_num(char *qop, char *mech, OM_uint32 *num) argument
91 if (__gss_qop_to_num(qop, mech, num) != GSS_S_COMPLETE)
97 __rpc_gss_num_to_qop(char *mech, OM_uint32 num) argument
101 if (__gss_num_to_qop(mech, num, &qop) != GSS_S_COMPLETE)
144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument
158 if (!__rpc_gss_mech_to_oid(mech, (rpc_gss_OID *) &mech_oid)) {
160 "mech oid");
258 /* Don't know how to get the service type for a given mech
263 __rpc_gss_get_mech_info(char *mech, rpc_gss_service_t *service) argument
296 __rpc_gss_is_installed(char *mech) argument
[all...]

Completed in 137 milliseconds

12345678