/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | key_mgr.c | 60 CK_MECHANISM * mech, 76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) { 116 switch (mech->mechanism) { 145 switch (mech->mechanism) { 234 CK_MECHANISM * mech, 280 switch (mech->mechanism) { 318 switch (mech->mechanism) { 332 rc = encr_mgr_init(sess, ctx, OP_WRAP, mech, h_wrapping_key); 350 CK_MECHANISM * mech, 381 switch (mech 59 key_mgr_generate_key_pair(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * publ_tmpl, CK_ULONG publ_count, CK_ATTRIBUTE * priv_tmpl, CK_ULONG priv_count, CK_OBJECT_HANDLE * publ_key_handle, CK_OBJECT_HANDLE * priv_key_handle) argument 232 key_mgr_wrap_key(SESSION * sess, CK_BBOOL length_only, CK_MECHANISM * mech, CK_OBJECT_HANDLE h_wrapping_key, CK_OBJECT_HANDLE h_key, CK_BYTE * wrapped_key, CK_ULONG * wrapped_key_len) argument 349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument [all...] |
H A D | mech_md5.c | 344 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL) { 345 hmac_len = *(CK_ULONG *)ctx->mech.pParameter; 500 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL) 501 hmac_len = *(CK_ULONG *)ctx->mech.pParameter; 507 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
|
H A D | mech_sha.c | 78 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL) { 79 hmac_len = *(CK_ULONG *)ctx->mech.pParameter; 230 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL) 231 hmac_len = *(CK_ULONG *)ctx->mech.pParameter; 237 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/ |
H A D | ssh-gss.c | 98 gss_OID mech; local 106 mech = &mechs->elements[i]; 107 ssh_gssapi_encode_oid_for_kex((const gss_OID)mech, 147 ssh_gssapi_mech_oid_to_kexname(const gss_OID mech, char **kexname) argument 151 if (mech == GSS_C_NULL_OID || !kexname) 157 if (mech->length == (*p)->oid->length && 158 memcmp(mech->elements, (*p)->oid->elements, 159 mech->length) == 0) 167 ssh_gssapi_encode_oid_for_kex(mech, kexname); 171 ssh_gssapi_oid_of_kexname(const char *kexname, gss_OID *mech) argument 548 gss_OID mech = GSS_C_NULL_OID; local 616 ssh_gssapi_build_ctx(Gssctxt **ctx, int client, gss_OID mech) argument [all...] |
H A D | kexgssc.c | 61 gss_OID mech = GSS_C_NULL_OID; local 78 /* Map the negotiated kex name to a mech OID */ 79 ssh_gssapi_oid_of_kexname(kex->name, &mech); 80 if (mech == GSS_C_NULL_OID) 83 ssh_gssapi_build_ctx(&ctxt, 1, mech);
|
/opensolaris-onvv-gate/usr/src/pkg/manifests/ |
H A D | service-security-gss.mf | 42 file path=etc/gss/mech group=sys original_name=SUNWgssc:etc/gss/mech \ 55 # etc/gss/mech file.
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 102 CK_RV SUNW_C_GetMechSession(CK_MECHANISM_TYPE mech, 110 CK_MECHANISM_TYPE mech, const void *rawkey, size_t rawkey_len,
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softMAC.c | 170 session_p->sign.mech.mechanism = pMechanism->mechanism; 173 session_p->verify.mech.mechanism = pMechanism->mechanism; 188 soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) 192 switch (mech) { 361 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 402 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 443 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 475 mechanism = session_p->sign.mech.mechanism; 493 mechanism = session_p->verify.mech.mechanism; 599 mechanism = session_p->sign.mech 187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) argument 670 sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *ctx, uint64_t *ipad, uint64_t *opad, uint_t blocks_per_int64, uint_t block_size) argument [all...] |
H A D | softARCFourCrypt.c | 78 active_op->mech.mechanism = pMechanism->mechanism;
|
H A D | softVerifyUtil.c | 135 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; 259 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; 326 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; 443 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism;
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context_establish.c | 368 gss_OID* mech, /* Returned mechanism */ 396 if (mech) 397 *mech = GSS_C_NO_OID; 428 if (*minor = __get_ap_token(input, dhctx->mech, &token, &sig)) { 551 if (mech) 552 *mech = dhctx->mech; 645 stat = __make_ap_token(result, dhctx->mech, &token, &ukeys); 664 dh_context_t cntx, /* Diffie-Hellman mech context */ 894 gss_OID mech, /* Th 360 __dh_gss_accept_sec_context(void *ctx, OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument 889 __dh_gss_init_sec_context(void *ctx, OM_uint32 *minor, gss_cred_id_t cred, gss_ctx_id_t *context, gss_name_t target, gss_OID mech, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t channel, gss_buffer_t input_token, gss_OID *mech_rec, gss_buffer_t output_token, OM_uint32 *flags_rec, OM_uint32 *time_rec ) argument [all...] |
H A D | context.c | 186 gss_OID *mech, /* return OID of mechanism */ 202 /* If the caller wants the mechanism OID set *mech to if we can */ 203 if (mech) { 205 *mech = GSS_C_NO_OID; 209 *mech = ((dh_context_t)ctx)->mech; 180 __dh_gss_inquire_context(void *ctx, OM_uint32 *minor, gss_ctx_id_t context, gss_name_t *initiator, gss_name_t *acceptor, OM_uint32 *time_rec, gss_OID *mech, OM_uint32 *flags_rec, int *local, int *open ) argument
|
/opensolaris-onvv-gate/usr/src/lib/libgss/ |
H A D | g_initialize.c | 40 * (i.e. the mech oid and mech name will not be updated) 61 #define MECH_CONF "/etc/gss/mech" 111 * the list also maintains state of the mech libraries (loaded or not). 151 if (aMech->mech && aMech->mech->gss_internal_release_oid) { 152 major = aMech->mech->gss_internal_release_oid( 153 aMech->mech->context, 157 map_error(minor_status, aMech->mech); 173 * a mech oi [all...] |
H A D | gssd_pname_to_uid.c | 163 "%s: mech provided local name" 343 "%s: mech provided local name" 502 gss_mechanism mech; local 521 mech = __gss_get_mechanism(mech_type); 524 * if this is a MN, then try using the mech 527 mech = __gss_get_mechanism(intName->mech_type); 530 if (mech == NULL || mech->pname_to_uid == NULL) 545 major = mech->pname_to_uid(mech [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaMechManager.c | 224 rv = meta_mechManager_update_mech(mech_support_info->mech, 232 found = find_mech_index(mech_support_info->mech, &index); 282 meta_mechManager_update_mech(CK_MECHANISM_TYPE mech, boolean_t force_refresh) argument 290 rv = meta_mechManager_allocmechs(&mech, 1, &index); 300 found = find_mech_index(mech, &index); 310 rv = update_slotmech(mech, slot, index); 445 update_slotmech(CK_MECHANISM_TYPE mech, CK_ULONG slotnum, argument 461 if (pkcs11_is_dismech(fw_st_id, mech)) { 473 rv = FUNCLIST(fw_st_id)->C_GetMechanismInfo(true_id, mech, &info); 509 /* The optimistic assumption is that the mech i [all...] |
H A D | metaUtil.c | 125 CK_MECHANISM mech; local 128 mech = *pMechanism; 132 mech.pParameter = 134 if (mech.pParameter == NULL) { 137 (void) memcpy(mech.pParameter, 141 mech.pParameter = NULL; 142 mech.ulParameterLen = 0; 148 &mech, key); 149 if (mech.pParameter != NULL) { 150 free(mech 342 CK_MECHANISM mech; local [all...] |
H A D | pkcs11SUNWExtensions.c | 93 * It matches the given mech type (in args) with the slot's mech info. 101 CK_MECHANISM_TYPE mech = (CK_MECHANISM_TYPE)args; local 104 return (C_GetMechanismInfo(slot_id, mech, &mech_info) == CKR_OK); 199 SUNW_C_GetMechSession(CK_MECHANISM_TYPE mech, CK_SESSION_HANDLE_PTR hSession) argument 204 * return (pkcs11_GetCriteriaSession(match_mech, (void *)mech, 253 if (C_GetMechanismInfo(slot_id, mech, &mech_info) == CKR_OK) { 277 SUNW_C_KeyToObject(CK_SESSION_HANDLE hSession, CK_MECHANISM_TYPE mech, argument 304 if (mech == asymmetric_mechs[i]) { 323 if ((rv = pkcs11_mech2keytype(mech, [all...] |
/opensolaris-onvv-gate/usr/src/cmd/ssh/include/ |
H A D | ssh-gss.h | 95 /* Functions to get supported mech lists */ 105 void ssh_gssapi_mech_oid_to_kexname(const gss_OID mech, char **kexname); 109 void ssh_gssapi_oid_of_kexname(const char *kexname, gss_OID *mech); 137 void ssh_gssapi_build_ctx(Gssctxt **ctx, int client, gss_OID mech);
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/sshd/ |
H A D | gss-serv.c | 188 /* Let it slide as long as the mech is supported */ 318 if (ssh_gssapi_is_krb5(ctx->mech)) 323 if (ssh_gssapi_is_gsi(ctx->mech)) 456 if (ssh_gssapi_is_krb5(ctx->mech)) 461 if (ssh_gssapi_is_gsi(ctx->mech)) 506 if (ssh_gssapi_is_krb5(ctx->mech)) 511 if (ssh_gssapi_is_gsi(ctx->mech))
|
/opensolaris-onvv-gate/usr/src/uts/common/inet/kssl/ |
H A D | kssl.c | 378 mech_to_cipher_tab[0].mech = rsa_x509_mech.cm_type = 380 mech_to_cipher_tab[1].mech = hmac_md5_mech.cm_type = 382 mech_to_cipher_tab[2].mech = hmac_sha1_mech.cm_type = 385 mech_to_cipher_tab[3].mech = cipher_defs[cipher_rc4].mech_type = 387 mech_to_cipher_tab[4].mech = cipher_defs[cipher_des].mech_type = 389 mech_to_cipher_tab[5].mech = cipher_defs[cipher_3des].mech_type = 391 mech_to_cipher_tab[6].mech = cipher_defs[cipher_aes128].mech_type = 452 if (mc->mech == CRYPTO_MECH_INVALID)
|
/opensolaris-onvv-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_miscapi.c | 92 * . countp: pointer to contain the number of mech names returned 100 * We get a list of mech names which have a hardware provider by walking 101 * all the mechanism tables. We merge them with mech names obtained from 102 * the hint list. A mech name in the hint list is considered only if it 104 * software providers and the mech names supported by them. 156 * mech tabs and mechanisms from the hint list. 282 * . count: the number of mech names in mech_names 488 * . mech: the mechanism to check the key with. 504 crypto_key_check(crypto_mechanism_t *mech, crypto_key_t *key) argument 512 /* when mech i 581 crypto_key_check_prov(crypto_provider_t provider, crypto_mechanism_t *mech, crypto_key_t *key) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 306 int mech; local 311 for (mech = 0; mech < MECH_ALIASES_COUNT; mech++) { 313 if (mech_aliases[mech].available == B_FALSE) 316 (void) printf("%-15s", mech_aliases[mech].alias); 318 if (mech_aliases[mech].keysize_min != UINT_MAX && 319 mech_aliases[mech].keysize_max != 0) 321 (mech_aliases[mech].keysize_min * 322 mech_aliases[mech] 424 CK_MECHANISM mech; local [all...] |
/opensolaris-onvv-gate/usr/src/cmd/gss/etc/ |
H A D | Makefile | 28 GSSTXTS= mech qop gsscred.conf
|
/opensolaris-onvv-gate/usr/src/lib/auditd_plugins/remote/ |
H A D | audit_remote.h | 78 gss_OID mech; /* GSS mechanism - see mech(4) */ member in struct:hostlist_s
|
/opensolaris-onvv-gate/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 253 rpc_gss_mech_to_oid(char *mech, rpc_gss_OID *oid) argument 257 return ((*calls.rpc_gss_mech_to_oid)(mech, oid)); 261 rpc_gss_qop_to_num(char *qop, char *mech, uint_t *num) argument 265 return ((*calls.rpc_gss_qop_to_num)(qop, mech, num));
|