/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 83 CK_MECHANISM mechanism; local 134 mechanism.mechanism = algos.enc_algo; 135 mechanism.pParameter = NULL; 136 mechanism.ulParameterLen = 0; 138 rv = C_DecryptInit(session, &mechanism, *kptr); 199 CK_MECHANISM mechanism; local 236 mechanism.mechanism = algos.enc_algo; 237 mechanism [all...] |
H A D | aes_provider.c | 277 CK_MECHANISM mechanism; local 325 mechanism.mechanism = algos.enc_algo; 329 mechanism.pParameter = tmp_ivec; 330 mechanism.ulParameterLen = sizeof (tmp_ivec); 332 mechanism.pParameter = ivec->data; 333 mechanism.ulParameterLen = ivec->length; 340 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 729 CK_MECHANISM mechanism; local 773 mechanism [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | dig_mgr.c | 311 switch (mech->mechanism) { 340 ctx->mech.mechanism = mech->mechanism; 354 if (ctx->mech.mechanism == CKM_MD5) { 357 } else if (ctx->mech.mechanism == CKM_SHA_1) { 363 ctx->mech.mechanism = 0; 395 switch (ctx->mech.mechanism) { 428 switch (ctx->mech.mechanism) { 494 switch (ctx->mech.mechanism) {
|
H A D | decr_mgr.c | 88 switch (mech->mechanism) { 125 ctx->mech.mechanism = mech->mechanism; 141 ctx->mech.mechanism = 0; 180 switch (ctx->mech.mechanism) {
|
H A D | encr_mgr.c | 88 switch (mech->mechanism) { 124 ctx->mech.mechanism = mech->mechanism; 140 ctx->mech.mechanism = 0; 179 switch (ctx->mech.mechanism) {
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softMAC.c | 86 switch (pMechanism->mechanism) { 163 rv = mac_init_ctx(session_p, key_p, hmac_ctx, pMechanism->mechanism); 170 session_p->sign.mech.mechanism = pMechanism->mechanism; 173 session_p->verify.mech.mechanism = pMechanism->mechanism; 235 digest_mech.mechanism = CKM_MD5; 301 digest_mech.mechanism = CKM_SHA_1; 341 digest_mech.mechanism = CKM_SHA256; 382 digest_mech.mechanism 465 CK_MECHANISM_TYPE mechanism; local 589 CK_MECHANISM_TYPE mechanism; local [all...] |
H A D | softAESCrypt.c | 67 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 71 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 144 * on the mechanism. 164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 171 if (mechanism == CKM_AES_CTR) 176 * for C_Encrypt function with the mechanism CKM_AES_ECB or 180 * mechanism CKM_AES_CBC_PA 502 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |
H A D | softDESCrypt.c | 75 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 79 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 166 * on the mechanism. 185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 193 pad_mechanism = (mechanism == CKM_DES_CBC_PAD || 194 mechanism == CKM_DES3_CBC_PAD); 197 * for C_Encrypt function with the mechanism CKM_DE 501 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |
H A D | softARCFourCrypt.c | 78 active_op->mech.mechanism = pMechanism->mechanism;
|
H A D | softDigestUtil.c | 50 * init routine based on the mechanism. 55 * CKR_MECHANISM_INVALID: invalid mechanism type 61 switch (pMechanism->mechanism) { 73 session_p->digest.mech.mechanism = CKM_MD5; 91 session_p->digest.mech.mechanism = CKM_SHA_1; 114 switch (pMechanism->mechanism) { 116 session_p->digest.mech.mechanism = CKM_SHA256; 123 session_p->digest.mech.mechanism = CKM_SHA384; 130 session_p->digest.mech.mechanism = CKM_SHA512; 159 * software provided digest routine based on the mechanism [all...] |
H A D | softFipsPostUtil.c | 114 mech.mechanism = CKM_SHA1_RSA_PKCS; 119 mech.mechanism = CKM_DSA_SHA1; 124 mech.mechanism = CKM_ECDSA_SHA1;
|
H A D | softEncryptUtil.c | 95 * encrypt init routine based on the mechanism. 100 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism 101 * CKR_MECHANISM_INVALID: invalid mechanism type 103 * with the specified mechanism 112 switch (pMechanism->mechanism) { 365 * on the mechanism. 376 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 378 switch (mechanism) { 436 ulDataLen, pEncrypted, pulEncryptedLen, mechanism)); 495 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local 544 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 277 blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 295 if (!BLOWFISH_VALID_MECH(mechanism)) 298 if (mechanism->cm_param != NULL && 299 mechanism->cm_param_len != BLOWFISH_BLOCK_LEN) 303 switch (mechanism->cm_type) { 314 rv = blowfish_common_init_ctx(blowfish_ctx, template, mechanism, 620 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 645 if (!BLOWFISH_VALID_MECH(mechanism)) 648 if (mechanism->cm_param_len != 0 && 649 mechanism 619 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 706 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 796 blowfish_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 856 blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument [all...] |
H A D | md5_mod.c | 89 * Context for MD5 mechanism. 113 /* to extract the digest length passed as mechanism parameter */ 117 (len) = (uint32_t)*((ulong_t *)(void *)mechanism->cm_param); \ 296 md5_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 299 if (mechanism->cm_type != MD5_MECH_INFO_TYPE) 773 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 780 if (mechanism->cm_type != MD5_MECH_INFO_TYPE) 901 md5_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 908 if (mechanism->cm_type != MD5_HMAC_MECH_INFO_TYPE && 909 mechanism 772 md5_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 1109 md5_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1229 md5_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1424 md5_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | sha1_mod.c | 71 /* to extract the digest length passed as mechanism parameter */ 74 (len) = (uint32_t)*((ulong_t *)(void *)mechanism->cm_param); \ 244 sha1_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 247 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE) 722 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 729 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE) 850 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 857 if (mechanism->cm_type != SHA1_HMAC_MECH_INFO_TYPE && 858 mechanism->cm_type != SHA1_HMAC_GEN_MECH_INFO_TYPE) 896 * Get the mechanism parameter 721 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 1057 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1177 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1371 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | sha2_mod.c | 69 /* to extract the digest length passed as mechanism parameter */ 270 sha2_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 282 PROV_SHA2_CTX(ctx)->sc_mech_type = mechanism->cm_type; 283 SHA2Init(mechanism->cm_type, &PROV_SHA2_CTX(ctx)->sc_sha2_ctx); 781 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 793 SHA2Init(mechanism->cm_type, &sha2_ctx); 820 if (mechanism->cm_type <= SHA256_HMAC_GEN_MECH_INFO_TYPE) 921 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 931 * mechanism 933 switch (mechanism 780 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 1163 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1305 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1525 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | rsa.c | 379 check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key) argument 388 if (!RSA_VALID_MECH(mechanism)) 506 rsa_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 514 if ((rv = check_mech_and_key(mechanism, key)) != CRYPTO_SUCCESS) 529 ctxp->mech_type = mechanism->cm_type; 567 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 573 if ((rv = check_mech_and_key(mechanism, key)) != CRYPTO_SUCCESS) 577 return (rsa_encrypt_common(mechanism->cm_type, key, plaintext, 742 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 748 if ((rv = check_mech_and_key(mechanism, ke 566 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 741 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 877 rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1253 rsa_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1457 rsa_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1589 rsa_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 121 data->mechanism.length = gd32.mechanism.length; 122 data->mechanism.elements = 123 (caddr_t)(uintptr_t)gd32.mechanism.elements; 136 if (data->mechanism.length >= MINAUTHLEN && 137 data->mechanism.length <= MAXAUTHLEN) { 138 elements = kmem_alloc(data->mechanism.length, KM_SLEEP); 139 if (!(copyin(data->mechanism.elements, elements, 140 data->mechanism.length))) { 141 data->mechanism 696 sec_clnt_revoke(int rpcflavor, uid_t uid, cred_t *cr, void *mechanism, model_t model) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsKeys.c | 75 switch (pMechanism->mechanism) { 89 new_objp->mechanism = pMechanism->mechanism;
|
/opensolaris-onvv-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 453 des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 473 /* Check mechanism type and parameter length */ 474 switch (mechanism->cm_type) { 479 if (mechanism->cm_param != NULL && 480 mechanism->cm_param_len != DES_BLOCK_LEN) 492 if (mechanism->cm_param != NULL && 493 mechanism->cm_param_len != DES_BLOCK_LEN) 505 if ((rv = des_common_init_ctx(des_ctx, template, mechanism, key, 834 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 863 /* Check mechanism typ 833 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 940 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1050 des_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 1179 des_common_init_ctx(des_ctx_t *des_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, des_strength_t strength, int kmflag) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Sign.c | 37 * framework, that the mechanism is not disabled for the slot 54 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 73 /* Make sure this is not a disabled mechanism */ 74 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { 215 * the framework, that the mechanism is not disabled for the slot 231 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 251 /* Make sure this is not a disabled mechanism */ 252 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
|
H A D | pkcs11Verify.c | 37 * framework, that the mechanism is not disabled for the slot 53 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 72 /* Make sure this is not a disabled mechanism */ 73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { 213 * the framework, that the mechanism is not disabled for the slot 229 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 249 /* Make sure this is not a disabled mechanism */ 250 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
|
/opensolaris-onvv-gate/usr/src/common/crypto/fips/ |
H A D | fips_des_util.c | 54 CK_MECHANISM_TYPE mechanism) 85 if ((mechanism == CKM_DES_CBC) || (mechanism == CKM_DES3_CBC)) { 256 * mechanism: CKM_DES_ECB, CKM_DES3_ECB, CKM_DES_CBC, CKM_DES3_CBC 260 * routine based on the mechanism. 267 CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) 272 ulong_t *pulEncryptedLen, des_mech_type_t mechanism) 282 * with the mechanism CKM_DES<n>_ECB or CKM_DES<n>_CBC. 297 switch (mechanism) { 320 if (mechanism 53 des_build_context(uint8_t *key, uint8_t *iv, CK_KEY_TYPE key_type, CK_MECHANISM_TYPE mechanism) argument 265 fips_des_encrypt(soft_des_ctx_t *soft_des_ctx, CK_BYTE_PTR in_buf, CK_ULONG ulDataLen, CK_BYTE_PTR out_buf, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument 389 fips_des_decrypt(soft_des_ctx_t *soft_des_ctx, CK_BYTE_PTR in_buf, CK_ULONG ulEncryptedLen, CK_BYTE_PTR out_buf, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Task/ |
H A D | Task.xs | 28 # defined using this mechanism are eligible for inlining by the perl
|
/opensolaris-onvv-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 262 CK_MECHANISM mechanism; local 288 mechanism.mechanism = CKM_MD5; 289 mechanism.pParameter = 0; 290 mechanism.ulParameterLen = 0; 292 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); 296 rv = C_DigestInit(hSession, &mechanism);
|