Searched refs:mechanism (Results 26 - 50 of 180) sorted by relevance

12345678

/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Darcfour_provider.c83 CK_MECHANISM mechanism; local
134 mechanism.mechanism = algos.enc_algo;
135 mechanism.pParameter = NULL;
136 mechanism.ulParameterLen = 0;
138 rv = C_DecryptInit(session, &mechanism, *kptr);
199 CK_MECHANISM mechanism; local
236 mechanism.mechanism = algos.enc_algo;
237 mechanism
[all...]
H A Daes_provider.c277 CK_MECHANISM mechanism; local
325 mechanism.mechanism = algos.enc_algo;
329 mechanism.pParameter = tmp_ivec;
330 mechanism.ulParameterLen = sizeof (tmp_ivec);
332 mechanism.pParameter = ivec->data;
333 mechanism.ulParameterLen = ivec->length;
340 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
729 CK_MECHANISM mechanism; local
773 mechanism
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddig_mgr.c311 switch (mech->mechanism) {
340 ctx->mech.mechanism = mech->mechanism;
354 if (ctx->mech.mechanism == CKM_MD5) {
357 } else if (ctx->mech.mechanism == CKM_SHA_1) {
363 ctx->mech.mechanism = 0;
395 switch (ctx->mech.mechanism) {
428 switch (ctx->mech.mechanism) {
494 switch (ctx->mech.mechanism) {
H A Ddecr_mgr.c88 switch (mech->mechanism) {
125 ctx->mech.mechanism = mech->mechanism;
141 ctx->mech.mechanism = 0;
180 switch (ctx->mech.mechanism) {
H A Dencr_mgr.c88 switch (mech->mechanism) {
124 ctx->mech.mechanism = mech->mechanism;
140 ctx->mech.mechanism = 0;
179 switch (ctx->mech.mechanism) {
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftMAC.c86 switch (pMechanism->mechanism) {
163 rv = mac_init_ctx(session_p, key_p, hmac_ctx, pMechanism->mechanism);
170 session_p->sign.mech.mechanism = pMechanism->mechanism;
173 session_p->verify.mech.mechanism = pMechanism->mechanism;
235 digest_mech.mechanism = CKM_MD5;
301 digest_mech.mechanism = CKM_SHA_1;
341 digest_mech.mechanism = CKM_SHA256;
382 digest_mech.mechanism
465 CK_MECHANISM_TYPE mechanism; local
589 CK_MECHANISM_TYPE mechanism; local
[all...]
H A DsoftAESCrypt.c67 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
71 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
144 * on the mechanism.
164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
171 if (mechanism == CKM_AES_CTR)
176 * for C_Encrypt function with the mechanism CKM_AES_ECB or
180 * mechanism CKM_AES_CBC_PA
502 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]
H A DsoftDESCrypt.c75 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
79 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
166 * on the mechanism.
185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
193 pad_mechanism = (mechanism == CKM_DES_CBC_PAD ||
194 mechanism == CKM_DES3_CBC_PAD);
197 * for C_Encrypt function with the mechanism CKM_DE
501 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]
H A DsoftARCFourCrypt.c78 active_op->mech.mechanism = pMechanism->mechanism;
H A DsoftDigestUtil.c50 * init routine based on the mechanism.
55 * CKR_MECHANISM_INVALID: invalid mechanism type
61 switch (pMechanism->mechanism) {
73 session_p->digest.mech.mechanism = CKM_MD5;
91 session_p->digest.mech.mechanism = CKM_SHA_1;
114 switch (pMechanism->mechanism) {
116 session_p->digest.mech.mechanism = CKM_SHA256;
123 session_p->digest.mech.mechanism = CKM_SHA384;
130 session_p->digest.mech.mechanism = CKM_SHA512;
159 * software provided digest routine based on the mechanism
[all...]
H A DsoftFipsPostUtil.c114 mech.mechanism = CKM_SHA1_RSA_PKCS;
119 mech.mechanism = CKM_DSA_SHA1;
124 mech.mechanism = CKM_ECDSA_SHA1;
H A DsoftEncryptUtil.c95 * encrypt init routine based on the mechanism.
100 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism
101 * CKR_MECHANISM_INVALID: invalid mechanism type
103 * with the specified mechanism
112 switch (pMechanism->mechanism) {
365 * on the mechanism.
376 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
378 switch (mechanism) {
436 ulDataLen, pEncrypted, pulEncryptedLen, mechanism));
495 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
544 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; local
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/
H A Dblowfish.c277 blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
295 if (!BLOWFISH_VALID_MECH(mechanism))
298 if (mechanism->cm_param != NULL &&
299 mechanism->cm_param_len != BLOWFISH_BLOCK_LEN)
303 switch (mechanism->cm_type) {
314 rv = blowfish_common_init_ctx(blowfish_ctx, template, mechanism,
620 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
645 if (!BLOWFISH_VALID_MECH(mechanism))
648 if (mechanism->cm_param_len != 0 &&
649 mechanism
619 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
706 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
796 blowfish_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
856 blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument
[all...]
H A Dmd5_mod.c89 * Context for MD5 mechanism.
113 /* to extract the digest length passed as mechanism parameter */
117 (len) = (uint32_t)*((ulong_t *)(void *)mechanism->cm_param); \
296 md5_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
299 if (mechanism->cm_type != MD5_MECH_INFO_TYPE)
773 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
780 if (mechanism->cm_type != MD5_MECH_INFO_TYPE)
901 md5_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
908 if (mechanism->cm_type != MD5_HMAC_MECH_INFO_TYPE &&
909 mechanism
772 md5_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1109 md5_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1229 md5_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1424 md5_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Dsha1_mod.c71 /* to extract the digest length passed as mechanism parameter */
74 (len) = (uint32_t)*((ulong_t *)(void *)mechanism->cm_param); \
244 sha1_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
247 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE)
722 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
729 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE)
850 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
857 if (mechanism->cm_type != SHA1_HMAC_MECH_INFO_TYPE &&
858 mechanism->cm_type != SHA1_HMAC_GEN_MECH_INFO_TYPE)
896 * Get the mechanism parameter
721 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1057 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1177 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1371 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Dsha2_mod.c69 /* to extract the digest length passed as mechanism parameter */
270 sha2_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
282 PROV_SHA2_CTX(ctx)->sc_mech_type = mechanism->cm_type;
283 SHA2Init(mechanism->cm_type, &PROV_SHA2_CTX(ctx)->sc_sha2_ctx);
781 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
793 SHA2Init(mechanism->cm_type, &sha2_ctx);
820 if (mechanism->cm_type <= SHA256_HMAC_GEN_MECH_INFO_TYPE)
921 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
931 * mechanism
933 switch (mechanism
780 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1163 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1305 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1525 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Drsa.c379 check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key) argument
388 if (!RSA_VALID_MECH(mechanism))
506 rsa_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
514 if ((rv = check_mech_and_key(mechanism, key)) != CRYPTO_SUCCESS)
529 ctxp->mech_type = mechanism->cm_type;
567 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
573 if ((rv = check_mech_and_key(mechanism, key)) != CRYPTO_SUCCESS)
577 return (rsa_encrypt_common(mechanism->cm_type, key, plaintext,
742 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
748 if ((rv = check_mech_and_key(mechanism, ke
566 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
741 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
877 rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1253 rsa_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1457 rsa_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1589 rsa_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/rpc/sec/
H A Dsec_clnt.c121 data->mechanism.length = gd32.mechanism.length;
122 data->mechanism.elements =
123 (caddr_t)(uintptr_t)gd32.mechanism.elements;
136 if (data->mechanism.length >= MINAUTHLEN &&
137 data->mechanism.length <= MAXAUTHLEN) {
138 elements = kmem_alloc(data->mechanism.length, KM_SLEEP);
139 if (!(copyin(data->mechanism.elements, elements,
140 data->mechanism.length))) {
141 data->mechanism
696 sec_clnt_revoke(int rpcflavor, uid_t uid, cred_t *cr, void *mechanism, model_t model) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsKeys.c75 switch (pMechanism->mechanism) {
89 new_objp->mechanism = pMechanism->mechanism;
/opensolaris-onvv-gate/usr/src/uts/common/des/
H A Ddes_crypt.c453 des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
473 /* Check mechanism type and parameter length */
474 switch (mechanism->cm_type) {
479 if (mechanism->cm_param != NULL &&
480 mechanism->cm_param_len != DES_BLOCK_LEN)
492 if (mechanism->cm_param != NULL &&
493 mechanism->cm_param_len != DES_BLOCK_LEN)
505 if ((rv = des_common_init_ctx(des_ctx, template, mechanism, key,
834 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
863 /* Check mechanism typ
833 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
940 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1050 des_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
1179 des_common_init_ctx(des_ctx_t *des_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, des_strength_t strength, int kmflag) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Sign.c37 * framework, that the mechanism is not disabled for the slot
54 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
73 /* Make sure this is not a disabled mechanism */
74 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
215 * the framework, that the mechanism is not disabled for the slot
231 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
251 /* Make sure this is not a disabled mechanism */
252 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
H A Dpkcs11Verify.c37 * framework, that the mechanism is not disabled for the slot
53 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
72 /* Make sure this is not a disabled mechanism */
73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
213 * the framework, that the mechanism is not disabled for the slot
229 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
249 /* Make sure this is not a disabled mechanism */
250 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
/opensolaris-onvv-gate/usr/src/common/crypto/fips/
H A Dfips_des_util.c54 CK_MECHANISM_TYPE mechanism)
85 if ((mechanism == CKM_DES_CBC) || (mechanism == CKM_DES3_CBC)) {
256 * mechanism: CKM_DES_ECB, CKM_DES3_ECB, CKM_DES_CBC, CKM_DES3_CBC
260 * routine based on the mechanism.
267 CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism)
272 ulong_t *pulEncryptedLen, des_mech_type_t mechanism)
282 * with the mechanism CKM_DES<n>_ECB or CKM_DES<n>_CBC.
297 switch (mechanism) {
320 if (mechanism
53 des_build_context(uint8_t *key, uint8_t *iv, CK_KEY_TYPE key_type, CK_MECHANISM_TYPE mechanism) argument
265 fips_des_encrypt(soft_des_ctx_t *soft_des_ctx, CK_BYTE_PTR in_buf, CK_ULONG ulDataLen, CK_BYTE_PTR out_buf, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
389 fips_des_decrypt(soft_des_ctx_t *soft_des_ctx, CK_BYTE_PTR in_buf, CK_ULONG ulEncryptedLen, CK_BYTE_PTR out_buf, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Task/
H A DTask.xs28 # defined using this mechanism are eligible for inlining by the perl
/opensolaris-onvv-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c262 CK_MECHANISM mechanism; local
288 mechanism.mechanism = CKM_MD5;
289 mechanism.pParameter = 0;
290 mechanism.ulParameterLen = 0;
292 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
296 rv = C_DigestInit(hSession, &mechanism);

Completed in 194 milliseconds

12345678