/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsEncrypt.c | 37 if (pMechanism->mechanism != CKM_AES_CBC && 38 pMechanism->mechanism != CKM_AES_CBC_PAD) 96 if (active_op->mech.mechanism != CKM_AES_CBC && 97 active_op->mech.mechanism != CKM_AES_CBC_PAD) 143 if (pMechanism->mechanism != CKM_AES_CBC && 144 pMechanism->mechanism != CKM_AES_CBC_PAD) 211 * length depends on the mechanism in use. For secret key mechanisms, 299 * length depends on the mechanism in use. For secret key mechanisms,
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 13 CK_MECHANISM *mechanism, 22 if ((rv = C_DigestInit(krb_ctx_hSession(context), mechanism)) != 12 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Digest.c | 37 * the framework, that the mechanism is not disabled for the slot 53 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 72 /* Make sure this is not a disabled mechanism */ 73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
|
H A D | pkcs11Crypt.c | 37 * the framework, that the mechanism is not disabled for the slot 55 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 74 /* Make sure this is not a disabled mechanism */ 75 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { 220 * the framework, that the mechanism is not disabled for the slot 238 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { 257 /* Make sure this is not a disabled mechanism */ 258 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
|
H A D | metaMechManager.c | 35 * Each element in the array represents a particular mechanism type. The 36 * array is sorted by type, so that searching by mechanism can be done 37 * quickly. Each element also contains the mechanism data for each slot. 155 * Also, it may not be allowed based on the mechanism policy. 202 * Get list of all slots supporting the specified mechanism. 206 * specified mechanism. The "num_supporting_slots" field 208 * many slots are found to support the mechanism. 271 * Updates a mechanism in the mechlist. If the mechanism is not 272 * listed, all providers will be queried. If the mechanism 605 find_mech_index(CK_MECHANISM_TYPE mechanism, unsigned long *index) argument 646 meta_mechManager_slot_supports_mech(CK_MECHANISM_TYPE mechanism, CK_ULONG slotnum, boolean_t *supports, mechinfo_t **slot_info, boolean_t force_update, CK_MECHANISM_INFO *mech_info) argument [all...] |
H A D | pkcs11SUNWExtensions.c | 193 * mechanism. 250 /* find slot with matching mechanism */ 254 /* found mechanism */ 260 /* no matching mechanism found */ 274 * mechanism from the rawkey data. 298 * Check to make sure mechanism type is not for asymmetric key 322 /* get the key type for this mechanism */ 338 /* set the attribute type flag on object based on mechanism */ 384 CK_MECHANISM mechanism; local 448 mechanism [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_rsa.c | 417 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS) { 418 digest_mech.mechanism = CKM_MD5; 423 digest_mech.mechanism = CKM_SHA_1; 455 sign_mech.mechanism = CKM_RSA_PKCS; 491 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS) 492 digest_mech.mechanism = CKM_MD5; 494 digest_mech.mechanism = CKM_SHA_1; 546 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS) { 547 digest_mech.mechanism = CKM_MD5; 552 digest_mech.mechanism [all...] |
H A D | mech_md5.c | 344 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL) { 376 digest_mech.mechanism = CKM_MD5; 417 digest_mech.mechanism = CKM_MD5; 500 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL)
|
H A D | mech_sha.c | 78 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL) { 108 digest_mech.mechanism = CKM_SHA_1; 148 digest_mech.mechanism = CKM_SHA_1; 230 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL)
|
H A D | key_mgr.c | 116 switch (mech->mechanism) { 145 switch (mech->mechanism) { 280 switch (mech->mechanism) { 318 switch (mech->mechanism) { 381 switch (mech->mechanism) { 407 switch (mech->mechanism) { 452 * PKCS #11 specifies that for this mechanism, CK_VALUE is to be read 457 if (mech->mechanism == CKM_RSA_X_509)
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDecryptUtil.c | 71 * decrypt init routine based on the mechanism. 76 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism 77 * CKR_MECHANISM_INVALID: invalid mechanism type 79 * with the specified mechanism 88 switch (pMechanism->mechanism) { 346 * on the mechanism. 357 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local 359 switch (mechanism) { 418 ulEncryptedLen, pData, pulDataLen, mechanism)); 477 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local 526 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local [all...] |
H A D | softDSA.c | 66 if (pMechanism->mechanism == CKM_DSA_SHA1) { 67 digest_mech.mechanism = CKM_SHA_1; 104 session_p->sign.mech.mechanism = pMechanism->mechanism; 107 session_p->verify.mech.mechanism = pMechanism->mechanism;
|
H A D | softBlowfishCrypt.c | 62 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 66 session_p->decrypt.mech.mechanism = pMechanism->mechanism; 131 * on the mechanism. 159 * for C_Encrypt function with the mechanism CKM_BLOWFISH_CBC.
|
H A D | softKeysUtil.c | 170 switch (pMechanism->mechanism) { 218 * mechanism. 251 * mechanism. 273 switch (pMechanism->mechanism) { 340 switch (pMechanism->mechanism) { 429 switch (pMechanism->mechanism) { 664 if (pMechanism->mechanism == CKM_PBE_SHA1_RC4_128) { 667 digest_mech.mechanism = CKM_SHA_1; 891 switch (pMechanism->mechanism) { 958 digest_mech.mechanism [all...] |
H A D | softSessionUtil.c | 493 switch (session_p->digest.mech.mechanism) { 529 switch (session_p->digest.mech.mechanism) { 623 mech = p_active_op->mech.mechanism; 647 (session_p->digest.mech.mechanism != mech)) { 668 session_p->digest.mech.mechanism = mech;
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/ByteLoader/ |
H A D | ByteLoader.pm | 28 C<perl -MO=Bytecode=...>. It uses the source filter mechanism to read
|
/opensolaris-onvv-gate/usr/src/common/crypto/fips/ |
H A D | fips_sha2_util.c | 54 fips_sha2_build_context(CK_MECHANISM_TYPE mechanism) argument 61 switch (mechanism) { 80 fips_sha2_build_context(sha2_mech_t mechanism) argument 88 switch (mechanism) { 146 fips_sha2_hmac_build_context(CK_MECHANISM_TYPE mechanism, argument 159 switch (mechanism) { 172 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism), 193 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism), 213 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism), 232 CK_MECHANISM_TYPE mechanism) 227 fips_hmac_sha2_hash(unsigned char *hmac_computed, uint8_t *secret_key, unsigned int secret_key_length, uint8_t *message, unsigned int message_length, CK_MECHANISM_TYPE mechanism) argument 319 fips_sha2_hmac_build_context(sha2_mech_t mechanism, uint8_t *secret_key, unsigned int secret_key_length) argument 360 fips_hmac_sha2_hash(sha2_hmac_ctx_t *sha2_hmac_ctx, uint8_t *message, uint32_t message_len, uint8_t *hmac_computed, sha2_mech_t mechanism) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEmulate.h | 64 boolean_t is_hmac(CK_MECHANISM_TYPE mechanism);
|
H A D | kernelEmulate.c | 41 is_hmac(CK_MECHANISM_TYPE mechanism) argument 43 switch (mechanism) {
|
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/ |
H A D | ecc.c | 77 * Context for ECDSA mechanism. 87 * Context for ECDSA_SHA1 mechanism. 474 ecc_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 482 ecc_mech_type_t mech_type = mechanism->cm_type; 554 ecc_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 560 ecc_mech_type_t mech_type = mechanism->cm_type; 566 rv = ecc_sign_verify_common_init(ctx, mechanism, key, 574 ecc_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 580 ecc_mech_type_t mech_type = mechanism->cm_type; 586 rv = ecc_sign_verify_common_init(ctx, mechanism, ke 788 ecc_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 985 ecc_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1046 ecc_nostore_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *pub_template, uint_t pub_attribute_count, crypto_object_attribute_t *pri_template, uint_t pri_attribute_count, crypto_object_attribute_t *pub_out_template, uint_t pub_out_attribute_count, crypto_object_attribute_t *pri_out_template, uint_t pri_out_attribute_count, crypto_req_handle_t req) argument 1185 ecc_nostore_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *in_attrs, uint_t in_attr_count, crypto_object_attribute_t *out_attrs, uint_t out_attr_count, crypto_req_handle_t req) argument [all...] |
H A D | dca.c | 3691 dca_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 3704 /* check mechanism */ 3705 switch (mechanism->cm_type) { 3707 error = dca_3desctxinit(ctx, mechanism, key, KM_SLEEP, 3711 error = dca_3desctxinit(ctx, mechanism, key, KM_SLEEP, 3716 error = dca_rsainit(ctx, mechanism, key, KM_SLEEP); 3720 "0x%llx\n", (unsigned long long)mechanism->cm_type); 3757 /* check mechanism */ 3812 /* check mechanism */ 3851 /* check mechanism */ 3873 dca_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3925 dca_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4108 dca_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4164 dca_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4292 dca_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4329 dca_sign_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4400 dca_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4440 dca_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4568 dca_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4605 dca_verify_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4674 dca_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
H A D | dca_3des.c | 315 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, 338 rv = dca_3desctxinit(&ctx, mechanism, key, kmflag, mode); 656 dca_3desctxinit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 672 paramsz = mechanism->cm_param_len; 674 param = (uint32_t *)mechanism->cm_param; 676 param = (uchar_t *)mechanism->cm_param; 710 des_ctx->dr_ctx.ctx_cm_type = mechanism->cm_type; 314 dca_3desatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
|
/opensolaris-onvv-gate/usr/src/lib/libcryptoutil/ |
H A D | README | 96 the pkcs11t.h file to map mechanism numbers to the corresponding string 121 #define MECH_ID_HEX_LEN 11 /* length of mechanism id in hex form */ 159 Create one item of type umechlist_t with the mechanism name in hex form. 180 This function is used to get the key type for a mechanism. 186 specific mechanism.
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/IO/ |
H A D | IO.pm | 40 C<IO> provides a simple mechanism to load several of the IO modules
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Devel/ |
H A D | SelfStubber.pm | 124 B, but set to be autoloaded, then the lookup mechanism never gets to 125 the AUTOLOAD mechanism in B because it first finds the method 127 foo had been stubbed in B, then the lookup mechanism would have
|