Searched refs:mechanism (Results 51 - 75 of 180) sorted by relevance

12345678

/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsEncrypt.c37 if (pMechanism->mechanism != CKM_AES_CBC &&
38 pMechanism->mechanism != CKM_AES_CBC_PAD)
96 if (active_op->mech.mechanism != CKM_AES_CBC &&
97 active_op->mech.mechanism != CKM_AES_CBC_PAD)
143 if (pMechanism->mechanism != CKM_AES_CBC &&
144 pMechanism->mechanism != CKM_AES_CBC_PAD)
211 * length depends on the mechanism in use. For secret key mechanisms,
299 * length depends on the mechanism in use. For secret key mechanisms,
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/
H A Dhash_ef_generic.c13 CK_MECHANISM *mechanism,
22 if ((rv = C_DigestInit(krb_ctx_hSession(context), mechanism)) !=
12 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Digest.c37 * the framework, that the mechanism is not disabled for the slot
53 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
72 /* Make sure this is not a disabled mechanism */
73 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
H A Dpkcs11Crypt.c37 * the framework, that the mechanism is not disabled for the slot
55 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
74 /* Make sure this is not a disabled mechanism */
75 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
220 * the framework, that the mechanism is not disabled for the slot
238 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
257 /* Make sure this is not a disabled mechanism */
258 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
H A DmetaMechManager.c35 * Each element in the array represents a particular mechanism type. The
36 * array is sorted by type, so that searching by mechanism can be done
37 * quickly. Each element also contains the mechanism data for each slot.
155 * Also, it may not be allowed based on the mechanism policy.
202 * Get list of all slots supporting the specified mechanism.
206 * specified mechanism. The "num_supporting_slots" field
208 * many slots are found to support the mechanism.
271 * Updates a mechanism in the mechlist. If the mechanism is not
272 * listed, all providers will be queried. If the mechanism
605 find_mech_index(CK_MECHANISM_TYPE mechanism, unsigned long *index) argument
646 meta_mechManager_slot_supports_mech(CK_MECHANISM_TYPE mechanism, CK_ULONG slotnum, boolean_t *supports, mechinfo_t **slot_info, boolean_t force_update, CK_MECHANISM_INFO *mech_info) argument
[all...]
H A Dpkcs11SUNWExtensions.c193 * mechanism.
250 /* find slot with matching mechanism */
254 /* found mechanism */
260 /* no matching mechanism found */
274 * mechanism from the rawkey data.
298 * Check to make sure mechanism type is not for asymmetric key
322 /* get the key type for this mechanism */
338 /* set the attribute type flag on object based on mechanism */
384 CK_MECHANISM mechanism; local
448 mechanism
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_rsa.c417 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS) {
418 digest_mech.mechanism = CKM_MD5;
423 digest_mech.mechanism = CKM_SHA_1;
455 sign_mech.mechanism = CKM_RSA_PKCS;
491 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS)
492 digest_mech.mechanism = CKM_MD5;
494 digest_mech.mechanism = CKM_SHA_1;
546 if (ctx->mech.mechanism == CKM_MD5_RSA_PKCS) {
547 digest_mech.mechanism = CKM_MD5;
552 digest_mech.mechanism
[all...]
H A Dmech_md5.c344 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL) {
376 digest_mech.mechanism = CKM_MD5;
417 digest_mech.mechanism = CKM_MD5;
500 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL)
H A Dmech_sha.c78 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL) {
108 digest_mech.mechanism = CKM_SHA_1;
148 digest_mech.mechanism = CKM_SHA_1;
230 if (ctx->mech.mechanism == CKM_SHA_1_HMAC_GENERAL)
H A Dkey_mgr.c116 switch (mech->mechanism) {
145 switch (mech->mechanism) {
280 switch (mech->mechanism) {
318 switch (mech->mechanism) {
381 switch (mech->mechanism) {
407 switch (mech->mechanism) {
452 * PKCS #11 specifies that for this mechanism, CK_VALUE is to be read
457 if (mech->mechanism == CKM_RSA_X_509)
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDecryptUtil.c71 * decrypt init routine based on the mechanism.
76 * CKR_MECHANISM_PARAM_INVALID: invalid parameters in mechanism
77 * CKR_MECHANISM_INVALID: invalid mechanism type
79 * with the specified mechanism
88 switch (pMechanism->mechanism) {
346 * on the mechanism.
357 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
359 switch (mechanism) {
418 ulEncryptedLen, pData, pulDataLen, mechanism));
477 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
526 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; local
[all...]
H A DsoftDSA.c66 if (pMechanism->mechanism == CKM_DSA_SHA1) {
67 digest_mech.mechanism = CKM_SHA_1;
104 session_p->sign.mech.mechanism = pMechanism->mechanism;
107 session_p->verify.mech.mechanism = pMechanism->mechanism;
H A DsoftBlowfishCrypt.c62 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
66 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
131 * on the mechanism.
159 * for C_Encrypt function with the mechanism CKM_BLOWFISH_CBC.
H A DsoftKeysUtil.c170 switch (pMechanism->mechanism) {
218 * mechanism.
251 * mechanism.
273 switch (pMechanism->mechanism) {
340 switch (pMechanism->mechanism) {
429 switch (pMechanism->mechanism) {
664 if (pMechanism->mechanism == CKM_PBE_SHA1_RC4_128) {
667 digest_mech.mechanism = CKM_SHA_1;
891 switch (pMechanism->mechanism) {
958 digest_mech.mechanism
[all...]
H A DsoftSessionUtil.c493 switch (session_p->digest.mech.mechanism) {
529 switch (session_p->digest.mech.mechanism) {
623 mech = p_active_op->mech.mechanism;
647 (session_p->digest.mech.mechanism != mech)) {
668 session_p->digest.mech.mechanism = mech;
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/ByteLoader/
H A DByteLoader.pm28 C<perl -MO=Bytecode=...>. It uses the source filter mechanism to read
/opensolaris-onvv-gate/usr/src/common/crypto/fips/
H A Dfips_sha2_util.c54 fips_sha2_build_context(CK_MECHANISM_TYPE mechanism) argument
61 switch (mechanism) {
80 fips_sha2_build_context(sha2_mech_t mechanism) argument
88 switch (mechanism) {
146 fips_sha2_hmac_build_context(CK_MECHANISM_TYPE mechanism, argument
159 switch (mechanism) {
172 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism),
193 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism),
213 sha2_hmac_ctx_init(CKM_TO_SHA2(mechanism),
232 CK_MECHANISM_TYPE mechanism)
227 fips_hmac_sha2_hash(unsigned char *hmac_computed, uint8_t *secret_key, unsigned int secret_key_length, uint8_t *message, unsigned int message_length, CK_MECHANISM_TYPE mechanism) argument
319 fips_sha2_hmac_build_context(sha2_mech_t mechanism, uint8_t *secret_key, unsigned int secret_key_length) argument
360 fips_hmac_sha2_hash(sha2_hmac_ctx_t *sha2_hmac_ctx, uint8_t *message, uint32_t message_len, uint8_t *hmac_computed, sha2_mech_t mechanism) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEmulate.h64 boolean_t is_hmac(CK_MECHANISM_TYPE mechanism);
H A DkernelEmulate.c41 is_hmac(CK_MECHANISM_TYPE mechanism) argument
43 switch (mechanism) {
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/
H A Decc.c77 * Context for ECDSA mechanism.
87 * Context for ECDSA_SHA1 mechanism.
474 ecc_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
482 ecc_mech_type_t mech_type = mechanism->cm_type;
554 ecc_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
560 ecc_mech_type_t mech_type = mechanism->cm_type;
566 rv = ecc_sign_verify_common_init(ctx, mechanism, key,
574 ecc_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
580 ecc_mech_type_t mech_type = mechanism->cm_type;
586 rv = ecc_sign_verify_common_init(ctx, mechanism, ke
788 ecc_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
985 ecc_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1046 ecc_nostore_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *pub_template, uint_t pub_attribute_count, crypto_object_attribute_t *pri_template, uint_t pri_attribute_count, crypto_object_attribute_t *pub_out_template, uint_t pub_out_attribute_count, crypto_object_attribute_t *pri_out_template, uint_t pri_out_attribute_count, crypto_req_handle_t req) argument
1185 ecc_nostore_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *in_attrs, uint_t in_attr_count, crypto_object_attribute_t *out_attrs, uint_t out_attr_count, crypto_req_handle_t req) argument
[all...]
H A Ddca.c3691 dca_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
3704 /* check mechanism */
3705 switch (mechanism->cm_type) {
3707 error = dca_3desctxinit(ctx, mechanism, key, KM_SLEEP,
3711 error = dca_3desctxinit(ctx, mechanism, key, KM_SLEEP,
3716 error = dca_rsainit(ctx, mechanism, key, KM_SLEEP);
3720 "0x%llx\n", (unsigned long long)mechanism->cm_type);
3757 /* check mechanism */
3812 /* check mechanism */
3851 /* check mechanism */
3873 dca_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
3925 dca_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4108 dca_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4164 dca_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4292 dca_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4329 dca_sign_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4400 dca_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4440 dca_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4568 dca_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4605 dca_verify_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4674 dca_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
[all...]
H A Ddca_3des.c315 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
338 rv = dca_3desctxinit(&ctx, mechanism, key, kmflag, mode);
656 dca_3desctxinit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
672 paramsz = mechanism->cm_param_len;
674 param = (uint32_t *)mechanism->cm_param;
676 param = (uchar_t *)mechanism->cm_param;
710 des_ctx->dr_ctx.ctx_cm_type = mechanism->cm_type;
314 dca_3desatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
/opensolaris-onvv-gate/usr/src/lib/libcryptoutil/
H A DREADME96 the pkcs11t.h file to map mechanism numbers to the corresponding string
121 #define MECH_ID_HEX_LEN 11 /* length of mechanism id in hex form */
159 Create one item of type umechlist_t with the mechanism name in hex form.
180 This function is used to get the key type for a mechanism.
186 specific mechanism.
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/IO/
H A DIO.pm40 C<IO> provides a simple mechanism to load several of the IO modules
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Devel/
H A DSelfStubber.pm124 B, but set to be autoloaded, then the lookup mechanism never gets to
125 the AUTOLOAD mechanism in B because it first finds the method
127 foo had been stubbed in B, then the lookup mechanism would have

Completed in 212 milliseconds

12345678