Searched refs:mech (Results 1 - 25 of 91) sorted by relevance

1234

/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dencapsulate.c40 const gss_OID mech)
44 *len = 1 + 1 + mech->length + data_len;
55 const gss_OID mech)
57 _gssapi_encap_length(data_len + 2, len, total_len, mech);
64 const gss_OID mech)
67 p = _gssapi_make_mech_header(p, len, mech);
76 const gss_OID mech)
89 *p++ = mech->length;
90 memcpy (p, mech->elements, mech
37 _gssapi_encap_length(size_t data_len, size_t *len, size_t *total_len, const gss_OID mech) argument
52 _gsskrb5_encap_length(size_t data_len, size_t *len, size_t *total_len, const gss_OID mech) argument
61 _gsskrb5_make_header(void *ptr, size_t len, const void *type, const gss_OID mech) argument
74 _gssapi_make_mech_header(void *ptr, size_t len, const gss_OID mech) argument
[all...]
H A Ddecapsulate.c72 gss_OID mech)
81 if (mech_len != mech->length)
84 mech->elements,
85 mech->length) != 0)
128 const gss_OID mech
137 mech);
70 _gssapi_verify_mech_header(u_char **str, size_t total_len, gss_OID mech) argument
/freebsd-13-stable/etc/gss/
H A DMakefile3 FILES= mech qop
/freebsd-13-stable/crypto/heimdal/lib/gssapi/
H A DMakefile.am11 -I$(srcdir)/mech \
79 mech/context.h \
80 mech/context.c \
81 mech/cred.h \
82 mech/compat.h \
83 mech/doxygen.c \
84 mech/gss_accept_sec_context.c \
85 mech/gss_acquire_cred.c \
86 mech/gss_acquire_cred_ext.c \
87 mech/gss_acquire_cred_with_passwor
[all...]
H A DMakefile.in157 am__objects_2 = mech/context.lo mech/doxygen.lo \
158 mech/gss_accept_sec_context.lo mech/gss_acquire_cred.lo \
159 mech/gss_acquire_cred_ext.lo \
160 mech/gss_acquire_cred_with_password.lo mech/gss_add_cred.lo \
161 mech/gss_add_cred_with_password.lo \
162 mech/gss_add_oid_set_member.lo mech/gss_aea
[all...]
H A Dtest_common.c39 gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech) argument
55 mech, &msg_ctx, &maj_error_message);
58 mech, &msg_ctx, &min_error_message);
59 if (asprintf(&ret, "gss-code: %lu %.*s -- mech-code: %lu %.*s",
H A Dgsstool.c136 print_mech_attr(const char *mechname, gss_const_OID mech, gss_OID_set set) argument
150 if (mech)
162 if (mech) {
165 if (gss_mo_get(mech, &set->elements[n], &value) != 0)
190 gss_OID mech = GSS_C_NO_OID; local
194 mech = gss_name_to_oid(opt->mech_string);
195 if (mech == NULL)
196 errx(1, "mech %s is unknown", opt->mech_string);
199 major = gss_inquire_attrs_for_mech(&minor, mech, &mech_attr, &known_mech_attrs);
203 if (mech) {
[all...]
/freebsd-13-stable/lib/libgssapi/
H A Dgss_pname_to_uid.c40 const gss_OID mech, uid_t *uidp)
52 m = _gss_find_mech_switch(mech);
59 major_status = _gss_find_mn(minor_status, name, mech, &mn);
66 mech, uidp);
39 gss_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp) argument
/freebsd-13-stable/sys/rpc/rpcsec_gss/
H A Drpcsec_gss_conf.c45 rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret) argument
47 gss_OID oid = kgss_find_mech_by_name(mech);
71 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument
83 _rpc_gss_num_to_qop(const char *mech, u_int num) argument
120 rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service)
127 if (!strcmp(mech, info->name)) {
156 rpc_gss_is_installed(const char *mech) argument
158 gss_OID oid = kgss_find_mech_by_name(mech);
/freebsd-13-stable/sys/contrib/openzfs/module/icp/api/
H A Dkcf_ctxops.c42 * mech: crypto_mechanism_t pointer.
45 * When the mech's parameter is not NULL, its definition depends
68 * RYPTO_MECHANISM_INVALID: invalid mechanism 'mech'.
71 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument
85 if (mech == NULL)
88 error = kcf_get_sw_prov(mech->cm_type, &pd, &me, B_TRUE);
99 prov_mech.cm_type = KCF_TO_PROV_MECHNUM(pd, mech->cm_type);
100 prov_mech.cm_param = mech->cm_param;
101 prov_mech.cm_param_len = mech->cm_param_len;
H A Dkcf_cipher.c46 * CRYPTO_INVALID_MECH for problems with the 'mech'.
66 * mech: crypto_mechanism_t pointer.
69 * When the mech's parameter is not NULL, its definition depends
73 * encryption or decryption with the 'mech' using 'key'.
101 crypto_mechanism_t *mech, crypto_key_t *key,
115 error = kcf_get_hardware_provider(mech->cm_type,
119 error = kcf_get_hardware_provider(mech->cm_type,
139 lmech = *mech;
140 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, real_provider, &lmech);
159 KCF_CAN_SHARE_OPSTATE(pd, mech
100 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
224 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
313 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
349 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
426 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
441 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
595 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
632 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
709 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
724 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_mac.c46 * CRYPTO_INVALID_MECH for problems with the 'mech'.
62 * mech: crypto_mechanism_t pointer.
65 * When the mech's parameter is not NULL, its definition depends
71 * MAC with the 'mech' using 'key'. 'tmpl' is created by
78 * 'mech', using * the key 'key', on the specified provider with
91 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key,
102 rv = kcf_get_hardware_provider(mech->cm_type,
110 KCF_WRAP_MAC_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech, key,
124 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, argument
138 if ((pd = kcf_get_mech_provider(mech
90 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
215 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
249 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
367 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
430 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_digest.c46 * for problems with the 'mech'.
64 * mech: crypto_mechanism_t pointer.
67 * When the mech's parameter is not NULL, its definition depends
90 crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest,
101 rv = kcf_get_hardware_provider(mech->cm_type,
108 KCF_WRAP_DIGEST_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech, NULL,
125 crypto_digest(crypto_mechanism_t *mech, crypto_data_t *data, argument
135 if ((pd = kcf_get_mech_provider(mech->cm_type, NULL, &error, list,
147 lmech = *mech;
148 KCF_SET_PROVIDER_MECHNUM(mech
89 crypto_digest_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *crq) argument
205 crypto_digest_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
267 crypto_digest_init(crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftp/
H A Dsecurity.c97 static struct sec_server_mech *mech; variable in typeref:struct:sec_server_mech
108 static struct sec_client_mech *mech; variable in typeref:struct:sec_client_mech
180 buf->size = (*mech->decode)(app_data, buf->data, len, data_prot);
256 bytes = (*mech->encode)(app_data, from, length, data_prot, &buf);
287 len -= (*mech->overhead)(app_data, data_prot, len);
353 len = (*mech->decode)(app_data, buf, len, level);
383 len = (*mech->encode)(app_data, buf, strlen(buf), command_prot, &enc);
437 for(i = 0; (mech = mechs[i]) != NULL; i++){
438 if(!strcasecmp(auth_name, mech->name)){
439 tmp = realloc(app_data, mech
[all...]
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftpd/
H A Dsecurity.c97 static struct sec_server_mech *mech; variable in typeref:struct:sec_server_mech
108 static struct sec_client_mech *mech; variable in typeref:struct:sec_client_mech
180 buf->size = (*mech->decode)(app_data, buf->data, len, data_prot);
256 bytes = (*mech->encode)(app_data, from, length, data_prot, &buf);
287 len -= (*mech->overhead)(app_data, data_prot, len);
353 len = (*mech->decode)(app_data, buf, len, level);
383 len = (*mech->encode)(app_data, buf, strlen(buf), command_prot, &enc);
437 for(i = 0; (mech = mechs[i]) != NULL; i++){
438 if(!strcasecmp(auth_name, mech->name)){
439 tmp = realloc(app_data, mech
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/
H A Dhkdf.c29 crypto_mechanism_t mech; local
34 mech.cm_type = crypto_mech2id(SUN_CKM_SHA512_HMAC);
35 mech.cm_param = NULL;
36 mech.cm_param_len = 0;
56 ret = crypto_mac(&mech, &input_cd, &key, NULL, &output_cd, NULL);
68 crypto_mechanism_t mech; local
81 mech.cm_type = crypto_mech2id(SUN_CKM_SHA512_HMAC);
82 mech.cm_param = NULL;
83 mech.cm_param_len = 0;
113 ret = crypto_mac_init(&mech,
[all...]
/freebsd-13-stable/lib/librpcsec_gss/
H A Drpcsec_gss_conf.c43 #define _PATH_GSS_MECH "/etc/gss/mech"
66 char* mech; member in struct:qop_info
241 char *name, *num, *mech; local
263 mech = strsep(&p, "\t\n ");
264 if (!name || !num || !mech)
272 info->mech = strdup(mech);
283 if (strcmp(info->mech, minfo->name) == 0)
289 if (strcmp(info->mech, minfo->name) == 0)
298 rpc_gss_mech_to_oid(const char *mech, gss_OI argument
332 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument
349 _rpc_gss_num_to_qop(const char *mech, u_int num) argument
374 rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service) argument
409 rpc_gss_is_installed(const char *mech) argument
[all...]
/freebsd-13-stable/sys/kgssapi/
H A Dgss_pname_to_uid.c47 const gss_OID mech, uid_t *uidp)
64 args.mech = mech;
85 const gss_OID mech, uid_t *uidp, gid_t *gidp,
105 args.mech = mech;
46 gss_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp) argument
84 gss_pname_to_unix_cred(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp, gid_t *gidp, int *numgroups, gid_t *groups) argument
/freebsd-13-stable/crypto/heimdal/lib/gssapi/mech/
H A Dcontext.c5 gss_OID mech; member in struct:mg_thread_ctx
66 _gss_mg_get_error(const gss_OID mech, OM_uint32 type, argument
77 * We cant check the mech here since a pseudo-mech might have
78 * called an lower layer and then the mech info is all broken
80 if (mech != NULL && gss_oid_equal(mg->mech, mech) == 0)
130 mg->mech = &m->gm_mech_oid;
157 gss_mg_collect_error(gss_OID mech, OM_uint3 argument
[all...]
H A Dgss_names.c32 _gss_find_mn(OM_uint32 *minor_status, struct _gss_name *name, gss_OID mech, argument
42 if (gss_oid_equal(mech, mn->gmn_mech_oid))
49 * MN but it is from a different mech), give up now.
54 m = __gss_get_mechanism(mech);
H A Dgss_mo.c42 get_option_def(int def, gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument
48 _gss_mo_get_option_1(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument
50 return get_option_def(1, mech, mo, value);
54 _gss_mo_get_option_0(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument
56 return get_option_def(0, mech, mo, value);
60 _gss_mo_get_ctx_as_string(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument
72 gss_mo_set(gss_const_OID mech, gss_const_OID option, argument
78 if ((m = __gss_get_mechanism(mech)) == NULL)
83 return m->gm_mo[n].set(mech, &m->gm_mo[n], enable, value);
89 gss_mo_get(gss_const_OID mech, gss_const_OI argument
118 gss_mo_list(gss_const_OID mech, gss_OID_set *options) argument
139 gss_mo_name(gss_const_OID mech, gss_const_OID option, gss_buffer_t name) argument
177 mo_value(const gss_const_OID mech, gss_const_OID option, gss_buffer_t name) argument
189 make_sasl_name(OM_uint32 *minor, const gss_OID mech, char sasl_name[16]) argument
513 gss_inquire_attrs_for_mech(OM_uint32 * minor_status, gss_const_OID mech, gss_OID_set *mech_attr, gss_OID_set *known_mech_attrs) argument
[all...]
/freebsd-13-stable/kerberos5/lib/libgssapi_spnego/
H A Dfreebsd_compat.c44 gss_mg_collect_error(gss_OID mech, OM_uint32 maj, OM_uint32 min) argument
46 _gss_mg_collect_error(mech, maj, min);
/freebsd-13-stable/crypto/heimdal/appl/test/
H A Dgss_common.c123 select_mech(const char *mech) argument
125 if (strcasecmp(mech, "krb5") == 0)
127 else if (strcasecmp(mech, "spnego") == 0)
129 else if (strcasecmp(mech, "no-oid") == 0)
132 errx (1, "Unknown mechanism '%s' (spnego, krb5, no-oid)", mech);
/freebsd-13-stable/include/rpc/
H A Drpcsec_gss.h153 bool_t rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret);
155 bool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
157 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
159 bool_t rpc_gss_is_installed(const char *mech);
167 const char *mech, const char *name, const char *node, const char *domain);
/freebsd-13-stable/sys/rpc/
H A Drpcsec_gss.h167 typedef bool_t rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret);
169 typedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech,
173 typedef bool_t rpc_gss_is_installed_ftype(const char *mech);
184 const char *mech, const char *name, const char *node,
282 rpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret) argument
287 ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret);
302 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) argument
307 ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret);
332 rpc_gss_is_installed_call(const char *mech) argument
337 ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech);
392 rpc_gss_get_principal_name_call(rpc_gss_principal_t *principal, const char *mech, const char *name, const char *node, const char *domain) argument
[all...]

Completed in 303 milliseconds

1234