/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | encapsulate.c | 40 const gss_OID mech) 44 *len = 1 + 1 + mech->length + data_len; 55 const gss_OID mech) 57 _gssapi_encap_length(data_len + 2, len, total_len, mech); 64 const gss_OID mech) 67 p = _gssapi_make_mech_header(p, len, mech); 76 const gss_OID mech) 89 *p++ = mech->length; 90 memcpy (p, mech->elements, mech 37 _gssapi_encap_length(size_t data_len, size_t *len, size_t *total_len, const gss_OID mech) argument 52 _gsskrb5_encap_length(size_t data_len, size_t *len, size_t *total_len, const gss_OID mech) argument 61 _gsskrb5_make_header(void *ptr, size_t len, const void *type, const gss_OID mech) argument 74 _gssapi_make_mech_header(void *ptr, size_t len, const gss_OID mech) argument [all...] |
H A D | decapsulate.c | 72 gss_OID mech) 81 if (mech_len != mech->length) 84 mech->elements, 85 mech->length) != 0) 128 const gss_OID mech 137 mech); 70 _gssapi_verify_mech_header(u_char **str, size_t total_len, gss_OID mech) argument
|
/freebsd-13-stable/etc/gss/ |
H A D | Makefile | 3 FILES= mech qop
|
/freebsd-13-stable/crypto/heimdal/lib/gssapi/ |
H A D | Makefile.am | 11 -I$(srcdir)/mech \ 79 mech/context.h \ 80 mech/context.c \ 81 mech/cred.h \ 82 mech/compat.h \ 83 mech/doxygen.c \ 84 mech/gss_accept_sec_context.c \ 85 mech/gss_acquire_cred.c \ 86 mech/gss_acquire_cred_ext.c \ 87 mech/gss_acquire_cred_with_passwor [all...] |
H A D | Makefile.in | 157 am__objects_2 = mech/context.lo mech/doxygen.lo \ 158 mech/gss_accept_sec_context.lo mech/gss_acquire_cred.lo \ 159 mech/gss_acquire_cred_ext.lo \ 160 mech/gss_acquire_cred_with_password.lo mech/gss_add_cred.lo \ 161 mech/gss_add_cred_with_password.lo \ 162 mech/gss_add_oid_set_member.lo mech/gss_aea [all...] |
H A D | test_common.c | 39 gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech) argument 55 mech, &msg_ctx, &maj_error_message); 58 mech, &msg_ctx, &min_error_message); 59 if (asprintf(&ret, "gss-code: %lu %.*s -- mech-code: %lu %.*s",
|
H A D | gsstool.c | 136 print_mech_attr(const char *mechname, gss_const_OID mech, gss_OID_set set) argument 150 if (mech) 162 if (mech) { 165 if (gss_mo_get(mech, &set->elements[n], &value) != 0) 190 gss_OID mech = GSS_C_NO_OID; local 194 mech = gss_name_to_oid(opt->mech_string); 195 if (mech == NULL) 196 errx(1, "mech %s is unknown", opt->mech_string); 199 major = gss_inquire_attrs_for_mech(&minor, mech, &mech_attr, &known_mech_attrs); 203 if (mech) { [all...] |
/freebsd-13-stable/lib/libgssapi/ |
H A D | gss_pname_to_uid.c | 40 const gss_OID mech, uid_t *uidp) 52 m = _gss_find_mech_switch(mech); 59 major_status = _gss_find_mn(minor_status, name, mech, &mn); 66 mech, uidp); 39 gss_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp) argument
|
/freebsd-13-stable/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_conf.c | 45 rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret) argument 47 gss_OID oid = kgss_find_mech_by_name(mech); 71 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 83 _rpc_gss_num_to_qop(const char *mech, u_int num) argument 120 rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service) 127 if (!strcmp(mech, info->name)) { 156 rpc_gss_is_installed(const char *mech) argument 158 gss_OID oid = kgss_find_mech_by_name(mech);
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/api/ |
H A D | kcf_ctxops.c | 42 * mech: crypto_mechanism_t pointer. 45 * When the mech's parameter is not NULL, its definition depends 68 * RYPTO_MECHANISM_INVALID: invalid mechanism 'mech'. 71 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument 85 if (mech == NULL) 88 error = kcf_get_sw_prov(mech->cm_type, &pd, &me, B_TRUE); 99 prov_mech.cm_type = KCF_TO_PROV_MECHNUM(pd, mech->cm_type); 100 prov_mech.cm_param = mech->cm_param; 101 prov_mech.cm_param_len = mech->cm_param_len;
|
H A D | kcf_cipher.c | 46 * CRYPTO_INVALID_MECH for problems with the 'mech'. 66 * mech: crypto_mechanism_t pointer. 69 * When the mech's parameter is not NULL, its definition depends 73 * encryption or decryption with the 'mech' using 'key'. 101 crypto_mechanism_t *mech, crypto_key_t *key, 115 error = kcf_get_hardware_provider(mech->cm_type, 119 error = kcf_get_hardware_provider(mech->cm_type, 139 lmech = *mech; 140 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, real_provider, &lmech); 159 KCF_CAN_SHARE_OPSTATE(pd, mech 100 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 224 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 313 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 349 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 426 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 441 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 595 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 632 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 709 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 724 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_mac.c | 46 * CRYPTO_INVALID_MECH for problems with the 'mech'. 62 * mech: crypto_mechanism_t pointer. 65 * When the mech's parameter is not NULL, its definition depends 71 * MAC with the 'mech' using 'key'. 'tmpl' is created by 78 * 'mech', using * the key 'key', on the specified provider with 91 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, 102 rv = kcf_get_hardware_provider(mech->cm_type, 110 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, key, 124 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, argument 138 if ((pd = kcf_get_mech_provider(mech 90 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 215 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 249 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 367 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 430 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_digest.c | 46 * for problems with the 'mech'. 64 * mech: crypto_mechanism_t pointer. 67 * When the mech's parameter is not NULL, its definition depends 90 crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, 101 rv = kcf_get_hardware_provider(mech->cm_type, 108 KCF_WRAP_DIGEST_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, NULL, 125 crypto_digest(crypto_mechanism_t *mech, crypto_data_t *data, argument 135 if ((pd = kcf_get_mech_provider(mech->cm_type, NULL, &error, list, 147 lmech = *mech; 148 KCF_SET_PROVIDER_MECHNUM(mech 89 crypto_digest_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *crq) argument 205 crypto_digest_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 267 crypto_digest_init(crypto_mechanism_t *mech, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftp/ |
H A D | security.c | 97 static struct sec_server_mech *mech; variable in typeref:struct:sec_server_mech 108 static struct sec_client_mech *mech; variable in typeref:struct:sec_client_mech 180 buf->size = (*mech->decode)(app_data, buf->data, len, data_prot); 256 bytes = (*mech->encode)(app_data, from, length, data_prot, &buf); 287 len -= (*mech->overhead)(app_data, data_prot, len); 353 len = (*mech->decode)(app_data, buf, len, level); 383 len = (*mech->encode)(app_data, buf, strlen(buf), command_prot, &enc); 437 for(i = 0; (mech = mechs[i]) != NULL; i++){ 438 if(!strcasecmp(auth_name, mech->name)){ 439 tmp = realloc(app_data, mech [all...] |
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftpd/ |
H A D | security.c | 97 static struct sec_server_mech *mech; variable in typeref:struct:sec_server_mech 108 static struct sec_client_mech *mech; variable in typeref:struct:sec_client_mech 180 buf->size = (*mech->decode)(app_data, buf->data, len, data_prot); 256 bytes = (*mech->encode)(app_data, from, length, data_prot, &buf); 287 len -= (*mech->overhead)(app_data, data_prot, len); 353 len = (*mech->decode)(app_data, buf, len, level); 383 len = (*mech->encode)(app_data, buf, strlen(buf), command_prot, &enc); 437 for(i = 0; (mech = mechs[i]) != NULL; i++){ 438 if(!strcasecmp(auth_name, mech->name)){ 439 tmp = realloc(app_data, mech [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/ |
H A D | hkdf.c | 29 crypto_mechanism_t mech; local 34 mech.cm_type = crypto_mech2id(SUN_CKM_SHA512_HMAC); 35 mech.cm_param = NULL; 36 mech.cm_param_len = 0; 56 ret = crypto_mac(&mech, &input_cd, &key, NULL, &output_cd, NULL); 68 crypto_mechanism_t mech; local 81 mech.cm_type = crypto_mech2id(SUN_CKM_SHA512_HMAC); 82 mech.cm_param = NULL; 83 mech.cm_param_len = 0; 113 ret = crypto_mac_init(&mech, [all...] |
/freebsd-13-stable/lib/librpcsec_gss/ |
H A D | rpcsec_gss_conf.c | 43 #define _PATH_GSS_MECH "/etc/gss/mech" 66 char* mech; member in struct:qop_info 241 char *name, *num, *mech; local 263 mech = strsep(&p, "\t\n "); 264 if (!name || !num || !mech) 272 info->mech = strdup(mech); 283 if (strcmp(info->mech, minfo->name) == 0) 289 if (strcmp(info->mech, minfo->name) == 0) 298 rpc_gss_mech_to_oid(const char *mech, gss_OI argument 332 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 349 _rpc_gss_num_to_qop(const char *mech, u_int num) argument 374 rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service) argument 409 rpc_gss_is_installed(const char *mech) argument [all...] |
/freebsd-13-stable/sys/kgssapi/ |
H A D | gss_pname_to_uid.c | 47 const gss_OID mech, uid_t *uidp) 64 args.mech = mech; 85 const gss_OID mech, uid_t *uidp, gid_t *gidp, 105 args.mech = mech; 46 gss_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp) argument 84 gss_pname_to_unix_cred(OM_uint32 *minor_status, const gss_name_t pname, const gss_OID mech, uid_t *uidp, gid_t *gidp, int *numgroups, gid_t *groups) argument
|
/freebsd-13-stable/crypto/heimdal/lib/gssapi/mech/ |
H A D | context.c | 5 gss_OID mech; member in struct:mg_thread_ctx 66 _gss_mg_get_error(const gss_OID mech, OM_uint32 type, argument 77 * We cant check the mech here since a pseudo-mech might have 78 * called an lower layer and then the mech info is all broken 80 if (mech != NULL && gss_oid_equal(mg->mech, mech) == 0) 130 mg->mech = &m->gm_mech_oid; 157 gss_mg_collect_error(gss_OID mech, OM_uint3 argument [all...] |
H A D | gss_names.c | 32 _gss_find_mn(OM_uint32 *minor_status, struct _gss_name *name, gss_OID mech, argument 42 if (gss_oid_equal(mech, mn->gmn_mech_oid)) 49 * MN but it is from a different mech), give up now. 54 m = __gss_get_mechanism(mech);
|
H A D | gss_mo.c | 42 get_option_def(int def, gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument 48 _gss_mo_get_option_1(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument 50 return get_option_def(1, mech, mo, value); 54 _gss_mo_get_option_0(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument 56 return get_option_def(0, mech, mo, value); 60 _gss_mo_get_ctx_as_string(gss_const_OID mech, gss_mo_desc *mo, gss_buffer_t value) argument 72 gss_mo_set(gss_const_OID mech, gss_const_OID option, argument 78 if ((m = __gss_get_mechanism(mech)) == NULL) 83 return m->gm_mo[n].set(mech, &m->gm_mo[n], enable, value); 89 gss_mo_get(gss_const_OID mech, gss_const_OI argument 118 gss_mo_list(gss_const_OID mech, gss_OID_set *options) argument 139 gss_mo_name(gss_const_OID mech, gss_const_OID option, gss_buffer_t name) argument 177 mo_value(const gss_const_OID mech, gss_const_OID option, gss_buffer_t name) argument 189 make_sasl_name(OM_uint32 *minor, const gss_OID mech, char sasl_name[16]) argument 513 gss_inquire_attrs_for_mech(OM_uint32 * minor_status, gss_const_OID mech, gss_OID_set *mech_attr, gss_OID_set *known_mech_attrs) argument [all...] |
/freebsd-13-stable/kerberos5/lib/libgssapi_spnego/ |
H A D | freebsd_compat.c | 44 gss_mg_collect_error(gss_OID mech, OM_uint32 maj, OM_uint32 min) argument 46 _gss_mg_collect_error(mech, maj, min);
|
/freebsd-13-stable/crypto/heimdal/appl/test/ |
H A D | gss_common.c | 123 select_mech(const char *mech) argument 125 if (strcasecmp(mech, "krb5") == 0) 127 else if (strcasecmp(mech, "spnego") == 0) 129 else if (strcasecmp(mech, "no-oid") == 0) 132 errx (1, "Unknown mechanism '%s' (spnego, krb5, no-oid)", mech);
|
/freebsd-13-stable/include/rpc/ |
H A D | rpcsec_gss.h | 153 bool_t rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret); 155 bool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret); 157 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service); 159 bool_t rpc_gss_is_installed(const char *mech); 167 const char *mech, const char *name, const char *node, const char *domain);
|
/freebsd-13-stable/sys/rpc/ |
H A D | rpcsec_gss.h | 167 typedef bool_t rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret); 169 typedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech, 173 typedef bool_t rpc_gss_is_installed_ftype(const char *mech); 184 const char *mech, const char *name, const char *node, 282 rpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret) argument 287 ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret); 302 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) argument 307 ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret); 332 rpc_gss_is_installed_call(const char *mech) argument 337 ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech); 392 rpc_gss_get_principal_name_call(rpc_gss_principal_t *principal, const char *mech, const char *name, const char *node, const char *domain) argument [all...] |