/opensolaris-onvv-gate/usr/src/lib/libresolv2/common/isc/ |
H A D | ctl_srvr.c | 67 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \ 118 LIST(struct ctl_sess) sess; member in struct:ctl_sctx 208 INIT_LIST(ctx->sess); 280 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p", 281 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess); 290 for (this = HEAD(ctx->sess); this != NULL; this = next) { 302 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument 308 struct ctl_sctx *ctx = sess->ctx; 312 REQUIRE(sess->state == initializing || 313 sess 376 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument 387 ctl_getcsctx(struct ctl_sess *sess) argument 392 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument 408 struct ctl_sess *sess = NULL; local 469 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument 483 ctl_close(struct ctl_sess *sess) argument 521 ctl_start_read(struct ctl_sess *sess) argument 551 ctl_stop_read(struct ctl_sess *sess) argument 569 struct ctl_sess *sess = uap; local 631 struct ctl_sess *sess = uap; local 658 struct ctl_sess *sess = uap; local 679 ctl_docommand(struct ctl_sess *sess) argument 722 struct ctl_sess *sess = uap; local 760 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument 780 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 450 SESSION * sess = NULL; local 465 sess = session_mgr_find(hSession); 466 if (! sess) { 471 if (pin_locked(&sess->session_info, 477 if (sess->session_info.state != CKS_RW_SO_FUNCTIONS) { 482 rc = token_specific.t_init_pin(sess->hContext, pPin, ulPinLen); 513 SESSION * sess = NULL; local 522 sess = session_mgr_find(hSession); 523 if (! sess) { 528 if (pin_locked(&sess 552 SESSION *sess; local 602 SESSION *sess = NULL; local 649 SESSION * sess = NULL; local 679 SESSION * sess = NULL; local 716 SESSION * sess = NULL; local 746 SESSION * sess = NULL; local 846 SESSION * sess = NULL; local 883 SESSION * sess = NULL; local 918 SESSION * sess = NULL; local 950 SESSION * sess = NULL; local 982 SESSION * sess = NULL; local 1009 SESSION * sess = NULL; local 1036 SESSION * sess = NULL; local 1062 SESSION * sess = NULL; local 1100 SESSION * sess = NULL; local 1146 SESSION * sess = NULL; local 1185 SESSION * sess = NULL; local 1231 SESSION * sess = NULL; local 1368 SESSION * sess = NULL; local 1414 SESSION * sess = NULL; local 1459 SESSION * sess = NULL; local 1504 SESSION * sess = NULL; local 1549 SESSION * sess = NULL; local 1589 SESSION * sess = NULL; local 1623 SESSION * sess = NULL; local 1667 SESSION * sess = NULL; local 1712 SESSION * sess = NULL; local 1756 SESSION * sess = NULL; local 1795 SESSION * sess = NULL; local 1839 SESSION * sess = NULL; local 1883 SESSION * sess = NULL; local 1927 SESSION * sess = NULL; local 1971 SESSION * sess = NULL; local 2009 SESSION * sess = NULL; local 2048 SESSION * sess = NULL; local 2087 SESSION * sess = NULL; local 2131 SESSION * sess = NULL; local 2180 SESSION * sess = NULL; local 2225 SESSION * sess = NULL; local 2274 SESSION * sess = NULL; local 2331 SESSION *sess = NULL; local [all...] |
H A D | sess_mgr.c | 332 * SESSION ** sess : new session pointer (OUTPUT) 337 session_mgr_new(CK_ULONG flags, SESSION **sess) argument 425 *sess = new_session; 555 session_mgr_close_session(SESSION *sess) argument 560 if (! sess) 566 node = dlist_find(sess_list, sess); 572 (void) object_mgr_purge_session_objects(sess, ALL); 574 if (sess->find_list) 575 free(sess->find_list); 577 if (sess 647 SESSION *sess = (SESSION *)sess_list->data; local 764 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument 987 session_mgr_set_op_state( SESSION *sess, CK_OBJECT_HANDLE encr_key, CK_OBJECT_HANDLE auth_key, CK_BYTE *data) argument [all...] |
H A D | mech_md5.c | 297 md5_hash(SESSION *sess, argument 305 if (! sess || ! ctx || ! out_data_len) { 321 md5_hmac_sign(SESSION * sess, argument 340 if (! sess || ! ctx || ! out_data_len) { 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 380 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 387 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 421 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 427 rc = digest_mgr_digest_update(sess, &digest_ctx, 434 rc = digest_mgr_digest_update(sess, 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | mech_sha.c | 30 sha1_hash(SESSION *sess, argument 38 if (! sess || ! ctx || ! out_data_len) { 56 sha1_hmac_sign(SESSION * sess, argument 74 if (! sess || ! ctx || ! out_data_len) { 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 112 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech); 119 rc = digest_mgr_digest(sess, FALSE, &digest_ctx, 157 rc = digest_mgr_digest_update(sess, &digest_ctx, 164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len); 171 rc = digest_mgr_digest_final(sess, 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument [all...] |
H A D | sign_mgr.c | 31 sign_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 250 sign_mgr_sign(SESSION * sess, argument 258 if (! sess || ! ctx) { 279 return (rsa_pkcs_sign(sess, length_only, ctx, 284 return (rsa_hash_pkcs_sign(sess, length_only, ctx, 290 return (md5_hmac_sign(sess, length_only, ctx, 295 return (sha1_hmac_sign(sess, length_only, ctx, 304 sign_mgr_sign_update(SESSION * sess, argument 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 31 verify_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx) { 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 231 verify_mgr_verify(SESSION * sess, argument 238 if (! sess || ! ctx) { 257 return (rsa_pkcs_verify(sess, ctx, 262 return (rsa_hash_pkcs_verify(sess, ctx, 268 return (md5_hmac_verify(sess, ctx, 273 return (sha1_hmac_verify(sess, ctx, 282 verify_mgr_verify_update(SESSION * sess, argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | dig_mgr.c | 300 digest_mgr_init(SESSION *sess, argument 304 if (! sess || ! ctx) { 372 digest_mgr_digest(SESSION *sess, argument 381 if (! sess || ! ctx) { 399 return (sha1_hash(sess, length_only, ctx, 405 return (md5_hash(sess, length_only, ctx, 414 digest_mgr_digest_update(SESSION *sess, argument 419 if (! sess || ! ctx) { 442 digest_mgr_digest_key(SESSION * sess, argument 451 if (!sess || !ct 478 digest_mgr_digest_final(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *hash, CK_ULONG *hash_len) argument [all...] |
H A D | obj_mgr.c | 305 check_object_access(SESSION *sess, OBJECT *o) argument 324 if (sess->session_info.state == CKS_RO_PUBLIC_SESSION) { 336 if (sess->session_info.state == CKS_RO_USER_FUNCTIONS) { 343 if (sess->session_info.state == CKS_RW_PUBLIC_SESSION) { 350 if (sess->session_info.state == CKS_RW_SO_FUNCTIONS) { 361 object_mgr_add(SESSION * sess, argument 370 if (! sess || ! pTemplate || ! handle) { 382 rc = check_object_access(sess, o); 394 o->session = sess; 434 rc = save_token_object(sess 500 object_mgr_add_to_map(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 542 object_mgr_copy(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE old_handle, CK_OBJECT_HANDLE * new_handle) argument 686 object_mgr_create_skel(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_ULONG mode, CK_ULONG obj_type, CK_ULONG sub_class, OBJECT ** obj) argument 751 object_mgr_create_final(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 869 object_mgr_destroy_object(SESSION * sess, CK_OBJECT_HANDLE handle) argument 1146 object_mgr_find_init(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1217 object_mgr_find_build_list(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, DL_NODE * obj_list, CK_BBOOL public_only) argument 1324 object_mgr_find_final(SESSION *sess) argument 1342 object_mgr_get_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 1478 object_mgr_purge_session_objects(SESSION * sess, SESS_OBJ_TYPE type) argument 1712 object_mgr_set_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument 2199 object_mgr_purge_map( SESSION *sess, SESS_OBJ_TYPE type) argument [all...] |
H A D | key_mgr.c | 59 key_mgr_generate_key_pair(SESSION * sess, argument 76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) { 130 rc = object_mgr_create_skel(sess, 137 rc = object_mgr_create_skel(sess, 148 sess->hContext, 207 rc = object_mgr_create_final(sess, publ_key_obj, publ_key_handle); 211 rc = object_mgr_create_final(sess, priv_key_obj, priv_key_handle); 213 (void) object_mgr_destroy_object(sess, *publ_key_handle); 232 key_mgr_wrap_key(SESSION * sess, argument 250 if (! sess || ! wrapped_key_le 349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument [all...] |
H A D | mech_rsa.c | 175 rsa_pkcs_encrypt(SESSION *sess, argument 190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 211 rc = ckm_rsa_encrypt(sess->hContext, in_data, in_data_len, out_data, 218 rsa_pkcs_decrypt(SESSION *sess, argument 233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 251 rc = ckm_rsa_decrypt(sess->hContext, in_data, 262 rsa_pkcs_sign(SESSION *sess, argument 277 if (! sess || ! ctx || ! out_data_len) { 280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 300 rc = ckm_rsa_sign(sess 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | decr_mgr.c | 33 SESSION *sess, 46 if (! sess) { 54 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 70 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 160 decr_mgr_decrypt(SESSION *sess, argument 168 if (! sess || ! ctx) { 182 return (rsa_pkcs_decrypt(sess, length_only, 32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument
|
H A D | encr_mgr.c | 31 encr_mgr_init(SESSION * sess, argument 45 if (! sess || ! ctx || ! mech) { 53 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 69 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 159 encr_mgr_encrypt(SESSION *sess, argument 167 if (! sess || ! ctx) { 181 return (rsa_pkcs_encrypt(sess, length_only,
|
/opensolaris-onvv-gate/usr/src/lib/smbsrv/libsmbrdr/common/ |
H A D | smbrdr_session.c | 209 smbrdr_trnsprt_connect(struct sdb_session *sess, uint16_t port) argument 219 if ((sock = socket(sess->srv_ipaddr.a_family, SOCK_STREAM, 0)) <= 0) { 225 if (sess->srv_ipaddr.a_family == AF_INET) { 228 sin.sin_addr.s_addr = sess->srv_ipaddr.a_ipv4; 232 (void) smb_inet_ntop(&sess->srv_ipaddr, ipstr, 233 SMB_IPSTRLEN(sess->srv_ipaddr.a_family)); 236 bcopy(&sess->srv_ipaddr.a_ipv6, &sin6.sin6_addr.s6_addr, 251 (void) smb_mbstowcs(unicode_server_name, sess->srv_name, 279 server_name, sess->scope, hostname, sess 312 smbrdr_smb_negotiate(struct sdb_session *sess) argument [all...] |
H A D | smbrdr_rpcpipe.c | 426 struct sdb_session *sess; local 439 sess = netuse->session; 440 logon = &sess->logon; 455 if (sess->remote_caps & CAP_UNICODE) { 464 sess, logon, netuse);
|
/opensolaris-onvv-gate/usr/src/uts/common/sys/ |
H A D | session.h | 85 typedef struct sess { struct
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.h | 87 extern void final_pk11(CK_SESSION_HANDLE sess); 90 CK_ULONG pinlen, CK_SESSION_HANDLE_PTR sess); 94 CK_SESSION_HANDLE_PTR sess);
|
H A D | common.c | 166 final_pk11(CK_SESSION_HANDLE sess) argument 174 close_sess(sess); 185 close_sess(CK_SESSION_HANDLE sess) argument 188 if (sess == NULL) { 197 logout_token(sess); 199 (void) C_CloseSession(sess); 207 logout_token(CK_SESSION_HANDLE sess) argument 210 if (sess == NULL) { 218 (void) C_Logout(sess);
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 259 struct session_op sess; local 266 memset(&sess, 0, sizeof(sess)); 267 sess.key = (caddr_t)"123456781234567812345678"; 272 sess.cipher = ciphers[i].id; 273 sess.keylen = ciphers[i].keylen; 274 sess.mac = 0; 275 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 276 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 298 struct session_op sess; local 376 struct session_op *sess = &state->d_sess; local 429 struct session_op *sess = &state->d_sess; local 467 struct session_op *sess = &state->d_sess; local [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/ssl/ |
H A D | s2_clnt.c | 616 SSL_SESSION *sess; local 630 sess=s->session; 635 i=ssl_put_cipher_by_char(s,sess->cipher,p); 640 sess->key_arg_length=i; 648 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) 653 sess->master_key_length=i; 656 if (i > (int)sizeof(sess->master_key)) 662 if (RAND_bytes(sess->master_key,i) <= 0) 669 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 671 else if (SSL_C_IS_EXPORT(sess [all...] |
H A D | ssl_sess.c | 77 SSL_SESSION *sess; local 82 sess = ssl->session; 83 if(sess) 84 sess->references++; 86 return(sess);
|
/opensolaris-onvv-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 816 CK_SESSION_HANDLE sess; local 840 rv = C_OpenSession(cipher->slot, CKF_SERIAL_SESSION, NULL, NULL, &sess); 858 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, 861 (void) C_CloseSession(sess); 966 getkeyfromtoken(CK_SESSION_HANDLE sess, argument 1007 rv = C_Login(sess, CKU_USER, (CK_UTF8CHAR_PTR)pass, passlen); 1061 rv = C_FindObjectsInit(sess, key_tmpl, attrs); 1065 rv = C_FindObjects(sess, &obj, 1, &num_objs); 1066 (void) C_FindObjectsFinal(sess); 1082 rv = pkcs11_ObjectToKey(sess, ob 1210 end_crypto(CK_SESSION_HANDLE sess) argument 1220 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument 1980 CK_SESSION_HANDLE sess; local [all...] |
/opensolaris-onvv-gate/usr/src/cmd/mdb/common/modules/idm/ |
H A D | idm.c | 178 static int iscsi_print_ini_sess(uintptr_t addr, iscsi_sess_t *sess, 243 int tpgt = 0, conn = 0, sess = 0, portal = 0; local 252 's', MDB_OPT_SETBITS, TRUE, &sess, 267 idc.u.child.idc_sess = sess; 1181 /* Walk sess tree */ 1185 mdb_warn("target sess list walk failed"); 1562 iscsi_print_ini_sess(uintptr_t addr, iscsi_sess_t *sess, argument 1580 sess->sess_type, sess->sess_state); 1584 sess [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/io/comstar/port/pppt/ |
H A D | pppt.c | 1321 pppt_sess_t *sess; local 1332 for (sess = avl_first(&tgt->target_sess_list); sess != NULL; 1333 sess = AVL_NEXT(&tgt->target_sess_list, sess)) { 1334 mutex_enter(&sess->ps_mutex); 1335 if ((result = avl_find(&sess->ps_task_list, 1341 mutex_exit(&sess->ps_mutex); 1346 mutex_exit(&sess->ps_mutex);
|
/opensolaris-onvv-gate/usr/src/uts/common/io/comstar/port/srpt/ |
H A D | srpt_stp.c | 1375 srpt_session_t sess; local 1384 bzero(&sess, sizeof (srpt_session_t)); 1385 (void) strlcpy(sess.ss_i_gid, remote_gid, SRPT_ALIAS_LEN); 1386 (void) strlcpy(sess.ss_t_gid, local_gid, SRPT_ALIAS_LEN); 1387 EUI_STR(sess.ss_i_name, 1389 EUI_STR(sess.ss_t_name, 1391 ALIAS_STR(sess.ss_i_alias, 1394 ALIAS_STR(sess.ss_t_alias, 1398 DTRACE_SRP_2(login__command, srpt_session_t, &sess, 1593 DTRACE_SRP_3(login__response, srpt_session_t, &sess, [all...] |