Home
last modified time | relevance | path

Searched full:mechanism (Results 1 – 25 of 1304) sorted by relevance

12345678910>>...53

/illumos-gate/usr/src/man/man8/
H A Dcryptoadm.812 [mechanism=\fImechanism-list\fR]
18 provider=\fIprovider-name\fR mechanism=\fImechanism-list\fR | random | all
24 provider=\fIprovider-name\fR mechanism=\fImechanism-list\fR | random | all
35 [mechanism=\fImechanism-list\fR]
85 system, configures the mechanism policy for each provider, and installs or
100 configure the metaslot's mechanism policy.
175 provider and the mechanism list that can be used with that provider. If the
188 Display the mechanism policy (that is, which mechanisms are available and which
191 the mechanism policy enforced on it only. If the metaslot keyword is specified,
192 display the mechanism policy enforced on the metaslot.
[all …]
H A Dgsscred.842 name as an \fBASCII\fR string and the \fBGSS-API\fRsecurity mechanism that
43 applies to it. The security mechanism will be in string representation as
49 must be specified: \fB-n\fR, \fB-u\fR, or \fB-m\fR. If no security mechanism is
51 the \fIuid\fR or \fIuser\fR name. If only the security mechanism is specified,
52 then all \fIuser\fR entries for that security mechanism will be deleted.
59 mechanism is specified, then all \fIuser\fR entries for that security mechanism
95 Specify the mechanism for which this name is to be translated.
137 Mechanism
141 security mechanism. \fBgsscred\fR obtains \fIuser\fR names and \fIuid\fR's from
154 Security Mechanism
[all …]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_crypt.c85 CK_MECHANISM mechanism; in smb_auth_hmac_md5() local
90 mechanism.mechanism = CKM_MD5_HMAC; in smb_auth_hmac_md5()
91 mechanism.pParameter = 0; in smb_auth_hmac_md5()
92 mechanism.ulParameterLen = 0; in smb_auth_hmac_md5()
93 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); in smb_auth_hmac_md5()
98 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism, in smb_auth_hmac_md5()
106 rv = C_SignInit(hSession, &mechanism, hKey); in smb_auth_hmac_md5()
138 CK_MECHANISM mechanism; in smb_auth_DES() local
166 * the mechanism we plan on using. in smb_auth_DES()
168 mechanism.mechanism = CKM_DES_ECB; in smb_auth_DES()
[all …]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dcrypt.c62 CK_MECHANISM mechanism; in smb_encrypt_DES() local
90 * the mechanism we plan on using. in smb_encrypt_DES()
92 mechanism.mechanism = CKM_DES_ECB; in smb_encrypt_DES()
93 mechanism.pParameter = NULL; in smb_encrypt_DES()
94 mechanism.ulParameterLen = 0; in smb_encrypt_DES()
95 rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession); in smb_encrypt_DES()
105 rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism, in smb_encrypt_DES()
112 rv = C_EncryptInit(hSession, &mechanism, hKey); in smb_encrypt_DES()
172 CK_MECHANISM mechanism; in smb_encrypt_RC4() local
181 * the mechanism we plan on using. in smb_encrypt_RC4()
[all …]
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Keys.c35 * the framework, that the mechanism is not disabled for the slot
50 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { in C_GenerateKey()
70 /* Make sure this is not a disabled mechanism */ in C_GenerateKey()
71 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { in C_GenerateKey()
90 * the framework, that the mechanism is not disabled for the slot
108 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { in C_GenerateKeyPair()
130 /* Make sure this is not a disabled mechanism */ in C_GenerateKeyPair()
131 if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) { in C_GenerateKeyPair()
151 * the framework, that the mechanism is not disabled for the slot
167 pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) { in C_WrapKey()
[all …]
H A DmetaMechManager.c27 * Mechanism Manager - centralized knowledge of mechanisms.
33 * Each element in the array represents a particular mechanism type. The
34 * array is sorted by type, so that searching by mechanism can be done
35 * quickly. Each element also contains the mechanism data for each slot.
153 * Also, it may not be allowed based on the mechanism policy. in meta_mechManager_get_mechs()
200 * Get list of all slots supporting the specified mechanism.
204 * specified mechanism. The "num_supporting_slots" field
206 * many slots are found to support the mechanism.
269 * Updates a mechanism in the mechlist. If the mechanism is not
270 * listed, all providers will be queried. If the mechanism
[all …]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerifyUtil.c52 * verify init routine based on the mechanism.
60 switch (pMechanism->mechanism) { in soft_verify_init()
132 * verify routine based on the mechanism.
141 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; in soft_verify() local
144 switch (mechanism) { in soft_verify()
237 pSignature, ulSignatureLen, mechanism)); in soft_verify()
246 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); in soft_verify()
284 * verify update routine based on the mechanism.
291 CK_MECHANISM_TYPE mechanism = session_p->verify.mech.mechanism; in soft_verify_update() local
293 switch (mechanism) { in soft_verify_update()
[all …]
H A DsoftSignUtil.c51 * sign init routine based on the mechanism.
59 switch (pMechanism->mechanism) { in soft_sign_init()
131 * sign routine based on the mechanism.
140 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; in soft_sign() local
143 switch (mechanism) { in soft_sign()
221 pSignature, pulSignatureLen, mechanism)); in soft_sign()
230 pSignature, pulSignatureLen, mechanism, B_FALSE)); in soft_sign()
268 * sign update routine based on the mechanism.
275 CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism; in soft_sign_update() local
277 switch (mechanism) { in soft_sign_update()
[all …]
H A DsoftRSA.c228 session_p->encrypt.mech.mechanism = pMechanism->mechanism; in soft_rsa_crypt_init_common()
232 session_p->decrypt.mech.mechanism = pMechanism->mechanism; in soft_rsa_crypt_init_common()
242 CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_encrypt_common() argument
268 if (mechanism == CKM_RSA_PKCS) { in soft_rsa_encrypt_common()
294 if (mechanism == CKM_RSA_PKCS) { in soft_rsa_encrypt_common()
332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_decrypt_common() argument
362 if (mechanism == CKM_RSA_X_509) { in soft_rsa_decrypt_common()
375 if (mechanism == CKM_RSA_PKCS) { in soft_rsa_decrypt_common()
434 switch (pMechanism->mechanism) { in soft_rsa_sign_verify_init_common()
436 digest_mech.mechanism = CKM_MD5; in soft_rsa_sign_verify_init_common()
[all …]
/illumos-gate/usr/src/uts/common/crypto/core/
H A Dkcf_mech_tabs.c45 * the mech_class identifies the table the mechanism belongs to.
46 * mech_index is the index for that mechanism in the table.
47 * A mechanism belongs to exactly 1 table.
63 * mechanism table via kcf_create_mech_entry().
75 * The number of providers for a particular mechanism is not expected to be
76 * long enough to justify the cost of using rwlocks, so the per-mechanism
178 /* Then the pre-defined mechanism entries */ in kcf_init_mech_tabs()
252 /* 1 random number generation pseudo mechanism */ in kcf_init_mech_tabs()
283 * . The class of mechanism.
284 * . the name of the new mechanism.
[all …]
/illumos-gate/usr/src/man/man3gss/
H A Dgss_inquire_cred_by_mech.3gss8 gss_inquire_cred_by_mech \- obtain per-mechanism information about a credential
29 contexts under the specified mechanism. If the credential can no longer be used
30 to accept contexts, or if the credential usage for this mechanism is
51 How the credential may be used with the specified mechanism. The
64 contexts under the specified mechanism. If the credential can no longer be used
65 to initiate contexts, or if the credential usage for this mechanism is
76 The mechanism for which the information should be returned.
85 A mechanism specific status code.
102 The \fBgss_inquire_cred_by_mech()\fR function obtains per-mechanism information
142 The underlying mechanism detected an error for which no specific \fBGSS\fR
[all …]
H A Dgss_canonicalize_name.3gss8 gss_canonicalize_name \- convert an internal name to a mechanism name
23 The \fBgss_canonicalize_name()\fR function generates a canonical mechanism name
24 from an arbitrary internal name. The mechanism name is the name that would be
29 specifying \fImech_type\fR as the authentication mechanism.
40 Mechanism-specific status code.
58 The authentication mechanism for which the canonical form of the name is
59 desired. The desired mechanism must be specified explicitly; no default is
92 The identified mechanism is not supported.
102 specified mechanism.
120 The underlying mechanism detected an error for which no specific \fBGSS\fR
[all …]
H A Dgss_add_cred.3gss38 Mechanism specific status code.
69 Underlying security mechanism with which the credential can be used.
150 initiating contexts using the specified mechanism. If a mechanism does not
162 accepting security contexts using the specified mechanism. If a mechanism does
173 function for login to the network would involve creating new mechanism-specific
187 acceptors. The \fBGSS-API\fR provides mechanism-specific ways to obtain
212 If credential acquisition is time consuming for a mechanism, the mechanism can
215 \fBgss_accept_sec_context\fR(3GSS). Such mechanism-specific implementation
265 An unavailable mechanism has been requested.
292 The credential already contains an element for the requested mechanism that has
[all …]
H A Dgss_inquire_names_for_mech.3gss9 mechanism
17 \fBconst gss_OID\fR \fImechanism\fR,\fBgss_OID_set *\fR\fIname_types\fR);
24 supported by the specified mechanism.
35 A mechanism-specific status code.
41 \fB\fImechanism\fR\fR
44 The mechanism to be interrogated.
53 Set of name-types supported by the specified mechanism. The returned \fBOID\fR
78 The underlying mechanism detected an error for which no specific \fBGSS\fR
79 status code is defined. The mechanism-specific status code reported by means
H A Dgss_export_name.3gss8 gss_export_name \- convert a mechanism name to export form
23 converted into a mechanism-specific name. The function produces a canonical
24 contiguous string representation of a mechanism name, suitable for direct
27 must specify a valid mechanism name, that is, an internal name generated by
39 A mechanism-specific status code.
48 The mechanism name to be exported.
81 The provided internal name was not a mechanism name.
90 The underlying mechanism detected an error for which no specific \fBGSS\fR
91 status code is defined. The mechanism-specific status code reported by means
/illumos-gate/usr/src/uts/common/gssapi/
H A Dgssd.x88 OM_UINT32 minor_status; /* status from the mechanism */
112 OM_UINT32 minor_status; /* status from the mechanism */
126 OM_UINT32 minor_status; /* status from the mechanism */
138 GSS_OID mech_type; /* requested mechanism */
149 OM_UINT32 minor_status; /* status from the mechanism */
150 GSS_OID actual_mech_type; /* actual mechanism used */
171 OM_UINT32 minor_status; /* status from the mechanism */
173 GSS_OID mech_type; /* mechanism used */
189 OM_UINT32 minor_status; /* status from the mechanism */
199 OM_UINT32 minor_status; /* status from the mechanism */
[all …]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Daes.c62 * Mechanism info structure passed to KCF during registration.
265 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) in aes_check_mech_param() argument
273 switch (mechanism->cm_type) { in aes_check_mech_param()
306 if (param_required && mechanism->cm_param != NULL && in aes_check_mech_param()
307 mechanism->cm_param_len != param_len) { in aes_check_mech_param()
356 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in aes_encrypt_init() argument
360 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE)); in aes_encrypt_init()
364 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in aes_decrypt_init() argument
368 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE)); in aes_decrypt_init()
377 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in aes_common_init() argument
[all …]
H A Dsha2_mod.c69 /* to extract the digest length passed as mechanism parameter */
87 * Mechanism info structure passed to KCF during registration.
272 sha2_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in sha2_digest_init() argument
284 PROV_SHA2_CTX(ctx)->sc_mech_type = mechanism->cm_type; in sha2_digest_init()
285 SHA2Init(mechanism->cm_type, &PROV_SHA2_CTX(ctx)->sc_sha2_ctx); in sha2_digest_init()
795 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in sha2_digest_atomic() argument
807 SHA2Init(mechanism->cm_type, &sha2_ctx); in sha2_digest_atomic()
834 if (mechanism->cm_type <= SHA256_HMAC_GEN_MECH_INFO_TYPE) in sha2_digest_atomic()
933 sha2_is_general_hmech(const crypto_mechanism_t *mechanism) in sha2_is_general_hmech() argument
935 switch (mechanism->cm_type) { in sha2_is_general_hmech()
[all …]
H A Dskein_mod.c193 skein_get_digest_bitlen(const crypto_mechanism_t *mechanism, size_t *result) in skein_get_digest_bitlen() argument
195 if (mechanism->cm_param != NULL) { in skein_get_digest_bitlen()
197 skein_param_t *param = (skein_param_t *)mechanism->cm_param; in skein_get_digest_bitlen()
199 if (mechanism->cm_param_len != sizeof (*param) || in skein_get_digest_bitlen()
205 switch (mechanism->cm_type) { in skein_get_digest_bitlen()
489 * Initializes a skein digest context to the configuration in `mechanism'.
490 * The mechanism cm_type must be one of SKEIN_*_MECH_INFO_TYPE. The cm_param
497 skein_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in skein_digest_init() argument
502 if (!VALID_SKEIN_DIGEST_MECH(mechanism->cm_type)) in skein_digest_init()
510 SKEIN_CTX(ctx)->sc_mech_type = mechanism->cm_type; in skein_digest_init()
[all …]
/illumos-gate/usr/src/lib/libgss/
H A Dg_initialize.c27 * load mechanism libraries.
29 * It also contain functions requiring direct access to the mechanism's
31 * functions which translate the mechanism strings to oids and vise versa.
33 * The mechanism libraries are loaded on demand. This is triggered
68 * of gss-api mechanism modules.
110 * list of mechanism libraries and their entry points.
138 * look through the loaded mechanism libraries for
141 * the OID was recognized as an internal mechanism OID. if no
146 * we can walk the mechanism list without a mutex, because we
148 * Mechanism entries are always added to the end, and as
[all …]
H A DREADME.spi31 provided by each mechanism whose return value is a pointer to a
32 structure full of references to the mechanism's entry points
36 means that additions of any mechanism methods at micro/patch
48 - any new SPI mechanism methods will NOT be placed in gss_config,
55 is used to get at the gss_config_ext for a mechanism;
59 and every mechanism method that isn't part of the old gss_config
101 Solaris native mechanisms may still provide the mechanism method
108 - libgss will look for and find the mechanism's
110 mechanism provider's mechanism OIDs.
112 - libgss will dlsym() each mechanism provider SPI method.
/illumos-gate/usr/src/man/man5/
H A Dmech.58 mech, qop \- mechanism and QOP files
36 \fB\fImechanism name\fR\fR
40 \fBASCII\fR string representing the mechanism.
50 \fBRPC\fR \fBOID\fR for this mechanism.
60 Shared library which implements the services provided by this mechanism.
70 Kernel module which implements the services provided by this mechanism.
80 Optional parameters that are interpreted by the individual mechanism with which
82 documentation for the individual mechanism, if any. Not all mechanisms have
112 \fB\fImechanism name\fR \fR
115 \fBASCII\fR string representing the mechanism with which this \fBQOP\fR is
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_common.c39 * of gss-api mechanism modules.
78 * __dh_generic_initialize: This routine is called from the mechanism
80 * libgss to initialize a mechanism. This routine takes a pointer to
81 * a struct gss_config, the OID for the calling mechanism and that mechanisms
89 __dh_generic_initialize(gss_mechanism dhmech, /* The mechanism to initialize */ in __dh_generic_initialize()
90 gss_OID_desc mech_type, /* OID of mechanism */ in __dh_generic_initialize()
91 dh_keyopts_t keyopts /* Key mechanism entry points */) in __dh_generic_initialize()
118 /* Set the mechanism OID */ in __dh_generic_initialize()
121 /* Grab the mechanism context */ in __dh_generic_initialize()
127 /* Set a handle to the mechanism OID in the per mechanism context */ in __dh_generic_initialize()
/illumos-gate/usr/src/man/man3nsl/
H A Drpcsec_gss.3nsl22 moreover, they can use any security mechanism (such as RSA public key or
32 they wish to use. Type of security service is mechanism-independent.
38 mechanism, Quality of Protection (QOP), and type of service at context
40 integrity or privacy, and is mechanism-dependent.) Once a context is
46 name service. Each mechanism has a default QOP.
121 char actual_mechanism[MAX_GSS_MECH]; /*mechanism used*/
129 The (mechanism-dependent, opaque) client principal type. Used as an argument
153 char *mechanism; /*security mechanism*/
340 Get valid mechanism strings
370 Checks if a mechanism is installed
[all …]
/illumos-gate/usr/src/uts/common/des/
H A Ddes_crypt.c120 * Mechanism info structure passed to KCF during registration.
433 des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, in des_common_init() argument
451 /* Check mechanism type and parameter length */ in des_common_init()
452 switch (mechanism->cm_type) { in des_common_init()
457 if (mechanism->cm_param != NULL && in des_common_init()
458 mechanism->cm_param_len != DES_BLOCK_LEN) in des_common_init()
470 if (mechanism->cm_param != NULL && in des_common_init()
471 mechanism->cm_param_len != DES_BLOCK_LEN) in des_common_init()
483 if ((rv = des_common_init_ctx(des_ctx, template, mechanism, key, in des_common_init()
786 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in des_encrypt_atomic() argument
[all …]

12345678910>>...53