| /src/external/ibm-public/postfix/dist/src/global/ |
| sasl_mech_filter.c | 79 char *mech; local 95 while ((mech = mystrtok(&mech_list, " \t")) != 0) { 96 if (string_list_match(filter, mech)) { 99 vstring_strcat(buf, mech); 101 msg_info("%s: keep SASL mechanism: '%s'", myname, mech); 104 myname, mech); 107 msg_info("%s: drop SASL mechanism: '%s'", myname, mech);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| creds.c | 47 krb5_data data, mech; local 146 mech.data = GSS_KRB5_MECHANISM->elements; 147 mech.length = GSS_KRB5_MECHANISM->length; 149 ret = krb5_store_data(sp, mech);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/spnego/ |
| compat.c | 206 MechType mech; local 216 &mech, 220 ret = add_MechTypeList(mechtypelist, &mech); 221 free_MechType(&mech); 225 ret = der_get_oid(mech_type->elements, mech_type->length, &mech, NULL); 228 ret = add_MechTypeList(mechtypelist, &mech); 229 free_MechType(&mech);
|
| spnego_locl.h | 105 gss_name_t mech; member in struct:__anon824
|
| init_sec_context.c | 39 * Is target_name an sane target for `mechยด. 43 initiator_approved(gss_name_t target_name, gss_OID mech) 53 mech, 63 gss_mg_collect_error(mech, maj_stat, min_stat); 395 gss_OID_desc mech; local 480 /* if a token (of non zero length), or no context, pass to underlaying mech */ 494 mech.length = ctx->oidlen; 495 mech.elements = ctx->oidbuf + sizeof(ctx->oidbuf) - ctx->oidlen; 503 &mech, 515 gss_mg_collect_error(&mech, ret, minor) [all...] |
| /src/crypto/external/bsd/libsaslc/dist/src/ |
| saslc_private.h | 42 #include "mech.h" 57 const saslc__mech_t *mech; /* mechanism */ member in struct:saslc_sess_t
|
| mech.h | 1 /* $NetBSD: mech.h,v 1.5 2025/12/16 12:03:39 nia Exp $ */ 128 const saslc__mech_t *mech; /**< mechanism */ member in struct:saslc__mech_list_node_t
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/ |
| context.c | 7 gss_OID mech; member in struct:mg_thread_ctx 68 _gss_mg_get_error(const gss_OID mech, OM_uint32 type, 79 * We cant check the mech here since a pseudo-mech might have 80 * called an lower layer and then the mech info is all broken 82 if (mech != NULL && gss_oid_equal(mg->mech, mech) == 0) 132 mg->mech = &m->gm_mech_oid; 159 gss_mg_collect_error(gss_OID mech, OM_uint32 maj, OM_uint32 min [all...] |
| /src/external/bsd/openldap/dist/contrib/ldapc++/src/ |
| LDAPBindRequest.cpp | 48 const char* mech = (m_mech == "" ? 0 : m_mech.c_str()); local 67 mech, tmpcred, tmpSrvCtrls, tmpClCtrls, &msgID); 80 LDAPSaslBindRequest::LDAPSaslBindRequest(const std::string& mech, 84 bool isReferral) : LDAPRequest(connect, cons, isReferral),m_mech(mech), m_cred(cred) {} 117 LDAPSaslInteractiveBind::LDAPSaslInteractiveBind( const std::string& mech, 121 m_mech(mech), m_flags(flags), m_sih(sih), m_res(0)
|
| /src/external/bsd/openldap/dist/libraries/liblutil/ |
| sasl.c | 42 char *mech; member in struct:lutil_sasl_defaults_s 60 if (defs->mech) ber_memfree(defs->mech); 73 char *mech, 85 defaults->mech = mech ? ber_strdup(mech) : NULL; 91 if( defaults->mech == NULL ) { 92 ldap_get_option( ld, LDAP_OPT_X_SASL_MECH, &defaults->mech );
|
| /src/external/bsd/openldap/dist/servers/slapd/ |
| bind.c | 50 struct berval mech = BER_BVNULL; local 68 "%s BIND anonymous mech=implicit bind_ssf=0 ssf=%d\n", 125 tag = ber_scanf( ber, "{m" /*}*/, &mech ); 176 Debug( LDAP_DEBUG_TRACE, "do_bind: dn (%s) SASL mech %s\n", 177 op->o_req_dn.bv_val, mech.bv_val ); 208 op->orb_mech = mech; 216 ber_dupbv( &op->o_conn->c_authmech, &mech ); 542 "%s BIND dn=\"%s\" mech=%s bind_ssf=0 ssf=%d\n",
|
| slapcommon.h | 81 #define mech tool_globals.tv_mech macro
|
| saslauthz.c | 68 * syntax: u[.mech[/realm]]:<val> 70 * where mech is a SIMPLE, AUTHZ, or a SASL mechanism name 133 struct berval *realm, struct berval *mech ) 141 assert( mech != NULL ); 151 * u[.mech[/realm]]:user 164 mech->bv_val = id->bv_val + 2; 165 mech->bv_len = user->bv_val - mech->bv_val - 1; 167 realm->bv_val = ber_bvchr( mech, '/' ); 172 mech->bv_len = realm->bv_val - mech->bv_val - 1 315 mech = BER_BVNULL; local 627 mech = BER_BVNULL; local 1059 mech = BER_BVNULL; local [all...] |
| /src/external/ibm-public/postfix/dist/src/xsasl/ |
| xsasl_saslc_client.c | 134 const char *mech; local 150 mech = saslc_sess_getmech(client->sess); 152 *mechanism = mech; 154 msg_info("%s: mechanism='%s'", __func__, mech);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ |
| gsstool.c | 72 #define COL_MECH "Mech" 138 print_mech_attr(const char *mechname, gss_const_OID mech, gss_OID_set set) 152 if (mech) 164 if (mech) { 167 if (gss_mo_get(mech, &set->elements[n], &value) != 0) 192 gss_OID mech = GSS_C_NO_OID; local 196 mech = gss_name_to_oid(opt->mech_string); 197 if (mech == NULL) 198 errx(1, "mech %s is unknown", opt->mech_string); 201 major = gss_inquire_attrs_for_mech(&minor, mech, &mech_attr, &known_mech_attrs) [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| gss-serv.c | 185 gss_OID mech; local 189 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech, 287 client->mech = NULL; 293 client->mech = supported_mechs[i]; 297 if (client->mech == NULL) 339 if (gssapi_client.mech && gssapi_client.mech->storecreds) { 340 (*gssapi_client.mech->storecreds)(&gssapi_client); 373 if (gssapi_client.mech && gssapi_client.mech->userok [all...] |
| ssh-gss.h | 56 struct ssh_gssapi_mech_struct *mech; member in struct:__anon1137
|
| /src/external/bsd/openldap/dist/servers/lloadd/ |
| bind.c | 199 struct berval binddn, auth, mech = BER_BVNULL; local 316 if ( ber_get_stringbv( copy, &mech, LBER_BV_NOTERM ) == LBER_ERROR ) { 319 if ( !ber_bvcmp( &mech, &mech_external ) ) { 333 ber_dupbv( &client->c_sasl_bind_mech, &mech ); 334 } else if ( ber_bvcmp( &mech, &client->c_sasl_bind_mech ) ) { 335 ber_bvreplace( &client->c_sasl_bind_mech, &mech ); 472 if ( BER_BVISNULL( &mech ) ) { 477 } else if ( ber_bvcmp( &upstream->c_sasl_bind_mech, &mech ) ) { 478 ber_bvreplace( &upstream->c_sasl_bind_mech, &mech );
|
| upstream.c | 328 const char *mech = NULL; local 399 &mech ); 409 ber_str2bv( mech, 0, 0, &c->c_sasl_bind_mech ); 434 "connid=%lu mech=%s setting up a new SASL security layer\n", 443 "connid=%lu next step for SASL bind mech=%s rc=%d\n",
|
| /src/external/bsd/openldap/dist/tests/progs/ |
| slapd-common.h | 60 char *mech; member in struct:tester_conn_args 85 "[-x | -Y <SASL mech>] "
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| pkcs11ecdsa_link.c | 78 CK_MECHANISM mech = { 0, NULL, 0 }; local 89 mech.mechanism = CKM_SHA256; 91 mech.mechanism = CKM_SHA384; 107 PK11_RET(pkcs_C_DigestInit, (pk11_ctx->session, &mech), ISC_R_FAILURE); 158 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local 244 (pk11_ctx->session, &mech, 281 CK_MECHANISM mech = { CKM_ECDSA, NULL, 0 }; local 349 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 469 CK_MECHANISM mech = { CKM_EC_KEY_PAIR_GEN, NULL, 0 }; local 525 (pk11_ctx->session, &mech, pubTemplate, (CK_ULONG)6 [all...] |
| pkcs11eddsa_link.c | 119 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local 213 (pk11_ctx->session, &mech, 254 CK_MECHANISM mech = { CKM_EDDSA, NULL, 0 }; local 321 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 442 CK_MECHANISM mech = { CKM_EC_EDWARDS_KEY_PAIR_GEN, NULL, 0 }; local 498 (pk11_ctx->session, &mech, pubTemplate, (CK_ULONG)6,
|
| pkcs11rsa_link.c | 61 CK_MECHANISM mech = { 0, NULL, 0 }; local 225 mech.mechanism = CKM_SHA1_RSA_PKCS; 228 mech.mechanism = CKM_SHA256_RSA_PKCS; 231 mech.mechanism = CKM_SHA512_RSA_PKCS; 237 PK11_RET(pkcs_C_SignInit, (pk11_ctx->session, &mech, pk11_ctx->object), 280 CK_MECHANISM mech = { 0, NULL, 0 }; local 384 mech.mechanism = CKM_SHA1_RSA_PKCS; 387 mech.mechanism = CKM_SHA256_RSA_PKCS; 390 mech.mechanism = CKM_SHA512_RSA_PKCS; 397 (pk11_ctx->session, &mech, pk11_ctx->object), ISC_R_FAILURE) 555 CK_MECHANISM mech = { 0, NULL, 0 }; local 670 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local 902 CK_MECHANISM mech = { CKM_RSA_PKCS, NULL, 0 }; local 1091 CK_MECHANISM mech = { CKM_RSA_PKCS_KEY_PAIR_GEN, NULL, 0 }; local [all...] |
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| cyrus.c | 449 const char *mech; local 598 mech = NULL; 609 &mech ); 611 if( pmech == NULL && mech != NULL ) { 612 pmech = mech; 613 *rmech = mech; 658 mech = *rmech; 659 if ( rc == LDAP_SUCCESS && mech == NULL ) { 710 rc = ldap_sasl_bind( ld, dn, mech, &ccred, sctrls, cctrls, msgid );
|
| /src/external/bsd/openldap/dist/servers/slapd/overlays/ |
| otp.c | 571 const void *mech ) 596 do_hmac( mech, &key, &data, &digval ); 625 const void *mech; local 669 if ( !(mech = otp_choose_mech( &a->a_vals[0] )) ) { 683 generate( secret, last_step + i, otp_len, &out, mech ); 712 const void *mech; local 773 if ( !(mech = otp_choose_mech( &a->a_vals[0] )) ) { 791 generate( secret, t + i, otp_len, &out, mech );
|