Lines Matching refs:CK_BYTE
56 CK_RV token_rng(TSS_HCONTEXT, CK_BYTE *, CK_ULONG);
64 CK_BYTE *,
66 CK_BYTE *,
73 CK_BYTE *,
75 CK_BYTE *,
82 CK_BYTE *,
84 CK_BYTE *,
89 token_specific_rsa_verify(TSS_HCONTEXT, CK_BYTE *,
90 CK_ULONG, CK_BYTE *, CK_ULONG, OBJECT *);
102 CK_BYTE *,
107 CK_BYTE *,
161 CK_BYTE current_user_pin_sha[SHA1_DIGEST_LENGTH];
162 CK_BYTE current_so_pin_sha[SHA1_DIGEST_LENGTH];
167 verify_user_pin(TSS_HCONTEXT, CK_BYTE *);
461 CK_BYTE pubexp_bytes[] = { 1, 0, 1 };
600 token_rng(TSS_HCONTEXT hContext, CK_BYTE *output, CK_ULONG bytes)
1065 TSS_POLICY_USAGE, *hKey, (CK_BYTE *)hash);
1374 token_create_private_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash)
1465 token_create_public_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash)
1559 CK_BYTE hash_sha[SHA1_DIGEST_LENGTH];
1702 check_pin_properties(CK_USER_TYPE userType, CK_BYTE *pinHash,
1735 verify_user_pin(TSS_HCONTEXT hContext, CK_BYTE *hash_sha)
1791 CK_BYTE oldpin_hash[SHA1_DIGEST_LENGTH];
1792 CK_BYTE newpin_hash[SHA1_DIGEST_LENGTH];
1919 CK_BYTE hash_sha[SHA1_DIGEST_LENGTH];
2016 CK_BYTE *authData, TEMPLATE *publ_tmpl,
2075 token_unwrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *encAuthData,
2404 CK_BYTE * in_data,
2406 CK_BYTE * out_data,
2480 CK_BYTE * in_data,
2482 CK_BYTE * out_data,
2502 CK_BYTE * in_data,
2504 CK_BYTE * sig,
2553 CK_BYTE * in_data,
2555 CK_BYTE * out_data,
2609 CK_BYTE *in_data,
2611 CK_BYTE *out_data,
2719 CK_BYTE * in_data,
2721 CK_BYTE * out_data,
2750 CK_BYTE *in_data, /* signature */
2752 CK_BYTE *out_data, /* decrypted */