Searched defs:key_p (Results 1 - 25 of 30) sorted by relevance

12

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftARCFourCrypt.c45 soft_object_t *key_p, soft_session_op_t op)
54 keyvallen = (int)OBJ_SEC_VALUE_LEN(key_p);
56 keyvallen = OBJ_SEC_VALUE_LEN(key_p);
63 keyval = OBJ_SEC_VALUE(key_p);
44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument
H A DsoftDigest.c287 soft_object_t *key_p; local
302 HANDLE2OBJECT(hKey, key_p, rv);
318 OBJ_REFRELE(key_p);
332 rv = soft_digest_key(session_p, key_p);
340 OBJ_REFRELE(key_p);
345 OBJ_REFRELE(key_p);
H A DsoftSign.c40 soft_object_t *key_p; local
57 HANDLE2OBJECT(hKey, key_p, rv);
63 if (!(key_p->bool_attr_mask & SIGN_BOOL_ON)) {
86 rv = soft_sign_init(session_p, pMechanism, key_p);
95 OBJ_REFRELE(key_p);
297 soft_object_t *key_p; local
314 HANDLE2OBJECT(hKey, key_p, rv);
320 if (!(key_p->bool_attr_mask & SIGN_RECOVER_BOOL_ON)) {
343 rv = soft_sign_recover_init(session_p, pMechanism, key_p);
352 OBJ_REFRELE(key_p);
[all...]
H A DsoftVerify.c40 soft_object_t *key_p; local
57 HANDLE2OBJECT(hKey, key_p, rv);
63 if (!(key_p->bool_attr_mask & VERIFY_BOOL_ON)) {
86 rv = soft_verify_init(session_p, pMechanism, key_p);
95 OBJ_REFRELE(key_p);
268 soft_object_t *key_p; local
285 HANDLE2OBJECT(hKey, key_p, rv);
291 if (!(key_p->bool_attr_mask & VERIFY_RECOVER_BOOL_ON)) {
314 rv = soft_verify_recover_init(session_p, pMechanism, key_p);
323 OBJ_REFRELE(key_p);
[all...]
H A DsoftDecrypt.c41 soft_object_t *key_p; local
58 HANDLE2OBJECT(hKey, key_p, rv);
63 if (!(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) {
87 rv = soft_decrypt_init(session_p, pMechanism, key_p);
96 OBJ_REFRELE(key_p);
H A DsoftDigestUtil.c475 soft_digest_key(soft_session_t *session_p, soft_object_t *key_p) argument
481 if (key_p->class != CKO_SECRET_KEY)
484 if ((OBJ_SEC_VALUE(key_p) == NULL) ||
485 (OBJ_SEC_VALUE_LEN(key_p) == 0))
488 rv = soft_digest_update(session_p, OBJ_SEC_VALUE(key_p),
489 OBJ_SEC_VALUE_LEN(key_p));
H A DsoftEncrypt.c40 soft_object_t *key_p; local
57 HANDLE2OBJECT(hKey, key_p, rv);
62 if (!(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) {
86 rv = soft_encrypt_init(session_p, pMechanism, key_p);
95 OBJ_REFRELE(key_p);
H A DsoftSignUtil.c45 * key_p: pointer to key soft_object_t struct
54 soft_object_t *key_p)
75 pMechanism, key_p, B_TRUE));
87 key_p, B_TRUE));
93 key_p, B_TRUE));
99 key_p, B_TRUE));
105 key_p, B_TRUE));
408 soft_object_t *key_p)
417 key_p, B_TRUE));
53 soft_sign_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
407 soft_sign_recover_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
H A DsoftVerifyUtil.c46 * key_p: pointer to key soft_object_t struct
55 soft_object_t *key_p)
76 pMechanism, key_p, B_FALSE));
88 key_p, B_FALSE));
94 key_p, B_FALSE));
100 key_p, B_FALSE));
106 key_p, B_FALSE));
441 soft_object_t *key_p)
450 key_p, B_FALSE));
54 soft_verify_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
440 soft_verify_recover_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
H A DsoftBlowfishCrypt.c39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op)
66 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) {
67 if (OBJ_KEY_SCHED(key_p) == NULL) {
70 (void) pthread_rwlock_wrlock(&key_p->object_rwlock);
71 if (OBJ_KEY_SCHED(key_p) == NULL) {
75 &key_p->object_rwlock);
81 blowfish_init_keysched(OBJ_SEC_VALUE(key_p),
82 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks);
84 OBJ_KEY_SCHED_LEN(key_p) = size;
85 OBJ_KEY_SCHED(key_p)
38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument
[all...]
H A DsoftDecryptUtil.c67 * key_p: pointer to key soft_object_t struct
83 soft_object_t *key_p)
95 if (key_p->key_type != CKK_DES) {
105 if ((key_p->key_type != CKK_DES2) &&
106 (key_p->key_type != CKK_DES3)) {
112 key_p, SOFT_DECRYPT_OP);
125 key_p->key_type);
153 if (key_p->key_type != CKK_DES) {
164 if ((key_p->key_type != CKK_DES2) &&
165 (key_p
82 soft_decrypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
[all...]
H A DsoftAESCrypt.c72 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p,
99 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) {
100 if (OBJ_KEY_SCHED(key_p) == NULL) {
103 (void) pthread_rwlock_wrlock(&key_p->object_rwlock);
104 if (OBJ_KEY_SCHED(key_p) == NULL) {
108 &key_p->object_rwlock);
115 aes_init_keysched(OBJ_SEC_VALUE(key_p), (uint_t)
116 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks);
118 aes_init_keysched(OBJ_SEC_VALUE(key_p),
119 (OBJ_SEC_VALUE_LEN(key_p) *
71 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument
[all...]
H A DsoftDESCrypt.c45 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p,
58 if (key_p->key_type == CKK_DES)
69 soft_des_ctx->key_type = key_p->key_type;
79 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) {
80 if (OBJ_KEY_SCHED(key_p) == NULL) {
83 (void) pthread_rwlock_wrlock(&key_p->object_rwlock);
84 if (OBJ_KEY_SCHED(key_p) == NULL) {
85 if (key_p->key_type == CKK_DES)
91 &key_p->object_rwlock);
97 if (key_p
44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument
748 soft_des_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op) argument
[all...]
H A DsoftDSA.c48 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p,
58 if ((key_p->class != CKO_PRIVATE_KEY) ||
59 (key_p->key_type != CKK_DSA))
62 if ((key_p->class != CKO_PUBLIC_KEY) ||
63 (key_p->key_type != CKK_DSA))
91 (void) pthread_rwlock_rdlock(&key_p->object_rwlock);
92 rv = soft_copy_object(key_p, &tmp_key, SOFT_COPY_OBJ_ORIG_SH,
97 (void) pthread_rwlock_unlock(&key_p->object_rwlock);
103 (void) pthread_rwlock_unlock(&key_p->object_rwlock);
47 soft_dsa_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign) argument
H A DsoftEncryptUtil.c58 pMechanism, soft_object_t *key_p)
74 rv = soft_encrypt_init(session_p, pMechanism, key_p);
91 * key_p: pointer to key soft_object_t struct
107 soft_object_t *key_p)
119 if (key_p->key_type != CKK_DES) {
128 if ((key_p->key_type != CKK_DES2) &&
129 (key_p->key_type != CKK_DES3)) {
135 key_p, SOFT_ENCRYPT_OP);
148 key_p->key_type);
176 if (key_p
57 soft_encrypt_init_internal(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
106 soft_encrypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
[all...]
H A DsoftMAC.c66 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op)
72 if ((key_p->class != CKO_SECRET_KEY) ||
73 (key_p->key_type != CKK_GENERIC_SECRET)) {
165 rv = mac_init_ctx(session_p, key_p, hmac_ctx, pMechanism->mechanism);
65 soft_hmac_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEncrypt.c43 kernel_object_t *key_p; local
67 HANDLE2OBJECT(hKey, key_p, rv);
74 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) {
90 if (!key_p->is_lib_obj) {
92 encrypt_init.ei_key.ck_obj_id = key_p->k_handle;
94 if (key_p->class == CKO_SECRET_KEY) {
97 get_symmetric_key_value(key_p);
103 OBJ_SEC(key_p)->sk_value_len << 3;
105 } else if (key_p
[all...]
H A DkernelSign.c40 kernel_object_t *key_p; local
65 HANDLE2OBJECT(hKey, key_p, rv);
72 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & SIGN_BOOL_ON)) {
89 if (!key_p->is_lib_obj) {
91 sign_init.si_key.ck_obj_id = key_p->k_handle;
93 if (key_p->class == CKO_SECRET_KEY) {
96 get_symmetric_key_value(key_p);
102 OBJ_SEC(key_p)->sk_value_len << 3;
104 } else if (key_p
503 kernel_object_t *key_p; local
[all...]
H A DkernelSoftCommon.c110 soft_object_t *key_p; local
128 key_p = &keyobj;
129 bzero(key_p, sizeof (soft_object_t));
130 key_p->class = CKO_SECRET_KEY;
131 key_p->key_type = CKK_GENERIC_SECRET;
134 OBJ_SEC(key_p) = &skeyobj;
135 OBJ_SEC_VALUE(key_p) = kval;
136 OBJ_SEC_VALUE_LEN(key_p) = klen;
139 key_p, opflag & OP_SIGN);
H A DkernelDecrypt.c40 kernel_decrypt_init(kernel_session_t *session_p, kernel_object_t *key_p, argument
50 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) {
70 if (!key_p->is_lib_obj) {
72 decrypt_init.di_key.ck_obj_id = key_p->k_handle;
74 if (key_p->class == CKO_SECRET_KEY) {
77 get_symmetric_key_value(key_p);
84 OBJ_SEC(key_p)->sk_value_len << 3;
86 } else if (key_p->key_type == CKK_RSA) {
87 if (get_rsa_private_key(key_p,
156 kernel_object_t *key_p; local
[all...]
H A DkernelDigest.c402 kernel_object_t *key_p; local
422 HANDLE2OBJECT(hKey, key_p, rv);
433 if (key_p->is_lib_obj && (key_p->class != CKO_SECRET_KEY)) {
451 OBJ_REFRELE(key_p);
462 if (key_p->is_lib_obj) {
470 if (!key_p->is_lib_obj) {
476 digest_key.dk_key.ck_obj_id = key_p->k_handle;
489 ulPartLen = OBJ_SEC_VALUE_LEN(key_p);
495 pPart = (CK_BYTE_PTR) OBJ_SEC_VALUE(key_p);
[all...]
H A DkernelVerify.c41 kernel_object_t *key_p; local
65 HANDLE2OBJECT(hKey, key_p, rv);
72 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & VERIFY_BOOL_ON)) {
86 if (!key_p->is_lib_obj) {
88 verify_init.vi_key.ck_obj_id = key_p->k_handle;
90 if (key_p->class == CKO_SECRET_KEY) {
93 get_symmetric_key_value(key_p);
99 OBJ_SEC(key_p)->sk_value_len << 3;
101 } else if (key_p
459 kernel_object_t *key_p; local
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsDecrypt.c37 * key_p: pointer to key kms_object_t struct
53 kms_object_t *key_p)
64 if (key_p->key_type != CKK_AES) {
74 key_p, B_FALSE);
117 kms_object_t *key_p; local
134 HANDLE2OBJECT(hKey, key_p, rv);
139 if (!(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) {
163 rv = kms_decrypt_init(session_p, pMechanism, key_p);
172 OBJ_REFRELE(key_p);
52 kms_decrypt_init(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p) argument
H A DkmsEncrypt.c34 kms_object_t *key_p)
43 if (key_p->key_type != CKK_AES) {
53 key_p, B_TRUE);
129 kms_object_t *key_p; local
150 HANDLE2OBJECT(hKey, key_p, rv);
156 if (!(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) {
181 rv = kms_encrypt_init(session_p, pMechanism, key_p);
190 OBJ_REFRELE(key_p);
33 kms_encrypt_init(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p) argument
H A DkmsAESCrypt.c84 CK_MECHANISM_PTR pMechanism, kms_object_t *key_p,
124 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) {
125 if (OBJ_KEY_SCHED(key_p) == NULL) {
128 (void) pthread_mutex_lock(&key_p->object_mutex);
129 if (OBJ_KEY_SCHED(key_p) == NULL) {
133 &key_p->object_mutex);
139 aes_init_keysched(OBJ_SEC_VALUE(key_p), (uint_t)
140 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks);
142 aes_init_keysched(OBJ_SEC_VALUE(key_p),
143 (OBJ_SEC_VALUE_LEN(key_p) *
83 kms_aes_crypt_init_common(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p, boolean_t encrypt) argument
[all...]

Completed in 87 milliseconds

12