Searched defs:sess (Results 1 - 15 of 15) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddecr_mgr.c33 SESSION *sess,
46 if (! sess) {
54 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
70 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
160 decr_mgr_decrypt(SESSION *sess, argument
168 if (! sess || ! ctx) {
182 return (rsa_pkcs_decrypt(sess, length_only,
32 decr_mgr_init( SESSION *sess, ENCR_DECR_CONTEXT *ctx, CK_ULONG operation, CK_MECHANISM *mech, CK_OBJECT_HANDLE key_handle) argument
H A Dencr_mgr.c31 encr_mgr_init(SESSION * sess, argument
45 if (! sess || ! ctx || ! mech) {
53 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
69 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
159 encr_mgr_encrypt(SESSION *sess, argument
167 if (! sess || ! ctx) {
181 return (rsa_pkcs_encrypt(sess, length_only,
H A Ddig_mgr.c300 digest_mgr_init(SESSION *sess, argument
304 if (! sess || ! ctx) {
372 digest_mgr_digest(SESSION *sess, argument
381 if (! sess || ! ctx) {
399 return (sha1_hash(sess, length_only, ctx,
405 return (md5_hash(sess, length_only, ctx,
414 digest_mgr_digest_update(SESSION *sess, argument
419 if (! sess || ! ctx) {
442 digest_mgr_digest_key(SESSION * sess, argument
451 if (!sess || !ct
478 digest_mgr_digest_final(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *hash, CK_ULONG *hash_len) argument
[all...]
H A Dmech_md5.c297 md5_hash(SESSION *sess, argument
305 if (! sess || ! ctx || ! out_data_len) {
321 md5_hmac_sign(SESSION * sess, argument
340 if (! sess || ! ctx || ! out_data_len) {
363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
380 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech);
387 rc = digest_mgr_digest(sess, FALSE, &digest_ctx,
421 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech);
427 rc = digest_mgr_digest_update(sess, &digest_ctx,
434 rc = digest_mgr_digest_update(sess,
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
H A Dmech_sha.c30 sha1_hash(SESSION *sess, argument
38 if (! sess || ! ctx || ! out_data_len) {
56 sha1_hmac_sign(SESSION * sess, argument
74 if (! sess || ! ctx || ! out_data_len) {
96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
112 rc = digest_mgr_init(sess, &digest_ctx, &digest_mech);
119 rc = digest_mgr_digest(sess, FALSE, &digest_ctx,
157 rc = digest_mgr_digest_update(sess, &digest_ctx,
164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len);
171 rc = digest_mgr_digest_final(sess,
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
[all...]
H A Dsign_mgr.c31 sign_mgr_init(SESSION * sess, argument
45 if (! sess || ! ctx) {
52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
250 sign_mgr_sign(SESSION * sess, argument
258 if (! sess || ! ctx) {
279 return (rsa_pkcs_sign(sess, length_only, ctx,
284 return (rsa_hash_pkcs_sign(sess, length_only, ctx,
290 return (md5_hmac_sign(sess, length_only, ctx,
295 return (sha1_hmac_sign(sess, length_only, ctx,
304 sign_mgr_sign_update(SESSION * sess, argument
332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
[all...]
H A Dverify_mgr.c31 verify_mgr_init(SESSION * sess, argument
45 if (! sess || ! ctx) {
54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
231 verify_mgr_verify(SESSION * sess, argument
238 if (! sess || ! ctx) {
257 return (rsa_pkcs_verify(sess, ctx,
262 return (rsa_hash_pkcs_verify(sess, ctx,
268 return (md5_hmac_verify(sess, ctx,
273 return (sha1_hmac_verify(sess, ctx,
282 verify_mgr_verify_update(SESSION * sess, argument
310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
[all...]
H A Dkey_mgr.c59 key_mgr_generate_key_pair(SESSION * sess, argument
76 if (! sess || ! mech || ! publ_key_handle || ! priv_key_handle) {
130 rc = object_mgr_create_skel(sess,
137 rc = object_mgr_create_skel(sess,
148 sess->hContext,
207 rc = object_mgr_create_final(sess, publ_key_obj, publ_key_handle);
211 rc = object_mgr_create_final(sess, priv_key_obj, priv_key_handle);
213 (void) object_mgr_destroy_object(sess, *publ_key_handle);
232 key_mgr_wrap_key(SESSION * sess, argument
250 if (! sess || ! wrapped_key_le
349 key_mgr_unwrap_key(SESSION * sess, CK_MECHANISM * mech, CK_ATTRIBUTE * attributes, CK_ULONG attrib_count, CK_BYTE * wrapped_key, CK_ULONG wrapped_key_len, CK_OBJECT_HANDLE h_unwrapping_key, CK_OBJECT_HANDLE * h_unwrapped_key) argument
[all...]
H A Dmech_rsa.c175 rsa_pkcs_encrypt(SESSION *sess, argument
190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
211 rc = ckm_rsa_encrypt(sess->hContext, in_data, in_data_len, out_data,
218 rsa_pkcs_decrypt(SESSION *sess, argument
233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
251 rc = ckm_rsa_decrypt(sess->hContext, in_data,
262 rsa_pkcs_sign(SESSION *sess, argument
277 if (! sess || ! ctx || ! out_data_len) {
280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
300 rc = ckm_rsa_sign(sess
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
H A Dsess_mgr.c331 * SESSION ** sess : new session pointer (OUTPUT)
336 session_mgr_new(CK_ULONG flags, SESSION **sess) argument
423 *sess = new_session;
553 session_mgr_close_session(SESSION *sess) argument
558 if (! sess)
564 node = dlist_find(sess_list, sess);
570 (void) object_mgr_purge_session_objects(sess, ALL);
572 if (sess->find_list)
573 free(sess->find_list);
575 if (sess
645 SESSION *sess = (SESSION *)sess_list->data; local
762 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument
985 session_mgr_set_op_state( SESSION *sess, CK_OBJECT_HANDLE encr_key, CK_OBJECT_HANDLE auth_key, CK_BYTE *data) argument
[all...]
H A Dobj_mgr.c304 check_object_access(SESSION *sess, OBJECT *o) argument
323 if (sess->session_info.state == CKS_RO_PUBLIC_SESSION) {
335 if (sess->session_info.state == CKS_RO_USER_FUNCTIONS) {
342 if (sess->session_info.state == CKS_RW_PUBLIC_SESSION) {
349 if (sess->session_info.state == CKS_RW_SO_FUNCTIONS) {
360 object_mgr_add(SESSION * sess, argument
369 if (! sess || ! pTemplate || ! handle) {
381 rc = check_object_access(sess, o);
393 o->session = sess;
433 rc = save_token_object(sess
499 object_mgr_add_to_map(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument
542 object_mgr_copy(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE old_handle, CK_OBJECT_HANDLE * new_handle) argument
686 object_mgr_create_skel(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, CK_ULONG mode, CK_ULONG obj_type, CK_ULONG sub_class, OBJECT ** obj) argument
751 object_mgr_create_final(SESSION * sess, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument
869 object_mgr_destroy_object(SESSION * sess, CK_OBJECT_HANDLE handle) argument
1146 object_mgr_find_init(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument
1217 object_mgr_find_build_list(SESSION * sess, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount, DL_NODE * obj_list, CK_BBOOL public_only) argument
1324 object_mgr_find_final(SESSION *sess) argument
1342 object_mgr_get_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument
1478 object_mgr_purge_session_objects(SESSION * sess, SESS_OBJ_TYPE type) argument
1712 object_mgr_set_attribute_values(SESSION * sess, CK_OBJECT_HANDLE handle, CK_ATTRIBUTE * pTemplate, CK_ULONG ulCount) argument
2199 object_mgr_purge_map( SESSION *sess, SESS_OBJ_TYPE type) argument
[all...]
H A Dnew_host.c442 SESSION * sess = NULL; local
457 sess = session_mgr_find(hSession);
458 if (! sess) {
463 if (pin_locked(&sess->session_info,
469 if (sess->session_info.state != CKS_RW_SO_FUNCTIONS) {
474 rc = token_specific.t_init_pin(sess->hContext, pPin, ulPinLen);
505 SESSION * sess = NULL; local
514 sess = session_mgr_find(hSession);
515 if (! sess) {
520 if (pin_locked(&sess
544 SESSION *sess; local
594 SESSION *sess = NULL; local
641 SESSION * sess = NULL; local
671 SESSION * sess = NULL; local
708 SESSION * sess = NULL; local
738 SESSION * sess = NULL; local
838 SESSION * sess = NULL; local
875 SESSION * sess = NULL; local
910 SESSION * sess = NULL; local
942 SESSION * sess = NULL; local
974 SESSION * sess = NULL; local
1001 SESSION * sess = NULL; local
1028 SESSION * sess = NULL; local
1054 SESSION * sess = NULL; local
1092 SESSION * sess = NULL; local
1138 SESSION * sess = NULL; local
1177 SESSION * sess = NULL; local
1223 SESSION * sess = NULL; local
1360 SESSION * sess = NULL; local
1406 SESSION * sess = NULL; local
1451 SESSION * sess = NULL; local
1496 SESSION * sess = NULL; local
1541 SESSION * sess = NULL; local
1581 SESSION * sess = NULL; local
1615 SESSION * sess = NULL; local
1659 SESSION * sess = NULL; local
1704 SESSION * sess = NULL; local
1748 SESSION * sess = NULL; local
1787 SESSION * sess = NULL; local
1831 SESSION * sess = NULL; local
1875 SESSION * sess = NULL; local
1919 SESSION * sess = NULL; local
1963 SESSION * sess = NULL; local
2001 SESSION * sess = NULL; local
2040 SESSION * sess = NULL; local
2079 SESSION * sess = NULL; local
2123 SESSION * sess = NULL; local
2172 SESSION * sess = NULL; local
2217 SESSION * sess = NULL; local
2266 SESSION * sess = NULL; local
2323 SESSION *sess = NULL; local
[all...]
H A Dtpm_specific.c1841 SESSION *sess = session_mgr_find(session.sessionh); local
1847 if (!sess) {
1858 if (token_load_srk(sess->hContext, &hSRK)) {
1868 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS ||
1869 sess->session_info.state == CKS_RW_PUBLIC_SESSION) {
1881 if ((rc = token_create_private_tree(sess->hContext,
1899 if (sess->session_info.state == CKS_RW_USER_FUNCTIONS) {
1906 if ((rc = verify_user_pin(sess->hContext,
1917 if (tss_change_auth(sess->hContext,
1923 } else if (sess
[all...]
/osnet-11/usr/src/lib/libresolv2/common/isc/
H A Dctl_srvr.c67 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \
118 LIST(struct ctl_sess) sess; member in struct:ctl_sctx
208 INIT_LIST(ctx->sess);
280 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p",
281 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess);
290 for (this = HEAD(ctx->sess); this != NULL; this = next) {
302 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument
308 struct ctl_sctx *ctx = sess->ctx;
312 REQUIRE(sess->state == initializing ||
313 sess
376 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument
387 ctl_getcsctx(struct ctl_sess *sess) argument
392 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument
408 struct ctl_sess *sess = NULL; local
469 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument
483 ctl_close(struct ctl_sess *sess) argument
521 ctl_start_read(struct ctl_sess *sess) argument
551 ctl_stop_read(struct ctl_sess *sess) argument
569 struct ctl_sess *sess = uap; local
631 struct ctl_sess *sess = uap; local
658 struct ctl_sess *sess = uap; local
679 ctl_docommand(struct ctl_sess *sess) argument
722 struct ctl_sess *sess = uap; local
760 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument
780 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2441 get_bigint_attr(CK_SESSION_HANDLE sess, CK_OBJECT_HANDLE obj, argument
2451 if ((ckrv = C_GetAttributeValue(sess, obj,
2464 if ((ckrv = C_GetAttributeValue(sess, obj,
2482 CK_SESSION_HANDLE sess = kmfh->pk11handle; local
2494 if ((ckrv = C_GetAttributeValue(sess, obj,
2520 if ((ckrv = C_GetAttributeValue(sess, obj,
2531 rv = get_bigint_attr(sess, obj, CKA_PRIVATE_EXPONENT, &rawrsa->priexp);
2534 rv = get_bigint_attr(sess, obj, CKA_PRIME_1, &rawrsa->prime1);
2537 rv = get_bigint_attr(sess, obj, CKA_PRIME_2, &rawrsa->prime2);
2540 rv = get_bigint_attr(sess, ob
2645 CK_SESSION_HANDLE sess = kmfh->pk11handle; local
2704 CK_SESSION_HANDLE sess = kmfh->pk11handle; local
2772 CK_SESSION_HANDLE sess = kmfh->pk11handle; local
[all...]

Completed in 73 milliseconds