/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | dig_mgr.c | 375 CK_BYTE *in_data, 377 CK_BYTE *out_data, 416 CK_BYTE *data, 480 CK_BYTE *hash,
|
H A D | hwf_obj.c | 446 hasreset_attr->pValue = (CK_BYTE *)hasreset_attr + 453 resetoninit_attr->pValue = (CK_BYTE *)resetoninit_attr +
|
H A D | obj_mgr.c | 395 (void) memset(o->name, 0x00, sizeof (CK_BYTE) * 8); 399 CK_BYTE current[8]; 400 CK_BYTE next[8]; 580 (void) memset(&new_obj->name, 0x00, sizeof (CK_BYTE) * 8); 584 CK_BYTE current[8]; 585 CK_BYTE next[8]; 771 (void) memset(obj->name, 0x0, sizeof (CK_BYTE) * 8); 775 CK_BYTE current[8]; 776 CK_BYTE next[8]; 1656 object_mgr_restore_obj(CK_BYTE *dat [all...] |
/illumos-gate/usr/src/common/crypto/padding/ |
H A D | padding.h | 50 #define CK_BYTE uchar_t macro
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSessionUtil.c | 524 (void) memcpy((CK_BYTE *)pOperationState + 532 (void) memcpy((CK_BYTE *)pOperationState + 541 (void) memcpy((CK_BYTE *)pOperationState + 674 (void) memcpy((CK_BYTE *)session_p->digest.context, 675 (CK_BYTE *)pOperationState + offset, 680 (void) memcpy((CK_BYTE *)session_p->digest.context, 681 (CK_BYTE *)pOperationState + offset,
|
H A D | softDESCrypt.c | 186 CK_BYTE *in_buf = NULL; 187 CK_BYTE *out_buf = NULL; 409 CK_BYTE tmpblock[DES_BLOCK_LEN]; 502 CK_BYTE *in_buf = NULL; 503 CK_BYTE *out_buf = NULL; 921 CK_BYTE *pEncrypted = NULL; 924 CK_BYTE last_block[DES_BLOCK_LEN]; 1009 pEncrypted = malloc(sizeof (CK_BYTE) * ulEncryptedLen); 1077 CK_BYTE *pEncrypted = NULL; 1096 pEncrypted = malloc(sizeof (CK_BYTE) * ulEncryptedLe [all...] |
H A D | softRSA.c | 249 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 250 CK_BYTE cipher_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 339 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 533 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 534 CK_BYTE signed_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 650 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES]; 962 *prefix = (CK_BYTE *)SHA1_DER_PREFIX; 966 *prefix = (CK_BYTE *)SHA1_DER_PREFIX_OID; 977 CK_BYTE hash[SHA512_DIGEST_LENGTH]; /* space enough for all mechs */ 980 CK_BYTE der_dat [all...] |
H A D | softBlowfishCrypt.c | 150 CK_BYTE *in_buf = NULL; 151 CK_BYTE *out_buf = NULL; 326 CK_BYTE *in_buf = NULL; 327 CK_BYTE *out_buf = NULL;
|
H A D | softSignUtil.c | 152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ 172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ 333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ 353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
|
H A D | softAESCrypt.c | 165 CK_BYTE *in_buf = NULL; 166 CK_BYTE *out_buf = NULL; 382 CK_BYTE tmpblock[AES_BLOCK_LEN]; 503 CK_BYTE *in_buf = NULL; 504 CK_BYTE *out_buf = NULL;
|
H A D | softKeystoreUtil.c | 314 CK_BYTE salt[KS_KEY_SALT_SIZE]; 1174 soft_gen_iv(CK_BYTE *iv) 1249 CK_BYTE iv[OBJ_IV_SIZE], old_iv[OBJ_IV_SIZE]; 1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; 1447 CK_BYTE *crypt_salt = NULL, *hmac_salt = NULL; 1541 CK_BYTE *new_crypt_salt = NULL, *new_hmac_salt = NULL; 1569 (CK_BYTE **)&crypt_salt) != CKR_OK) { 1580 (CK_BYTE **)&hmac_salt) != CKR_OK) { 1806 CK_BYTE *crypt_salt = NULL, *hmac_salt; 1828 if (soft_gen_crypt_key(pin, &enc_key, (CK_BYTE **) [all...] |
H A D | softMAC.c | 195 CK_BYTE md5_ipad[MD5_SSL_PAD_AND_KEY_SIZE]; 196 CK_BYTE md5_opad[MD5_SSL_PAD_AND_KEY_SIZE]; 261 CK_BYTE sha1_ipad[SHA1_SSL_PAD_AND_KEY_SIZE]; 262 CK_BYTE sha1_opad[SHA1_SSL_PAD_AND_KEY_SIZE];
|
H A D | softDSA.c | 225 CK_BYTE hash[SHA1_HASH_SIZE]; /* space enough for SHA1 and MD5 */ 370 CK_BYTE hash[SHA1_HASH_SIZE]; /* space enough for SHA1 and MD5 */
|
H A D | softObject.h | 50 CK_BYTE *big_value; 59 CK_BYTE *sk_value; 241 CK_BYTE *value; 925 CK_RV dup_bigint_attr(biginteger_t *bi, CK_BYTE *buf, CK_ULONG buflen);
|
H A D | softEC.c | 429 CK_BYTE hash[SHA1_HASH_SIZE]; 599 CK_BYTE hash[SHA1_HASH_SIZE];
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | pkcs11t.h | 44 typedef unsigned char CK_BYTE; typedef 47 typedef CK_BYTE CK_CHAR; 50 typedef CK_BYTE CK_UTF8CHAR; 53 typedef CK_BYTE CK_BBOOL; 71 typedef CK_BYTE CK_PTR CK_BYTE_PTR; 87 CK_BYTE major; /* integer portion of version number */ 88 CK_BYTE minor; /* 1/100ths portion of version number */ 1470 CK_BYTE iv[8]; /* IV for CBC mode */ 1535 CK_BYTE iv[8]; 1543 CK_BYTE i [all...] |
/illumos-gate/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.c | 58 const CK_BYTE MD5_DER_PREFIX[MD5_DER_PREFIX_Len] = {0x30, 0x20, 0x30, 0x0c, 62 const CK_BYTE SHA1_DER_PREFIX[SHA1_DER_PREFIX_Len] = {0x30, 0x21, 0x30, 65 const CK_BYTE SHA1_DER_PREFIX_OID[SHA1_DER_PREFIX_OID_Len] = {0x30, 0x1f, 0x30, 68 const CK_BYTE SHA256_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x31, 0x30, 0x0d, 72 const CK_BYTE SHA384_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x41, 0x30, 0x0d, 76 const CK_BYTE SHA512_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x51, 0x30, 0x0d, 80 const CK_BYTE DEFAULT_PUB_EXPO[DEFAULT_PUB_EXPO_Len] = { 0x01, 0x00, 0x01 };
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ 198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
|
H A D | kernelObject.h | 51 CK_BYTE *sk_value; 72 CK_BYTE *big_value;
|
/illumos-gate/usr/src/cmd/boot/bootadm/ |
H A D | bootadm_digest.c | 46 static CK_BYTE buf[BUFFERSIZE];
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaGlobal.h | 223 CK_BYTE generic_data[INITIAL_ATTR_LEN]; 591 CK_BYTE *in, CK_ULONG inLen, CK_BYTE *out, CK_ULONG *outLen); 603 CK_BYTE *wrapped_key, CK_ULONG *wrapped_key_len); 607 CK_BYTE *wrapped_key, CK_ULONG wrapped_key_len,
|
H A D | metaUtil.c | 511 CK_BYTE *in, CK_ULONG inLen, CK_BYTE *out, CK_ULONG *outLen) 770 CK_BYTE dummy_buf[8]; 1188 meta_object_t *wrappingkey, meta_object_t *inputkey, CK_BYTE *wrapped_key, 1302 CK_BYTE *wrapped_key, CK_ULONG wrapped_key_len,
|
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 93 static CK_BYTE buf[BUFFERSIZE]; 280 char *keylabel, CK_BYTE *password, int password_len, 383 CK_BYTE salt[CK_PKCS5_PBKD2_SALT_SIZE];
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 44 t[n].pValue = (CK_BYTE *)value; \ 226 CK_BYTE *subject = NULL, *value = NULL; 784 CK_BYTE ec_params[256], ec_point[256]; 1102 CK_BYTE *subject, *issuer, *serial, nullserno; 1418 static CK_BYTE ckDsaPrime[128] = { 1436 static CK_BYTE ckDsaSubPrime[20] = { 1441 static CK_BYTE ckDsaBase[128] = { 1518 static CK_BYTE PubExpo[3] = {0x01, 0x00, 0x01}; 1707 CK_BYTE *modulus = NULL; 1766 CK_BYTE *keyvalu [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 338 char *keylabel, CK_BYTE *password, int password_len, 428 CK_BYTE salt[CK_PKCS5_PBKD2_SALT_SIZE]; 1055 CK_BYTE databuf[BUFFERSIZE]; 1056 CK_BYTE outbuf[BUFFERSIZE+BLOCKSIZE];
|