Searched refs:CK_BYTE (Results 26 - 50 of 64) sorted by relevance

123

/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddig_mgr.c375 CK_BYTE *in_data,
377 CK_BYTE *out_data,
416 CK_BYTE *data,
480 CK_BYTE *hash,
H A Dhwf_obj.c446 hasreset_attr->pValue = (CK_BYTE *)hasreset_attr +
453 resetoninit_attr->pValue = (CK_BYTE *)resetoninit_attr +
H A Dobj_mgr.c395 (void) memset(o->name, 0x00, sizeof (CK_BYTE) * 8);
399 CK_BYTE current[8];
400 CK_BYTE next[8];
580 (void) memset(&new_obj->name, 0x00, sizeof (CK_BYTE) * 8);
584 CK_BYTE current[8];
585 CK_BYTE next[8];
771 (void) memset(obj->name, 0x0, sizeof (CK_BYTE) * 8);
775 CK_BYTE current[8];
776 CK_BYTE next[8];
1656 object_mgr_restore_obj(CK_BYTE *dat
[all...]
/illumos-gate/usr/src/common/crypto/padding/
H A Dpadding.h50 #define CK_BYTE uchar_t macro
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSessionUtil.c524 (void) memcpy((CK_BYTE *)pOperationState +
532 (void) memcpy((CK_BYTE *)pOperationState +
541 (void) memcpy((CK_BYTE *)pOperationState +
674 (void) memcpy((CK_BYTE *)session_p->digest.context,
675 (CK_BYTE *)pOperationState + offset,
680 (void) memcpy((CK_BYTE *)session_p->digest.context,
681 (CK_BYTE *)pOperationState + offset,
H A DsoftDESCrypt.c186 CK_BYTE *in_buf = NULL;
187 CK_BYTE *out_buf = NULL;
409 CK_BYTE tmpblock[DES_BLOCK_LEN];
502 CK_BYTE *in_buf = NULL;
503 CK_BYTE *out_buf = NULL;
921 CK_BYTE *pEncrypted = NULL;
924 CK_BYTE last_block[DES_BLOCK_LEN];
1009 pEncrypted = malloc(sizeof (CK_BYTE) * ulEncryptedLen);
1077 CK_BYTE *pEncrypted = NULL;
1096 pEncrypted = malloc(sizeof (CK_BYTE) * ulEncryptedLe
[all...]
H A DsoftRSA.c249 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
250 CK_BYTE cipher_data[MAX_RSA_KEYLENGTH_IN_BYTES];
339 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
533 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
534 CK_BYTE signed_data[MAX_RSA_KEYLENGTH_IN_BYTES];
650 CK_BYTE plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
962 *prefix = (CK_BYTE *)SHA1_DER_PREFIX;
966 *prefix = (CK_BYTE *)SHA1_DER_PREFIX_OID;
977 CK_BYTE hash[SHA512_DIGEST_LENGTH]; /* space enough for all mechs */
980 CK_BYTE der_dat
[all...]
H A DsoftBlowfishCrypt.c150 CK_BYTE *in_buf = NULL;
151 CK_BYTE *out_buf = NULL;
326 CK_BYTE *in_buf = NULL;
327 CK_BYTE *out_buf = NULL;
H A DsoftSignUtil.c152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
H A DsoftAESCrypt.c165 CK_BYTE *in_buf = NULL;
166 CK_BYTE *out_buf = NULL;
382 CK_BYTE tmpblock[AES_BLOCK_LEN];
503 CK_BYTE *in_buf = NULL;
504 CK_BYTE *out_buf = NULL;
H A DsoftKeystoreUtil.c314 CK_BYTE salt[KS_KEY_SALT_SIZE];
1174 soft_gen_iv(CK_BYTE *iv)
1249 CK_BYTE iv[OBJ_IV_SIZE], old_iv[OBJ_IV_SIZE];
1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL;
1447 CK_BYTE *crypt_salt = NULL, *hmac_salt = NULL;
1541 CK_BYTE *new_crypt_salt = NULL, *new_hmac_salt = NULL;
1569 (CK_BYTE **)&crypt_salt) != CKR_OK) {
1580 (CK_BYTE **)&hmac_salt) != CKR_OK) {
1806 CK_BYTE *crypt_salt = NULL, *hmac_salt;
1828 if (soft_gen_crypt_key(pin, &enc_key, (CK_BYTE **)
[all...]
H A DsoftMAC.c195 CK_BYTE md5_ipad[MD5_SSL_PAD_AND_KEY_SIZE];
196 CK_BYTE md5_opad[MD5_SSL_PAD_AND_KEY_SIZE];
261 CK_BYTE sha1_ipad[SHA1_SSL_PAD_AND_KEY_SIZE];
262 CK_BYTE sha1_opad[SHA1_SSL_PAD_AND_KEY_SIZE];
H A DsoftDSA.c225 CK_BYTE hash[SHA1_HASH_SIZE]; /* space enough for SHA1 and MD5 */
370 CK_BYTE hash[SHA1_HASH_SIZE]; /* space enough for SHA1 and MD5 */
H A DsoftObject.h50 CK_BYTE *big_value;
59 CK_BYTE *sk_value;
241 CK_BYTE *value;
925 CK_RV dup_bigint_attr(biginteger_t *bi, CK_BYTE *buf, CK_ULONG buflen);
H A DsoftEC.c429 CK_BYTE hash[SHA1_HASH_SIZE];
599 CK_BYTE hash[SHA1_HASH_SIZE];
/illumos-gate/usr/src/lib/pkcs11/include/
H A Dpkcs11t.h44 typedef unsigned char CK_BYTE; typedef
47 typedef CK_BYTE CK_CHAR;
50 typedef CK_BYTE CK_UTF8CHAR;
53 typedef CK_BYTE CK_BBOOL;
71 typedef CK_BYTE CK_PTR CK_BYTE_PTR;
87 CK_BYTE major; /* integer portion of version number */
88 CK_BYTE minor; /* 1/100ths portion of version number */
1470 CK_BYTE iv[8]; /* IV for CBC mode */
1535 CK_BYTE iv[8];
1543 CK_BYTE i
[all...]
/illumos-gate/usr/src/common/crypto/rsa/
H A Drsa_impl.c58 const CK_BYTE MD5_DER_PREFIX[MD5_DER_PREFIX_Len] = {0x30, 0x20, 0x30, 0x0c,
62 const CK_BYTE SHA1_DER_PREFIX[SHA1_DER_PREFIX_Len] = {0x30, 0x21, 0x30,
65 const CK_BYTE SHA1_DER_PREFIX_OID[SHA1_DER_PREFIX_OID_Len] = {0x30, 0x1f, 0x30,
68 const CK_BYTE SHA256_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x31, 0x30, 0x0d,
72 const CK_BYTE SHA384_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x41, 0x30, 0x0d,
76 const CK_BYTE SHA512_DER_PREFIX[SHA2_DER_PREFIX_Len] = {0x30, 0x51, 0x30, 0x0d,
80 const CK_BYTE DEFAULT_PUB_EXPO[DEFAULT_PUB_EXPO_Len] = { 0x01, 0x00, 0x01 };
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
H A DkernelObject.h51 CK_BYTE *sk_value;
72 CK_BYTE *big_value;
/illumos-gate/usr/src/cmd/boot/bootadm/
H A Dbootadm_digest.c46 static CK_BYTE buf[BUFFERSIZE];
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaGlobal.h223 CK_BYTE generic_data[INITIAL_ATTR_LEN];
591 CK_BYTE *in, CK_ULONG inLen, CK_BYTE *out, CK_ULONG *outLen);
603 CK_BYTE *wrapped_key, CK_ULONG *wrapped_key_len);
607 CK_BYTE *wrapped_key, CK_ULONG wrapped_key_len,
H A DmetaUtil.c511 CK_BYTE *in, CK_ULONG inLen, CK_BYTE *out, CK_ULONG *outLen)
770 CK_BYTE dummy_buf[8];
1188 meta_object_t *wrappingkey, meta_object_t *inputkey, CK_BYTE *wrapped_key,
1302 CK_BYTE *wrapped_key, CK_ULONG wrapped_key_len,
/illumos-gate/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c93 static CK_BYTE buf[BUFFERSIZE];
280 char *keylabel, CK_BYTE *password, int password_len,
383 CK_BYTE salt[CK_PKCS5_PBKD2_SALT_SIZE];
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c44 t[n].pValue = (CK_BYTE *)value; \
226 CK_BYTE *subject = NULL, *value = NULL;
784 CK_BYTE ec_params[256], ec_point[256];
1102 CK_BYTE *subject, *issuer, *serial, nullserno;
1418 static CK_BYTE ckDsaPrime[128] = {
1436 static CK_BYTE ckDsaSubPrime[20] = {
1441 static CK_BYTE ckDsaBase[128] = {
1518 static CK_BYTE PubExpo[3] = {0x01, 0x00, 0x01};
1707 CK_BYTE *modulus = NULL;
1766 CK_BYTE *keyvalu
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c338 char *keylabel, CK_BYTE *password, int password_len,
428 CK_BYTE salt[CK_PKCS5_PBKD2_SALT_SIZE];
1055 CK_BYTE databuf[BUFFERSIZE];
1056 CK_BYTE outbuf[BUFFERSIZE+BLOCKSIZE];

Completed in 307 milliseconds

123