Searched refs:CK_BYTE (Results 1 - 25 of 64) sorted by relevance

123

/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpmtok_int.h274 CK_BYTE *context;
332 CK_BYTE name[8]; // for token objects
373 CK_BYTE user_pin_sha[SHA1_DIGEST_LENGTH];
374 CK_BYTE so_pin_sha[SHA1_DIGEST_LENGTH];
375 CK_BYTE next_token_object_name[8];
439 CK_BYTE token_debug_tag[MAXPATHLEN];
444 CK_RV (*t_rng)(TSS_HCONTEXT, CK_BYTE *, CK_ULONG);
447 CK_RV (*t_rsa_decrypt)(TSS_HCONTEXT, CK_BYTE *,
448 CK_ULONG, CK_BYTE *, CK_ULONG *, OBJECT *);
452 CK_BYTE *, CK_ULON
[all...]
H A Dmech_rsa.c32 CK_BYTE *in_data,
34 CK_BYTE *out_data,
54 CK_BYTE * in_data,
56 CK_BYTE * out_data,
84 CK_BYTE * in_data,
86 CK_BYTE * out_data,
116 CK_BYTE * in_data,
118 CK_BYTE * out_data,
146 CK_BYTE * in_data,
148 CK_BYTE * out_dat
[all...]
H A Dasn1.c297 CK_BYTE ** ber_int,
299 CK_BYTE * data,
302 CK_BYTE *buf = NULL;
330 buf = (CK_BYTE *)malloc(len);
385 ber_decode_INTEGER(CK_BYTE * ber_int,
386 CK_BYTE ** data,
447 CK_BYTE ** str,
449 CK_BYTE * data,
452 CK_BYTE *buf = NULL;
477 buf = (CK_BYTE *)mallo
[all...]
H A Dglobals.c97 CK_BYTE ber_rsaEncryption[] = {
100 CK_BYTE ber_md5WithRSAEncryption[] = {
103 CK_BYTE ber_sha1WithRSAEncryption[] = {
107 CK_BYTE ber_AlgMd5[] = {
111 CK_BYTE ber_AlgSha1[] = {
115 CK_BYTE ber_AlgIdRSAEncryption[] = {
180 CK_BYTE default_so_pin_md5[MD5_DIGEST_LENGTH] = {
185 CK_BYTE default_so_pin_sha[SHA1_DIGEST_LENGTH] = {
192 CK_BYTE default_user_pin_sha[SHA1_DIGEST_LENGTH] = {
198 CK_BYTE user_pin_md
[all...]
H A Dmech_md5.c300 CK_BYTE *in_data,
302 CK_BYTE *out_data,
324 CK_BYTE * in_data,
326 CK_BYTE * out_data,
331 CK_BYTE hash[MD5_DIGEST_LENGTH];
334 CK_BYTE k_ipad[MD5_BLOCK_SIZE];
335 CK_BYTE k_opad[MD5_BLOCK_SIZE];
406 CK_BYTE *key = attr->pValue;
487 CK_BYTE * in_data,
489 CK_BYTE * signatur
[all...]
H A Dmech_sha.c33 CK_BYTE *in_data,
35 CK_BYTE *out_data,
59 CK_BYTE * in_data,
61 CK_BYTE * out_data,
65 CK_BYTE hash[SHA1_DIGEST_LENGTH];
68 CK_BYTE k_ipad[SHA1_BLOCK_SIZE];
69 CK_BYTE k_opad[SHA1_BLOCK_SIZE];
137 CK_BYTE *key = attr->pValue;
217 CK_BYTE *in_data,
219 CK_BYTE *signatur
[all...]
H A Dsign_mgr.c39 CK_BYTE * ptr = NULL;
127 ctx->context = (CK_BYTE *)malloc(
204 ptr = (CK_BYTE *)malloc(mech->ulParameterLen);
253 CK_BYTE * in_data,
255 CK_BYTE * out_data,
306 CK_BYTE * in_data,
335 CK_BYTE * signature,
361 CK_BYTE * in_data,
363 CK_BYTE * out_data,
H A Dkey.c357 derive_attr->pValue = (CK_BYTE *)derive_attr +
363 local_attr->pValue = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
453 class_attr->pValue = (CK_BYTE *)class_attr +
463 encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
469 verify_attr->pValue = (CK_BYTE *)verify_attr +
475 verify_recover_attr->pValue = (CK_BYTE *)verify_recover_attr +
481 wrap_attr->pValue = (CK_BYTE *)wrap_attr +
583 class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
592 sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
598 decrypt_attr->pValue = (CK_BYTE *)decrypt_att
[all...]
H A Dloadsave.c307 restore_private_token_object(TSS_HCONTEXT, CK_BYTE *, CK_ULONG, OBJECT *);
430 CK_BYTE fname[MAXPATHLEN];
546 CK_BYTE fname[MAXPATHLEN];
622 CK_BYTE line[100];
624 CK_BYTE fname[MAXPATHLEN];
685 CK_BYTE *cleartxt = NULL;
686 CK_BYTE fname[MAXPATHLEN];
742 CK_BYTE *obj_data = NULL;
743 CK_BYTE *cleartxt = NULL;
744 CK_BYTE *ciphertx
[all...]
H A Dsess_mgr.c766 CK_BYTE *data,
799 (void) (void) memcpy((CK_BYTE *)op_data + offset,
806 (void) memcpy((CK_BYTE *)op_data + offset,
814 (void) memcpy((CK_BYTE *)op_data + offset,
840 (void) memcpy((CK_BYTE *)op_data + offset,
847 (void) memcpy((CK_BYTE *)op_data + offset,
855 (void) memcpy((CK_BYTE *)op_data + offset,
881 (void) memcpy((CK_BYTE *)op_data + offset,
887 (void) memcpy((CK_BYTE *)op_data + offset,
895 (void) memcpy((CK_BYTE *)op_dat
[all...]
H A Dutility.c450 compute_next_token_obj_name(CK_BYTE *current, CK_BYTE *next) {
500 CK_BYTE *data,
513 attr->pValue = (CK_BYTE *)attr + sizeof (CK_ATTRIBUTE);
525 add_pkcs_padding(CK_BYTE * ptr,
531 CK_BYTE pad_value;
534 pad_value = (CK_BYTE)pad_len;
547 CK_BYTE *ptr,
551 CK_BYTE pad_value;
564 CK_BYTE *pt
[all...]
H A Dverify_mgr.c127 ctx->context = (CK_BYTE *)malloc(
233 CK_BYTE * in_data,
235 CK_BYTE * signature,
284 CK_BYTE * in_data,
312 CK_BYTE * signature,
338 CK_BYTE * signature,
340 CK_BYTE * out_data,
H A Ddecr_mgr.c41 CK_BYTE *ptr = NULL;
116 ptr = (CK_BYTE *)malloc(mech->ulParameterLen);
163 CK_BYTE *in_data,
165 CK_BYTE *out_data,
H A Dencr_mgr.c39 CK_BYTE * ptr = NULL;
115 ptr = (CK_BYTE *)malloc(mech->ulParameterLen);
162 CK_BYTE *in_data,
164 CK_BYTE *out_data,
H A Dkey_mgr.c33 CK_BYTE *keydata,
37 CK_BYTE *alg = NULL;
38 CK_BYTE *priv_key = NULL;
237 CK_BYTE * wrapped_key,
243 CK_BYTE * data = NULL;
353 CK_BYTE * wrapped_key,
360 CK_BYTE * data = NULL;
434 data = (CK_BYTE *)malloc(data_len);
H A Dobject.c378 sizeof (CK_BYTE), &sensitive);
394 sizeof (CK_BYTE), &extractable);
516 CK_BYTE ** data,
519 CK_BYTE * buf = NULL;
534 buf = (CK_BYTE *)malloc(total_len);
539 (void) memset((CK_BYTE *)buf, 0x0, total_len);
549 (void) memcpy(buf + offset, &obj->name, sizeof (CK_BYTE) * 8);
756 object_restore(CK_BYTE *data, OBJECT **new_obj, CK_BBOOL replace) {
H A Dtemplate.c323 attr->pValue = (CK_BYTE *)attr + sizeof (CK_ATTRIBUTE);
615 new_attr->pValue = (CK_BYTE *)new_attr + sizeof (CK_ATTRIBUTE);
631 CK_BYTE * dest)
634 CK_BYTE * ptr = NULL;
702 CK_BYTE * buf,
707 CK_BYTE *ptr = NULL;
771 CK_BYTE *pb2;
775 pb2 = (CK_BYTE *)aptr;
785 CK_BYTE *pb2;
786 pb2 = (CK_BYTE *)a
[all...]
H A Dtpm_specific.c56 CK_RV token_rng(TSS_HCONTEXT, CK_BYTE *, CK_ULONG);
64 CK_BYTE *,
66 CK_BYTE *,
73 CK_BYTE *,
75 CK_BYTE *,
82 CK_BYTE *,
84 CK_BYTE *,
89 token_specific_rsa_verify(TSS_HCONTEXT, CK_BYTE *,
90 CK_ULONG, CK_BYTE *, CK_ULONG, OBJECT *);
102 CK_BYTE *,
[all...]
H A Ddata_obj.c343 class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
/illumos-gate/usr/src/common/crypto/rsa/
H A Drsa_impl.h46 #define CK_BYTE uchar_t macro
74 extern const CK_BYTE MD5_DER_PREFIX[MD5_DER_PREFIX_Len];
75 extern const CK_BYTE SHA1_DER_PREFIX[SHA1_DER_PREFIX_Len];
76 extern const CK_BYTE SHA1_DER_PREFIX_OID[SHA1_DER_PREFIX_OID_Len];
77 extern const CK_BYTE SHA256_DER_PREFIX[SHA2_DER_PREFIX_Len];
78 extern const CK_BYTE SHA384_DER_PREFIX[SHA2_DER_PREFIX_Len];
79 extern const CK_BYTE SHA512_DER_PREFIX[SHA2_DER_PREFIX_Len];
80 extern const CK_BYTE DEFAULT_PUB_EXPO[DEFAULT_PUB_EXPO_Len];
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c162 CK_BYTE * pckBuffer,
229 MAX_PUBLIC_KEY_TEMPLATES, CKA_CLASS, (CK_BYTE *)&ckObjClass,
232 MAX_PUBLIC_KEY_TEMPLATES, CKA_TOKEN, (CK_BYTE *)&ckToken,
235 MAX_PUBLIC_KEY_TEMPLATES, CKA_PRIVATE, (CK_BYTE *)&ckPrivate,
246 MAX_PUBLIC_KEY_TEMPLATES, CKA_KEY_TYPE, (CK_BYTE *)&ckKeyType,
249 MAX_PUBLIC_KEY_TEMPLATES, CKA_DERIVE, (CK_BYTE *)&ckDerive,
257 MAX_PUBLIC_KEY_TEMPLATES, CKA_ENCRYPT, (CK_BYTE *)&ckEncrypt,
260 MAX_PUBLIC_KEY_TEMPLATES, CKA_VERIFY, (CK_BYTE *)&ckVerify,
264 (CK_BYTE *)&ckVerifyRecover, sizeof (ckVerifyRecover)) ||
266 MAX_PUBLIC_KEY_TEMPLATES, CKA_WRAP, (CK_BYTE *)
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c624 CK_BYTE *A = NULL;
625 CK_BYTE *Ai = NULL;
626 CK_BYTE *B = NULL;
627 CK_BYTE *D = NULL;
628 CK_BYTE *I = NULL, *S, *P;
629 CK_BYTE *keybuf = NULL;
648 D = (CK_BYTE *)malloc(Dlen);
654 B = (CK_BYTE *)malloc(Blen);
677 I = (CK_BYTE *)malloc(Ilen);
729 A = (CK_BYTE *)mallo
[all...]
H A DsoftCrypt.h97 void soft_add_pkcs7_padding(CK_BYTE *, int, CK_ULONG);
99 CK_RV soft_remove_pkcs7_padding(CK_BYTE *, CK_ULONG, CK_ULONG *);
H A DsoftKeystore.h93 CK_BYTE **saltdata);
95 CK_RV soft_gen_hmac_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata);
H A DsoftVerifyUtil.c154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
345 CK_BYTE hmac[SHA512_DIGEST_LENGTH];
370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */

Completed in 271 milliseconds

123