/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_crypt.c | 86 CK_OBJECT_HANDLE hKey; local 99 key, key_len, &hKey); 106 rv = C_SignInit(hSession, &mechanism, hKey); 108 (void) C_DestroyObject(hSession, hKey); 114 (void) C_DestroyObject(hSession, hKey); 120 (void) C_DestroyObject(hSession, hKey); 124 (void) C_DestroyObject(hSession, hKey); 139 CK_OBJECT_HANDLE hKey; local 182 des_key, 8, &hKey); 188 rv = C_EncryptInit(hSession, &mechanism, hKey); 251 CK_OBJECT_HANDLE hKey; local [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | crypt.c | 63 CK_OBJECT_HANDLE hKey; local 106 des_key, 8, &hKey); 112 rv = C_EncryptInit(hSession, &mechanism, hKey); 129 (void) C_DestroyObject(hSession, hKey); 134 (void) C_DestroyObject(hSession, hKey); 173 CK_OBJECT_HANDLE hKey; local 192 Key, KeyLen, &hKey); 197 rv = C_EncryptInit(hSession, &mechanism, hKey); 209 (void) C_DestroyObject(hSession, hKey);
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Sign.c | 44 CK_OBJECT_HANDLE hKey) 57 return (fast_funcs->C_SignInit(hSession, pMechanism, hKey)); 80 pMechanism, hKey); 222 CK_OBJECT_HANDLE hKey) 235 hKey)); 258 pMechanism, hKey); 43 C_SignInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 221 C_SignRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | pkcs11Verify.c | 44 CK_OBJECT_HANDLE hKey) 56 return (fast_funcs->C_VerifyInit(hSession, pMechanism, hKey)); 79 pMechanism, hKey); 220 CK_OBJECT_HANDLE hKey) 233 hKey)); 256 pMechanism, hKey); 43 C_VerifyInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 219 C_VerifyRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | pkcs11Digest.c | 176 C_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey) argument 183 return (fast_funcs->C_DigestKey(hSession, hKey)); 198 rv = FUNCLIST(sessp->se_slotid)->C_DigestKey(sessp->se_handle, hKey);
|
H A D | metaSign.c | 42 CK_OBJECT_HANDLE hKey) 55 rv = meta_handle2object(hKey, &key); 166 CK_OBJECT_HANDLE hKey) 179 rv = meta_handle2object(hKey, &key); 41 meta_SignInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 165 meta_SignRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | metaVerify.c | 42 CK_OBJECT_HANDLE hKey) 55 rv = meta_handle2object(hKey, &key); 171 CK_OBJECT_HANDLE hKey) 184 rv = meta_handle2object(hKey, &key); 41 meta_VerifyInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 170 meta_VerifyRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | pkcs11Crypt.c | 46 CK_OBJECT_HANDLE hKey) 58 return (fast_funcs->C_EncryptInit(hSession, pMechanism, hKey)); 81 pMechanism, hKey); 229 CK_OBJECT_HANDLE hKey) 241 return (fast_funcs->C_DecryptInit(hSession, pMechanism, hKey)); 264 pMechanism, hKey); 44 C_EncryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 227 C_DecryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | metaDigest.c | 128 meta_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey) argument 138 rv = meta_handle2object(hKey, &key);
|
H A D | metaCrypt.c | 42 CK_OBJECT_HANDLE hKey) 55 rv = meta_handle2object(hKey, &key); 168 CK_OBJECT_HANDLE hKey) 181 rv = meta_handle2object(hKey, &key); 41 meta_EncryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 167 meta_DecryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 62 CK_OBJECT_HANDLE hKey; local 115 attrs, &hKey); 124 rv = C_GetAttributeValue(krb_ctx_hSession(context), hKey, 128 (void) C_DestroyObject(krb_ctx_hSession(context), hKey); local
|
H A D | make_random_key.c | 88 random_key->hKey = CK_INVALID_HANDLE;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_allocated_keyblock.c | 61 kb->hKey = CK_INVALID_HANDLE;
|
H A D | init_keyblock.c | 64 kb->hKey = CK_INVALID_HANDLE;
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 25 CK_OBJECT_HANDLE *hKey) 59 hKey)) != CKR_OK) { 82 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; local 117 kptr = (CK_OBJECT_HANDLE *)&hKey; 175 if (hKey != CK_INVALID_HANDLE) 176 (void)C_DestroyObject(session, hKey); 200 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; local 221 kptr = (CK_OBJECT_HANDLE *)&hKey; 281 if (hKey != CK_INVALID_HANDLE) 282 (void)C_DestroyObject(session, hKey); 22 setup_arcfour_crypto(CK_SESSION_HANDLE session, const krb5_keyblock *key, KRB5_MECH_TO_PKCS *algos, CK_OBJECT_HANDLE *hKey) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 175 if (keyblock->hKey != CK_INVALID_HANDLE) { 176 (void)C_DestroyObject(krb_ctx_hSession(context), keyblock->hKey); 177 keyblock->hKey = CK_INVALID_HANDLE;
|
H A D | afsstring2key.c | 161 if (usekey.hKey != CK_INVALID_HANDLE) { 162 (void) C_DestroyObject(krb_ctx_hSession(context), usekey.hKey); 163 usekey.hKey = CK_INVALID_HANDLE; 174 if (usekey.hKey != CK_INVALID_HANDLE) { 175 (void) C_DestroyObject(krb_ctx_hSession(context), usekey.hKey); 176 usekey.hKey = CK_INVALID_HANDLE;
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | admin_cmds.c | 274 print_key_info(TSS_HCONTEXT hContext, TSS_HOBJECT hKey) argument 282 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 290 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 298 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 307 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 316 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 325 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO, 334 ret = Tspi_GetAttribData(hKey, TSS_TSPATTRIB_KEY_BLOB, 425 TSS_HKEY hKey; local 464 uuid.tss_uuid, &hKey); 488 TSS_HOBJECT hKey; local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/os/ |
H A D | init_os_ctx.c | 124 HKEY hKey = 0; local 142 &hKey)) != ERROR_SUCCESS) 147 rc = RegQueryValueEx(hKey, value_name, 0, 0, 0, &size); 159 if ((rc = RegQueryValueEx(hKey, value_name, 0, 0, *pbuffer, &size)) != 171 if (hKey) 172 RegCloseKey(hKey);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | d3_cbc.c | 69 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 71 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
|
H A D | f_cbc.c | 72 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 74 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 488 set_public_modulus(TSS_HCONTEXT hContext, TSS_HKEY hKey, argument 498 result = Tspi_GetAttribData(hKey, TSS_TSPATTRIB_KEY_BLOB, 527 result = Tspi_SetAttribData(hKey, TSS_TSPATTRIB_KEY_BLOB, 927 TSS_HKEY hKey, CK_CHAR *passHash) 938 if ((result = Tspi_Policy_AssignToObject(hPolicy, hKey))) { 1046 BYTE *hash, TSS_HKEY *hKey) 1056 TSS_PS_TYPE_USER, *uuid, hKey); 1065 TSS_POLICY_USAGE, *hKey, (CK_BYTE *)hash); 1070 result = Tspi_Key_LoadKey(*hKey, hParent); 1101 set_legacy_key_params(TSS_HKEY hKey) argument 926 tss_assign_secret_key_policy(TSS_HCONTEXT hContext, TSS_FLAG policyType, TSS_HKEY hKey, CK_CHAR *passHash) argument 1044 tss_find_and_load_key(TSS_HCONTEXT hContext, char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, BYTE *hash, TSS_HKEY *hKey) argument 1318 token_verify_pin(TSS_HCONTEXT hContext, TSS_HKEY hKey) argument 2075 token_unwrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *encAuthData, CK_ULONG encAuthDataLen, TSS_HKEY hKey, BYTE **authData) argument 2129 TSS_HKEY hKey = NULL_HKEY; local 2401 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2487 TSS_HKEY hKey; local 2510 TSS_HKEY hKey; local 2563 TSS_HKEY hKey; local 2606 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2725 TSS_HKEY hKey; local 2756 TSS_HKEY hKey; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 378 CK_OBJECT_HANDLE hKey /* handle of encryption key */ 428 CK_OBJECT_HANDLE hKey /* handle of decryption key */ 517 CK_OBJECT_HANDLE hKey /* secret key to digest */ 546 CK_OBJECT_HANDLE hKey /* handle of signature key */ 598 CK_OBJECT_HANDLE hKey /* handle of the signature key */ 628 CK_OBJECT_HANDLE hKey /* verification key */ 680 CK_OBJECT_HANDLE hKey /* verification key */ 811 CK_OBJECT_HANDLE hKey, /* key to be wrapped */
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSign.c | 36 CK_OBJECT_HANDLE hKey) 58 HANDLE2OBJECT(hKey, key_p, rv); 293 CK_OBJECT_HANDLE hKey) 315 HANDLE2OBJECT(hKey, key_p, rv); 35 C_SignInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 292 C_SignRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|
H A D | softVerify.c | 36 CK_OBJECT_HANDLE hKey) 58 HANDLE2OBJECT(hKey, key_p, rv); 264 CK_OBJECT_HANDLE hKey) 286 HANDLE2OBJECT(hKey, key_p, rv); 35 C_VerifyInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument 263 C_VerifyRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) argument
|