/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 492 set_public_modulus(TSS_HCONTEXT hContext, TSS_HKEY hKey, argument 518 Tspi_Context_FreeMemory(hContext, blob); 546 token_get_tpm_info(TSS_HCONTEXT hContext, TOKEN_DATA *td) argument 554 if ((result = Tspi_Context_GetTpmObject(hContext, &hTPM))) { 567 Tspi_Context_FreeMemory(hContext, data); 592 Tspi_Context_FreeMemory(hContext, data); 604 token_rng(TSS_HCONTEXT hContext, CK_BYTE *output, CK_ULONG bytes) argument 610 if ((rc = Tspi_Context_GetTpmObject(hContext, &hTPM))) { 623 Tspi_Context_FreeMemory(hContext, random_bytes); 652 TSS_HCONTEXT *hContext) 651 token_specific_init(char *Correlator, CK_SLOT_ID SlotNumber, TSS_HCONTEXT *hContext) argument 682 token_wrap_sw_key( TSS_HCONTEXT hContext, int size_n, unsigned char *n, int size_p, unsigned char *p, TSS_HKEY hParentKey, TSS_FLAG initFlags, TSS_HKEY *phKey) argument 767 token_wrap_key_object(TSS_HCONTEXT hContext, CK_OBJECT_HANDLE ckObject, TSS_HKEY hParentKey, TSS_HKEY *phKey) argument 930 tss_assign_secret_key_policy(TSS_HCONTEXT hContext, TSS_FLAG policyType, TSS_HKEY hKey, CK_CHAR *passHash) argument 970 token_load_key( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE ckKey, TSS_HKEY hParentKey, CK_CHAR_PTR passHash, TSS_HKEY *phKey) argument 1009 token_load_srk(TSS_HCONTEXT hContext, TSS_HKEY *hSRK) argument 1048 load_mrk(TSS_HCONTEXT hContext, TSS_HKEY hParent, TSS_HKEY *hKey) argument 1078 tss_find_and_load_key(TSS_HCONTEXT hContext, char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, BYTE *hash, TSS_HKEY *hKey) argument 1113 token_load_public_root_key(TSS_HCONTEXT hContext) argument 1163 tss_generate_key(TSS_HCONTEXT hContext, TSS_FLAG initFlags, BYTE *passHash, TSS_HKEY hParentKey, TSS_HKEY *phKey) argument 1210 tss_change_auth( TSS_HCONTEXT hContext, TSS_HKEY hObjectToChange, TSS_HKEY hParentObject, TSS_UUID objUUID, TSS_UUID parentUUID, CK_CHAR *passHash) argument 1259 token_generate_leaf_key(TSS_HCONTEXT hContext, int key_type, CK_CHAR_PTR passHash, TSS_HKEY *phKey) argument 1328 token_verify_pin(TSS_HCONTEXT hContext, TSS_HKEY hKey) argument 1384 token_create_private_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash) argument 1488 token_create_public_tree(TSS_HCONTEXT hContext, CK_BYTE *pinHash) argument 1588 token_specific_login( TSS_HCONTEXT hContext, CK_USER_TYPE userType, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 1707 token_specific_logout(TSS_HCONTEXT hContext) argument 1732 token_specific_init_pin(TSS_HCONTEXT hContext, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 1778 verify_user_pin(TSS_HCONTEXT hContext, CK_BYTE *hash_sha) argument 1967 token_specific_verify_so_pin(TSS_HCONTEXT hContext, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) argument 2054 token_specific_final(TSS_HCONTEXT hContext) argument 2080 token_wrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *authData, TEMPLATE *publ_tmpl, TEMPLATE *priv_tmpl) argument 2140 token_unwrap_auth_data(TSS_HCONTEXT hContext, CK_BYTE *encAuthData, CK_ULONG encAuthDataLen, TSS_HKEY hKey, BYTE **authData) argument 2181 token_specific_rsa_generate_keypair( TSS_HCONTEXT hContext, TEMPLATE *publ_tmpl, TEMPLATE *priv_tmpl) argument 2316 token_rsa_load_key( TSS_HCONTEXT hContext, OBJECT *key_obj, TSS_HKEY *phKey) argument 2466 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2543 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2565 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument 2616 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2671 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2782 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2813 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
H A D | obj_mgr.c | 433 rc = save_token_object(sess->hContext, o); 562 rc = object_mgr_find_in_map1(sess->hContext, old_handle, &old_obj); 616 rc = save_token_object(sess->hContext, new_obj); 807 rc = save_token_object(sess->hContext, obj); 884 rc = object_mgr_find_in_map1(sess->hContext, handle, &obj); 953 object_mgr_destroy_token_objects(TSS_HCONTEXT hContext) argument 967 rc = object_mgr_find_in_map2(hContext, obj, &handle); 983 rc = object_mgr_find_in_map2(hContext, obj, &handle); 1061 TSS_HCONTEXT hContext, 1096 (void) object_mgr_check_shm(hContext, ob 1060 object_mgr_find_in_map1( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE handle, OBJECT ** ptr) argument 1103 object_mgr_find_in_map2( TSS_HCONTEXT hContext, OBJECT * obj, CK_OBJECT_HANDLE * handle) argument 1380 object_mgr_get_object_size( TSS_HCONTEXT hContext, CK_OBJECT_HANDLE handle, CK_ULONG * size) argument 1541 object_mgr_purge_token_objects(TSS_HCONTEXT hContext) argument 1596 object_mgr_purge_private_token_objects(TSS_HCONTEXT hContext) argument 1898 object_mgr_check_shm(TSS_HCONTEXT hContext, OBJECT *obj) argument 1970 object_mgr_update_publ_tok_obj_from_shm(TSS_HCONTEXT hContext) argument 2081 object_mgr_update_priv_tok_obj_from_shm(TSS_HCONTEXT hContext) argument 2189 object_mgr_update_from_shm(TSS_HCONTEXT hContext) argument [all...] |
H A D | mech_rsa.c | 31 TSS_HCONTEXT hContext, 39 ckm_rsa_key_pair_gen(TSS_HCONTEXT hContext, argument 46 hContext, publ_tmpl, priv_tmpl); 53 TSS_HCONTEXT hContext, 74 rc = token_specific.t_rsa_encrypt(hContext, 83 TSS_HCONTEXT hContext, 106 rc = token_specific.t_rsa_decrypt(hContext, 115 TSS_HCONTEXT hContext, 137 hContext, in_data, in_data_len, out_data, 145 TSS_HCONTEXT hContext, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument [all...] |
H A D | new_host.c | 119 TSS_HCONTEXT hContext = 0; local 163 &hContext); 177 rc = load_token_data(hContext, nv_token_data); 194 if (hContext) 195 Tspi_Context_Close(hContext); 204 TSS_HCONTEXT hContext; local 221 if (open_tss_context(&hContext) == 0) { 223 token_specific.t_final(hContext); 225 (void) object_mgr_purge_token_objects(hContext); 226 (void) Tspi_Context_Close(hContext); 372 TSS_HCONTEXT hContext = 0; local 546 TSS_HCONTEXT hContext; local [all...] |
H A D | decr_mgr.c | 54 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 70 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
|
H A D | encr_mgr.c | 53 rc = object_mgr_find_in_map1(sess->hContext, key_handle, 69 rc = object_mgr_find_in_map1(sess->hContext, key_handle,
|
H A D | loadsave.c | 426 load_token_data(TSS_HCONTEXT hContext, TOKEN_DATA *td) argument 453 rc = init_token_data(hContext, td); 618 save_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument 630 rc = save_private_token_object(hContext, obj); 738 save_private_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument 809 rc = tpm_encrypt_data(hContext, hPrivateLeafKey, cleartxt, cleartxt_len, 942 load_private_token_objects(TSS_HCONTEXT hContext) argument 1005 rc = restore_private_token_object(hContext, buf, size, NULL); 1032 TSS_HCONTEXT hContext, 1063 rc = tpm_decrypt_data(hContext, hPrivateLeafKe 1031 restore_private_token_object( TSS_HCONTEXT hContext, CK_BYTE *data, CK_ULONG len, OBJECT *pObj) argument 1103 reload_token_object(TSS_HCONTEXT hContext, OBJECT *obj) argument [all...] |
H A D | key_mgr.c | 148 sess->hContext, 254 rc = object_mgr_find_in_map1(sess->hContext, h_wrapping_key, &key1_obj); 258 rc = object_mgr_find_in_map1(sess->hContext, h_key, &key2_obj); 372 rc = object_mgr_find_in_map1(sess->hContext, h_unwrapping_key,
|
H A D | sess_mgr.c | 605 if (sess->hContext) 606 (void) Tspi_Context_Close(sess->hContext); 613 TSS_HCONTEXT hContext; local 614 if (open_tss_context(&hContext) == 0) { 615 (void) object_mgr_purge_private_token_objects(hContext); 616 (void) Tspi_Context_Close(hContext); 682 if (sess->hContext) 683 (void) Tspi_Context_Close(sess->hContext);
|
H A D | utility.c | 411 init_token_data(TSS_HCONTEXT hContext, TOKEN_DATA *td) { argument 432 rc = token_get_tpm_info(hContext, td);
|
H A D | dig_mgr.c | 455 rc = object_mgr_find_in_map1(sess->hContext, key_handle, &key_obj);
|
H A D | mech_md5.c | 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
|
H A D | mech_sha.c | 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
|
H A D | sign_mgr.c | 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
|
H A D | verify_mgr.c | 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
|
H A D | api_interface.c | 1337 TSS_HCONTEXT hContext; local 1349 if (open_tss_context(&hContext) == 0) { 1355 (void) token_get_tpm_info(hContext, &td); 1357 (void) Tspi_Context_Close(hContext);
|
H A D | tpmtok_int.h | 320 TSS_HCONTEXT hContext; member in struct:_SESSION
|