/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softARCFourCrypt.c | 45 soft_object_t *key_p, soft_session_op_t op) 54 keyvallen = (int)OBJ_SEC_VALUE_LEN(key_p); 56 keyvallen = OBJ_SEC_VALUE_LEN(key_p); 63 keyval = OBJ_SEC_VALUE(key_p); 44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument
|
H A D | softDigest.c | 287 soft_object_t *key_p; local 302 HANDLE2OBJECT(hKey, key_p, rv); 318 OBJ_REFRELE(key_p); 332 rv = soft_digest_key(session_p, key_p); 340 OBJ_REFRELE(key_p); 345 OBJ_REFRELE(key_p);
|
H A D | softSign.c | 40 soft_object_t *key_p; local 57 HANDLE2OBJECT(hKey, key_p, rv); 63 if (!(key_p->bool_attr_mask & SIGN_BOOL_ON)) { 86 rv = soft_sign_init(session_p, pMechanism, key_p); 95 OBJ_REFRELE(key_p); 297 soft_object_t *key_p; local 314 HANDLE2OBJECT(hKey, key_p, rv); 320 if (!(key_p->bool_attr_mask & SIGN_RECOVER_BOOL_ON)) { 343 rv = soft_sign_recover_init(session_p, pMechanism, key_p); 352 OBJ_REFRELE(key_p); [all...] |
H A D | softVerify.c | 40 soft_object_t *key_p; local 57 HANDLE2OBJECT(hKey, key_p, rv); 63 if (!(key_p->bool_attr_mask & VERIFY_BOOL_ON)) { 86 rv = soft_verify_init(session_p, pMechanism, key_p); 95 OBJ_REFRELE(key_p); 268 soft_object_t *key_p; local 285 HANDLE2OBJECT(hKey, key_p, rv); 291 if (!(key_p->bool_attr_mask & VERIFY_RECOVER_BOOL_ON)) { 314 rv = soft_verify_recover_init(session_p, pMechanism, key_p); 323 OBJ_REFRELE(key_p); [all...] |
H A D | softDecrypt.c | 41 soft_object_t *key_p; local 58 HANDLE2OBJECT(hKey, key_p, rv); 63 if (!(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) { 87 rv = soft_decrypt_init(session_p, pMechanism, key_p); 96 OBJ_REFRELE(key_p);
|
H A D | softDigestUtil.c | 475 soft_digest_key(soft_session_t *session_p, soft_object_t *key_p) argument 481 if (key_p->class != CKO_SECRET_KEY) 484 if ((OBJ_SEC_VALUE(key_p) == NULL) || 485 (OBJ_SEC_VALUE_LEN(key_p) == 0)) 488 rv = soft_digest_update(session_p, OBJ_SEC_VALUE(key_p), 489 OBJ_SEC_VALUE_LEN(key_p));
|
H A D | softEncrypt.c | 40 soft_object_t *key_p; local 57 HANDLE2OBJECT(hKey, key_p, rv); 62 if (!(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) { 86 rv = soft_encrypt_init(session_p, pMechanism, key_p); 95 OBJ_REFRELE(key_p);
|
H A D | softSignUtil.c | 45 * key_p: pointer to key soft_object_t struct 54 soft_object_t *key_p) 75 pMechanism, key_p, B_TRUE)); 87 key_p, B_TRUE)); 93 key_p, B_TRUE)); 99 key_p, B_TRUE)); 105 key_p, B_TRUE)); 408 soft_object_t *key_p) 417 key_p, B_TRUE)); 53 soft_sign_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument 407 soft_sign_recover_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
|
H A D | softVerifyUtil.c | 46 * key_p: pointer to key soft_object_t struct 55 soft_object_t *key_p) 76 pMechanism, key_p, B_FALSE)); 88 key_p, B_FALSE)); 94 key_p, B_FALSE)); 100 key_p, B_FALSE)); 106 key_p, B_FALSE)); 441 soft_object_t *key_p) 450 key_p, B_FALSE)); 54 soft_verify_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument 440 soft_verify_recover_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument
|
H A D | softBlowfishCrypt.c | 39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) 66 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) { 67 if (OBJ_KEY_SCHED(key_p) == NULL) { 70 (void) pthread_rwlock_wrlock(&key_p->object_rwlock); 71 if (OBJ_KEY_SCHED(key_p) == NULL) { 75 &key_p->object_rwlock); 81 blowfish_init_keysched(OBJ_SEC_VALUE(key_p), 82 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 84 OBJ_KEY_SCHED_LEN(key_p) = size; 85 OBJ_KEY_SCHED(key_p) 38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument [all...] |
H A D | softDecryptUtil.c | 67 * key_p: pointer to key soft_object_t struct 83 soft_object_t *key_p) 95 if (key_p->key_type != CKK_DES) { 105 if ((key_p->key_type != CKK_DES2) && 106 (key_p->key_type != CKK_DES3)) { 112 key_p, SOFT_DECRYPT_OP); 125 key_p->key_type); 153 if (key_p->key_type != CKK_DES) { 164 if ((key_p->key_type != CKK_DES2) && 165 (key_p 82 soft_decrypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument [all...] |
H A D | softAESCrypt.c | 72 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, 99 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) { 100 if (OBJ_KEY_SCHED(key_p) == NULL) { 103 (void) pthread_rwlock_wrlock(&key_p->object_rwlock); 104 if (OBJ_KEY_SCHED(key_p) == NULL) { 108 &key_p->object_rwlock); 115 aes_init_keysched(OBJ_SEC_VALUE(key_p), (uint_t) 116 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 118 aes_init_keysched(OBJ_SEC_VALUE(key_p), 119 (OBJ_SEC_VALUE_LEN(key_p) * 71 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument [all...] |
H A D | softDESCrypt.c | 45 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, 58 if (key_p->key_type == CKK_DES) 69 soft_des_ctx->key_type = key_p->key_type; 79 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) { 80 if (OBJ_KEY_SCHED(key_p) == NULL) { 83 (void) pthread_rwlock_wrlock(&key_p->object_rwlock); 84 if (OBJ_KEY_SCHED(key_p) == NULL) { 85 if (key_p->key_type == CKK_DES) 91 &key_p->object_rwlock); 97 if (key_p 44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, soft_session_op_t op) argument 748 soft_des_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op) argument [all...] |
H A D | softDSA.c | 48 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, 58 if ((key_p->class != CKO_PRIVATE_KEY) || 59 (key_p->key_type != CKK_DSA)) 62 if ((key_p->class != CKO_PUBLIC_KEY) || 63 (key_p->key_type != CKK_DSA)) 91 (void) pthread_rwlock_rdlock(&key_p->object_rwlock); 92 rv = soft_copy_object(key_p, &tmp_key, SOFT_COPY_OBJ_ORIG_SH, 97 (void) pthread_rwlock_unlock(&key_p->object_rwlock); 103 (void) pthread_rwlock_unlock(&key_p->object_rwlock); 47 soft_dsa_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign) argument
|
H A D | softEncryptUtil.c | 58 pMechanism, soft_object_t *key_p) 74 rv = soft_encrypt_init(session_p, pMechanism, key_p); 91 * key_p: pointer to key soft_object_t struct 107 soft_object_t *key_p) 119 if (key_p->key_type != CKK_DES) { 128 if ((key_p->key_type != CKK_DES2) && 129 (key_p->key_type != CKK_DES3)) { 135 key_p, SOFT_ENCRYPT_OP); 148 key_p->key_type); 176 if (key_p 57 soft_encrypt_init_internal(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument 106 soft_encrypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p) argument [all...] |
H A D | softMAC.c | 66 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op) 72 if ((key_p->class != CKO_SECRET_KEY) || 73 (key_p->key_type != CKK_GENERIC_SECRET)) { 165 rv = mac_init_ctx(session_p, key_p, hmac_ctx, pMechanism->mechanism); 65 soft_hmac_sign_verify_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t sign_op) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEncrypt.c | 43 kernel_object_t *key_p; local 67 HANDLE2OBJECT(hKey, key_p, rv); 74 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) { 90 if (!key_p->is_lib_obj) { 92 encrypt_init.ei_key.ck_obj_id = key_p->k_handle; 94 if (key_p->class == CKO_SECRET_KEY) { 97 get_symmetric_key_value(key_p); 103 OBJ_SEC(key_p)->sk_value_len << 3; 105 } else if (key_p [all...] |
H A D | kernelSign.c | 40 kernel_object_t *key_p; local 65 HANDLE2OBJECT(hKey, key_p, rv); 72 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & SIGN_BOOL_ON)) { 89 if (!key_p->is_lib_obj) { 91 sign_init.si_key.ck_obj_id = key_p->k_handle; 93 if (key_p->class == CKO_SECRET_KEY) { 96 get_symmetric_key_value(key_p); 102 OBJ_SEC(key_p)->sk_value_len << 3; 104 } else if (key_p 503 kernel_object_t *key_p; local [all...] |
H A D | kernelSoftCommon.c | 110 soft_object_t *key_p; local 128 key_p = &keyobj; 129 bzero(key_p, sizeof (soft_object_t)); 130 key_p->class = CKO_SECRET_KEY; 131 key_p->key_type = CKK_GENERIC_SECRET; 134 OBJ_SEC(key_p) = &skeyobj; 135 OBJ_SEC_VALUE(key_p) = kval; 136 OBJ_SEC_VALUE_LEN(key_p) = klen; 139 key_p, opflag & OP_SIGN);
|
H A D | kernelDecrypt.c | 40 kernel_decrypt_init(kernel_session_t *session_p, kernel_object_t *key_p, argument 50 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) { 70 if (!key_p->is_lib_obj) { 72 decrypt_init.di_key.ck_obj_id = key_p->k_handle; 74 if (key_p->class == CKO_SECRET_KEY) { 77 get_symmetric_key_value(key_p); 84 OBJ_SEC(key_p)->sk_value_len << 3; 86 } else if (key_p->key_type == CKK_RSA) { 87 if (get_rsa_private_key(key_p, 156 kernel_object_t *key_p; local [all...] |
H A D | kernelDigest.c | 402 kernel_object_t *key_p; local 422 HANDLE2OBJECT(hKey, key_p, rv); 433 if (key_p->is_lib_obj && (key_p->class != CKO_SECRET_KEY)) { 451 OBJ_REFRELE(key_p); 462 if (key_p->is_lib_obj) { 470 if (!key_p->is_lib_obj) { 476 digest_key.dk_key.ck_obj_id = key_p->k_handle; 489 ulPartLen = OBJ_SEC_VALUE_LEN(key_p); 495 pPart = (CK_BYTE_PTR) OBJ_SEC_VALUE(key_p); [all...] |
H A D | kernelVerify.c | 41 kernel_object_t *key_p; local 65 HANDLE2OBJECT(hKey, key_p, rv); 72 if (key_p->is_lib_obj && !(key_p->bool_attr_mask & VERIFY_BOOL_ON)) { 86 if (!key_p->is_lib_obj) { 88 verify_init.vi_key.ck_obj_id = key_p->k_handle; 90 if (key_p->class == CKO_SECRET_KEY) { 93 get_symmetric_key_value(key_p); 99 OBJ_SEC(key_p)->sk_value_len << 3; 101 } else if (key_p 459 kernel_object_t *key_p; local [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsDecrypt.c | 37 * key_p: pointer to key kms_object_t struct 53 kms_object_t *key_p) 64 if (key_p->key_type != CKK_AES) { 74 key_p, B_FALSE); 117 kms_object_t *key_p; local 134 HANDLE2OBJECT(hKey, key_p, rv); 139 if (!(key_p->bool_attr_mask & DECRYPT_BOOL_ON)) { 163 rv = kms_decrypt_init(session_p, pMechanism, key_p); 172 OBJ_REFRELE(key_p); 52 kms_decrypt_init(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p) argument
|
H A D | kmsEncrypt.c | 34 kms_object_t *key_p) 43 if (key_p->key_type != CKK_AES) { 53 key_p, B_TRUE); 129 kms_object_t *key_p; local 150 HANDLE2OBJECT(hKey, key_p, rv); 156 if (!(key_p->bool_attr_mask & ENCRYPT_BOOL_ON)) { 181 rv = kms_encrypt_init(session_p, pMechanism, key_p); 190 OBJ_REFRELE(key_p); 33 kms_encrypt_init(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p) argument
|
H A D | kmsAESCrypt.c | 84 CK_MECHANISM_PTR pMechanism, kms_object_t *key_p, 124 if (!(key_p->bool_attr_mask & SENSITIVE_BOOL_ON)) { 125 if (OBJ_KEY_SCHED(key_p) == NULL) { 128 (void) pthread_mutex_lock(&key_p->object_mutex); 129 if (OBJ_KEY_SCHED(key_p) == NULL) { 133 &key_p->object_mutex); 139 aes_init_keysched(OBJ_SEC_VALUE(key_p), (uint_t) 140 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 142 aes_init_keysched(OBJ_SEC_VALUE(key_p), 143 (OBJ_SEC_VALUE_LEN(key_p) * 83 kms_aes_crypt_init_common(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p, boolean_t encrypt) argument [all...] |