/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpmtok_int.h | 274 CK_BYTE *context; 332 CK_BYTE name[8]; // for token objects 373 CK_BYTE user_pin_sha[SHA1_DIGEST_LENGTH]; 374 CK_BYTE so_pin_sha[SHA1_DIGEST_LENGTH]; 375 CK_BYTE next_token_object_name[8]; 439 CK_BYTE token_debug_tag[MAXPATHLEN]; 444 CK_RV (*t_rng)(TSS_HCONTEXT, CK_BYTE *, CK_ULONG); 447 CK_RV (*t_rsa_decrypt)(TSS_HCONTEXT, CK_BYTE *, 448 CK_ULONG, CK_BYTE *, CK_ULONG *, OBJECT *); 452 CK_BYTE *, CK_ULON [all...] |
H A D | mech_rsa.c | 32 CK_BYTE *in_data, 34 CK_BYTE *out_data, 54 CK_BYTE * in_data, 56 CK_BYTE * out_data, 84 CK_BYTE * in_data, 86 CK_BYTE * out_data, 116 CK_BYTE * in_data, 118 CK_BYTE * out_data, 146 CK_BYTE * in_data, 148 CK_BYTE * out_dat [all...] |
H A D | asn1.c | 297 CK_BYTE ** ber_int, 299 CK_BYTE * data, 302 CK_BYTE *buf = NULL; 330 buf = (CK_BYTE *)malloc(len); 385 ber_decode_INTEGER(CK_BYTE * ber_int, 386 CK_BYTE ** data, 447 CK_BYTE ** str, 449 CK_BYTE * data, 452 CK_BYTE *buf = NULL; 477 buf = (CK_BYTE *)mallo [all...] |
H A D | globals.c | 97 CK_BYTE ber_rsaEncryption[] = { 100 CK_BYTE ber_md5WithRSAEncryption[] = { 103 CK_BYTE ber_sha1WithRSAEncryption[] = { 107 CK_BYTE ber_AlgMd5[] = { 111 CK_BYTE ber_AlgSha1[] = { 115 CK_BYTE ber_AlgIdRSAEncryption[] = { 180 CK_BYTE default_so_pin_md5[MD5_DIGEST_LENGTH] = { 185 CK_BYTE default_so_pin_sha[SHA1_DIGEST_LENGTH] = { 192 CK_BYTE default_user_pin_sha[SHA1_DIGEST_LENGTH] = { 198 CK_BYTE user_pin_md [all...] |
H A D | mech_md5.c | 300 CK_BYTE *in_data, 302 CK_BYTE *out_data, 324 CK_BYTE * in_data, 326 CK_BYTE * out_data, 331 CK_BYTE hash[MD5_DIGEST_LENGTH]; 334 CK_BYTE k_ipad[MD5_BLOCK_SIZE]; 335 CK_BYTE k_opad[MD5_BLOCK_SIZE]; 406 CK_BYTE *key = attr->pValue; 487 CK_BYTE * in_data, 489 CK_BYTE * signatur [all...] |
H A D | mech_sha.c | 33 CK_BYTE *in_data, 35 CK_BYTE *out_data, 59 CK_BYTE * in_data, 61 CK_BYTE * out_data, 65 CK_BYTE hash[SHA1_DIGEST_LENGTH]; 68 CK_BYTE k_ipad[SHA1_BLOCK_SIZE]; 69 CK_BYTE k_opad[SHA1_BLOCK_SIZE]; 137 CK_BYTE *key = attr->pValue; 217 CK_BYTE *in_data, 219 CK_BYTE *signatur [all...] |
H A D | sign_mgr.c | 39 CK_BYTE * ptr = NULL; 127 ctx->context = (CK_BYTE *)malloc( 204 ptr = (CK_BYTE *)malloc(mech->ulParameterLen); 253 CK_BYTE * in_data, 255 CK_BYTE * out_data, 306 CK_BYTE * in_data, 335 CK_BYTE * signature, 361 CK_BYTE * in_data, 363 CK_BYTE * out_data,
|
H A D | key.c | 357 derive_attr->pValue = (CK_BYTE *)derive_attr + 363 local_attr->pValue = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE); 453 class_attr->pValue = (CK_BYTE *)class_attr + 463 encrypt_attr->pValue = (CK_BYTE *)encrypt_attr + 469 verify_attr->pValue = (CK_BYTE *)verify_attr + 475 verify_recover_attr->pValue = (CK_BYTE *)verify_recover_attr + 481 wrap_attr->pValue = (CK_BYTE *)wrap_attr + 583 class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE); 592 sensitive_attr->pValue = (CK_BYTE *)sensitive_attr + 598 decrypt_attr->pValue = (CK_BYTE *)decrypt_att [all...] |
H A D | loadsave.c | 307 restore_private_token_object(TSS_HCONTEXT, CK_BYTE *, CK_ULONG, OBJECT *); 430 CK_BYTE fname[MAXPATHLEN]; 546 CK_BYTE fname[MAXPATHLEN]; 622 CK_BYTE line[100]; 624 CK_BYTE fname[MAXPATHLEN]; 685 CK_BYTE *cleartxt = NULL; 686 CK_BYTE fname[MAXPATHLEN]; 742 CK_BYTE *obj_data = NULL; 743 CK_BYTE *cleartxt = NULL; 744 CK_BYTE *ciphertx [all...] |
H A D | sess_mgr.c | 766 CK_BYTE *data, 799 (void) (void) memcpy((CK_BYTE *)op_data + offset, 806 (void) memcpy((CK_BYTE *)op_data + offset, 814 (void) memcpy((CK_BYTE *)op_data + offset, 840 (void) memcpy((CK_BYTE *)op_data + offset, 847 (void) memcpy((CK_BYTE *)op_data + offset, 855 (void) memcpy((CK_BYTE *)op_data + offset, 881 (void) memcpy((CK_BYTE *)op_data + offset, 887 (void) memcpy((CK_BYTE *)op_data + offset, 895 (void) memcpy((CK_BYTE *)op_dat [all...] |
H A D | utility.c | 450 compute_next_token_obj_name(CK_BYTE *current, CK_BYTE *next) { 500 CK_BYTE *data, 513 attr->pValue = (CK_BYTE *)attr + sizeof (CK_ATTRIBUTE); 525 add_pkcs_padding(CK_BYTE * ptr, 531 CK_BYTE pad_value; 534 pad_value = (CK_BYTE)pad_len; 547 CK_BYTE *ptr, 551 CK_BYTE pad_value; 564 CK_BYTE *pt [all...] |
H A D | verify_mgr.c | 127 ctx->context = (CK_BYTE *)malloc( 233 CK_BYTE * in_data, 235 CK_BYTE * signature, 284 CK_BYTE * in_data, 312 CK_BYTE * signature, 338 CK_BYTE * signature, 340 CK_BYTE * out_data,
|
H A D | decr_mgr.c | 41 CK_BYTE *ptr = NULL; 116 ptr = (CK_BYTE *)malloc(mech->ulParameterLen); 163 CK_BYTE *in_data, 165 CK_BYTE *out_data,
|
H A D | encr_mgr.c | 39 CK_BYTE * ptr = NULL; 115 ptr = (CK_BYTE *)malloc(mech->ulParameterLen); 162 CK_BYTE *in_data, 164 CK_BYTE *out_data,
|
H A D | key_mgr.c | 33 CK_BYTE *keydata, 37 CK_BYTE *alg = NULL; 38 CK_BYTE *priv_key = NULL; 237 CK_BYTE * wrapped_key, 243 CK_BYTE * data = NULL; 353 CK_BYTE * wrapped_key, 360 CK_BYTE * data = NULL; 434 data = (CK_BYTE *)malloc(data_len);
|
H A D | object.c | 378 sizeof (CK_BYTE), &sensitive); 394 sizeof (CK_BYTE), &extractable); 516 CK_BYTE ** data, 519 CK_BYTE * buf = NULL; 534 buf = (CK_BYTE *)malloc(total_len); 539 (void) memset((CK_BYTE *)buf, 0x0, total_len); 549 (void) memcpy(buf + offset, &obj->name, sizeof (CK_BYTE) * 8); 756 object_restore(CK_BYTE *data, OBJECT **new_obj, CK_BBOOL replace) {
|
H A D | template.c | 323 attr->pValue = (CK_BYTE *)attr + sizeof (CK_ATTRIBUTE); 615 new_attr->pValue = (CK_BYTE *)new_attr + sizeof (CK_ATTRIBUTE); 631 CK_BYTE * dest) 634 CK_BYTE * ptr = NULL; 702 CK_BYTE * buf, 707 CK_BYTE *ptr = NULL; 771 CK_BYTE *pb2; 775 pb2 = (CK_BYTE *)aptr; 785 CK_BYTE *pb2; 786 pb2 = (CK_BYTE *)a [all...] |
H A D | tpm_specific.c | 56 CK_RV token_rng(TSS_HCONTEXT, CK_BYTE *, CK_ULONG); 64 CK_BYTE *, 66 CK_BYTE *, 73 CK_BYTE *, 75 CK_BYTE *, 82 CK_BYTE *, 84 CK_BYTE *, 89 token_specific_rsa_verify(TSS_HCONTEXT, CK_BYTE *, 90 CK_ULONG, CK_BYTE *, CK_ULONG, OBJECT *); 102 CK_BYTE *, [all...] |
H A D | data_obj.c | 343 class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
|
/illumos-gate/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.h | 46 #define CK_BYTE uchar_t macro 74 extern const CK_BYTE MD5_DER_PREFIX[MD5_DER_PREFIX_Len]; 75 extern const CK_BYTE SHA1_DER_PREFIX[SHA1_DER_PREFIX_Len]; 76 extern const CK_BYTE SHA1_DER_PREFIX_OID[SHA1_DER_PREFIX_OID_Len]; 77 extern const CK_BYTE SHA256_DER_PREFIX[SHA2_DER_PREFIX_Len]; 78 extern const CK_BYTE SHA384_DER_PREFIX[SHA2_DER_PREFIX_Len]; 79 extern const CK_BYTE SHA512_DER_PREFIX[SHA2_DER_PREFIX_Len]; 80 extern const CK_BYTE DEFAULT_PUB_EXPO[DEFAULT_PUB_EXPO_Len];
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 162 CK_BYTE * pckBuffer, 229 MAX_PUBLIC_KEY_TEMPLATES, CKA_CLASS, (CK_BYTE *)&ckObjClass, 232 MAX_PUBLIC_KEY_TEMPLATES, CKA_TOKEN, (CK_BYTE *)&ckToken, 235 MAX_PUBLIC_KEY_TEMPLATES, CKA_PRIVATE, (CK_BYTE *)&ckPrivate, 246 MAX_PUBLIC_KEY_TEMPLATES, CKA_KEY_TYPE, (CK_BYTE *)&ckKeyType, 249 MAX_PUBLIC_KEY_TEMPLATES, CKA_DERIVE, (CK_BYTE *)&ckDerive, 257 MAX_PUBLIC_KEY_TEMPLATES, CKA_ENCRYPT, (CK_BYTE *)&ckEncrypt, 260 MAX_PUBLIC_KEY_TEMPLATES, CKA_VERIFY, (CK_BYTE *)&ckVerify, 264 (CK_BYTE *)&ckVerifyRecover, sizeof (ckVerifyRecover)) || 266 MAX_PUBLIC_KEY_TEMPLATES, CKA_WRAP, (CK_BYTE *) [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 624 CK_BYTE *A = NULL; 625 CK_BYTE *Ai = NULL; 626 CK_BYTE *B = NULL; 627 CK_BYTE *D = NULL; 628 CK_BYTE *I = NULL, *S, *P; 629 CK_BYTE *keybuf = NULL; 648 D = (CK_BYTE *)malloc(Dlen); 654 B = (CK_BYTE *)malloc(Blen); 677 I = (CK_BYTE *)malloc(Ilen); 729 A = (CK_BYTE *)mallo [all...] |
H A D | softCrypt.h | 97 void soft_add_pkcs7_padding(CK_BYTE *, int, CK_ULONG); 99 CK_RV soft_remove_pkcs7_padding(CK_BYTE *, CK_ULONG, CK_ULONG *);
|
H A D | softKeystore.h | 93 CK_BYTE **saltdata); 95 CK_RV soft_gen_hmac_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata);
|
H A D | softVerifyUtil.c | 154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ 179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ 345 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; 370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
|