Home
last modified time | relevance | path

Searched refs:CK_BYTE (Results 26 – 50 of 563) sorted by relevance

12345678910>>...23

/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/ica_s390_stdll/
H A Dica_specific.c252 static CK_BYTE count_ones_in_byte(CK_BYTE byte) in count_ones_in_byte()
354 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_des_cbc()
455 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_tdes_cbc()
1136 CK_BYTE *ptr = NULL; in rsa_convert_mod_expo_key()
1209 CK_BYTE *ptr = NULL; in rsa_convert_crt_key()
1308 CK_BYTE *ptr = NULL; in os_specific_rsa_keygen()
2337 CK_BYTE *emdata = NULL; in token_specific_rsa_pss_sign()
2509 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_aes_cbc()
2664 CK_BYTE *counterblock; in token_specific_aes_gcm()
2753 CK_BYTE *ucb, *subkey; in token_specific_aes_gcm_update()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/sbin/pkcscca/
H A Dpkcscca.h52 CK_RV sw_des3_cbc(CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *, CK_BYTE *,
53 CK_BYTE *, CK_BYTE);
108 CK_BYTE key[MASTER_KEY_SIZE];
109 CK_BYTE sha_hash[SHA1_HASH_SIZE];
124 CK_BYTE user_pin_sha[3 * DES_BLOCK_SIZE];
125 CK_BYTE so_pin_sha[3 * DES_BLOCK_SIZE];
126 CK_BYTE next_token_object_name[8];
133 CK_BYTE *opaque_attr;
173 CK_BYTE name[8]; // for token objects
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/soft_stdll/
H A Dsoft_specific.c182 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_des_cbc()
310 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_tdes_cbc()
603 CK_BYTE *ssl_ptr = NULL;
1037 CK_BYTE out[MAX_RSA_KEYLEN];
1182 CK_BYTE out[MAX_RSA_KEYLEN];
1227 CK_BYTE *emdata = NULL;
1562 CK_BYTE *em_data = NULL;
1590 em_data = (CK_BYTE *) malloc(modulus_bytes * sizeof(CK_BYTE));
1626 CK_BYTE *decr_data = NULL;
1740 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt)
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/
H A Dloadsave.c103 static CK_BYTE *duplicate_initial_vector(const CK_BYTE *iv) in duplicate_initial_vector()
243 CK_BYTE *key, CK_ULONG keylen, const CK_BYTE *iv, in decrypt_data()
644 CK_BYTE *ptr = NULL; in save_private_token_object()
647 CK_BYTE *key = NULL; in save_private_token_object()
771 CK_BYTE *buf = NULL; in load_public_token_objects()
851 CK_BYTE *buf = NULL; in load_private_token_objects()
943 CK_BYTE *ptr = NULL; in restore_private_token_object()
944 CK_BYTE *key = NULL; in restore_private_token_object()
1053 CK_BYTE *key = NULL; in load_masterkey_so()
1156 CK_BYTE *key = NULL; in load_masterkey_user()
[all …]
H A Dmech_sha.c289 CK_BYTE hash[SHA1_HASH_SIZE]; in sha1_hmac_sign()
292 CK_BYTE k_ipad[SHA1_BLOCK_SIZE]; in sha1_hmac_sign()
293 CK_BYTE k_opad[SHA1_BLOCK_SIZE]; in sha1_hmac_sign()
378 CK_BYTE *key = attr->pValue; in sha1_hmac_sign()
472 CK_BYTE hash[SHA224_HASH_SIZE]; in sha224_hmac_sign()
558 CK_BYTE *key = attr->pValue; in sha224_hmac_sign()
652 CK_BYTE hash[SHA256_HASH_SIZE]; in sha256_hmac_sign()
832 CK_BYTE hash[SHA384_HASH_SIZE]; in sha384_hmac_sign()
1017 CK_BYTE hash[SHA512_HASH_SIZE]; in sha512_hmac_sign()
1199 CK_BYTE hmac[SHA1_HASH_SIZE]; in sha1_hmac_verify()
[all …]
H A Dmech_ssl3.c66 CK_BYTE *key_data = NULL; in ssl3_mac_sign()
213 CK_BYTE *key_data = NULL; in ssl3_mac_sign_update()
216 CK_BYTE inner[48]; in ssl3_mac_sign_update()
308 CK_BYTE *key_data = NULL; in ssl3_mac_sign_final()
312 CK_BYTE outer[48]; in ssl3_mac_sign_final()
480 CK_BYTE *key_data = NULL; in ssl3_mac_verify_update()
483 CK_BYTE inner[48]; in ssl3_mac_verify_update()
577 CK_BYTE outer[48]; in ssl3_mac_verify_final()
690 CK_BYTE key[48]; in ckm_ssl3_pre_master_key_gen()
950 CK_BYTE key_data[48]; in ssl3_master_key_derive()
[all …]
H A Dlock_sess_mgr.c514 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
553 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
592 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
708 CK_BYTE *mech_param = NULL; in session_mgr_set_op_state()
709 CK_BYTE *context = NULL; in session_mgr_set_op_state()
710 CK_BYTE *ptr1 = NULL; in session_mgr_set_op_state()
711 CK_BYTE *ptr2 = NULL; in session_mgr_set_op_state()
712 CK_BYTE *ptr3 = NULL; in session_mgr_set_op_state()
754 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state()
800 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state()
[all …]
H A Dsess_mgr.c485 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
524 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
563 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state()
679 CK_BYTE *mech_param = NULL; in session_mgr_set_op_state()
680 CK_BYTE *context = NULL; in session_mgr_set_op_state()
681 CK_BYTE *ptr1 = NULL; in session_mgr_set_op_state()
682 CK_BYTE *ptr2 = NULL; in session_mgr_set_op_state()
683 CK_BYTE *ptr3 = NULL; in session_mgr_set_op_state()
725 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state()
771 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state()
[all …]
H A Dmech_dsa.c37 CK_BYTE *in_data, in dsa_sign()
39 CK_BYTE *out_data, CK_ULONG *out_data_len) in dsa_sign()
43 CK_BYTE sig[DSA_SIGNATURE_SIZE]; in dsa_sign()
102 CK_BYTE *in_data, in dsa_verify()
103 CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) in dsa_verify()
181 CK_BYTE *in_data, CK_BYTE *signature, OBJECT *priv_key) in ckm_dsa_sign()
218 CK_BYTE *signature, CK_BYTE *data, OBJECT *publ_key) in ckm_dsa_verify()
H A Dmech_dh.c57 CK_BYTE secret_key_value[256]; in dh_pkcs_derive()
144 CK_BYTE *secret_value, CK_ULONG *secret_value_len) in ckm_dh_pkcs_derive()
147 CK_BYTE p[256]; in ckm_dh_pkcs_derive()
149 CK_BYTE x[256]; in ckm_dh_pkcs_derive()
153 CK_BYTE *p_other_pubkey; in ckm_dh_pkcs_derive()
171 memcpy(x, (CK_BYTE *) temp_attr->pValue, x_len); in ckm_dh_pkcs_derive()
182 memcpy(p, (CK_BYTE *) temp_attr->pValue, p_len); in ckm_dh_pkcs_derive()
185 p_other_pubkey = (CK_BYTE *) other_pubkey; in ckm_dh_pkcs_derive()
/dports/security/yubico-piv-tool/yubico-piv-tool-2.2.0/ykcs11/
H A Dykcs11.h75 CK_BYTE algorithm; // PIV Key algorithm
76 CK_BYTE key_id; // Key id
82 CK_BYTE piv_key; // PIV Key id
83 CK_BYTE algorithm; // PIV Key algorithm
97 CK_BYTE piv_key; // PIV Key id
98 CK_BYTE algorithm; // PIV Key algorithm
118 CK_BYTE buf[4096];
139 CK_BYTE sub_id; // Sub-object id
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/
H A Ddsa_func.c24 CK_BYTE DSA_PUBL_PRIME[128] = {
40 CK_BYTE DSA_PUBL_SUBPRIME[20] = {
46 CK_BYTE DSA_PUBL_BASE[128] = {
112 CK_BYTE data1[20]; in do_SignDSA()
113 CK_BYTE signature[256]; in do_SignDSA()
211 CK_BYTE DSA1024_BASE[128] = {
227 CK_BYTE DSA1024_PRIME[128] = {
248 CK_BYTE DSA1024_PRIVATE[20] = {
253 CK_BYTE DSA1024_PUBLIC[128] = {
281 CK_BYTE data1[20]; in do_ImportDSAKeyPairSignVerify()
[all …]
H A Dec.h12 CK_BYTE name[32];
13 CK_BYTE params[64];
15 CK_BYTE privkey[196];
17 CK_BYTE pubkey[196];
508 CK_BYTE name[32];
509 CK_BYTE params[64];
511 CK_BYTE privkeyA[196];
512 CK_BYTE pubkeyA[196];
514 CK_BYTE privkeyB[196];
515 CK_BYTE pubkeyB[196];
[all …]
H A Dec_func.c97 const CK_BYTE brainpoolP160r1[] =
99 const CK_BYTE brainpoolP160t1[] =
101 const CK_BYTE brainpoolP192r1[] =
103 const CK_BYTE brainpoolP192t1[] =
105 const CK_BYTE brainpoolP224r1[] =
107 const CK_BYTE brainpoolP224t1[] =
125 const CK_BYTE prime192[] =
128 const CK_BYTE prime256[] =
159 const CK_BYTE invalidCurve[] =
161 const CK_BYTE invalidLen1[] =
[all …]
H A Daes_func.c35 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptAES()
38 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDecryptAES()
168 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptUpdateAES()
171 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDecryptUpdateAES()
518 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateAES()
520 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateAES()
600 CK_BYTE *data_chunk = NULL; in do_EncryptUpdateAES()
818 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateAES()
820 CK_BYTE plaintext[BIG_REQUEST]; in do_DecryptUpdateAES()
898 CK_BYTE *data_chunk = NULL; in do_DecryptUpdateAES()
[all …]
/dports/www/firefox/firefox-99.0/third_party/rust/pkcs11/src/
H A Dlib.rs533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument
698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument
719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument
773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument
848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument
914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument
973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument
1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument
1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument
1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/pkcs11/src/
H A Dlib.rs533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument
698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument
719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument
773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument
848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument
914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument
973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument
1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument
1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument
1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument
[all …]
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/pkcs11/src/
H A Dlib.rs533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument
698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument
719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument
773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument
848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument
914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument
973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument
1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument
1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument
1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument
[all …]
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/pkcs11/src/
H A Dlib.rs530 operation_state: Vec<CK_BYTE>, in set_operation_state() argument
695 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in encrypt() argument
716 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in encrypt_update() argument
770 …crypt(&self, session: CK_SESSION_HANDLE, encryptedData: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument
845 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Erro… in digest() argument
911 …pub fn sign(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Error>… in sign() argument
970 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>… in sign_recover() argument
1037 …y_recover(&self, session: CK_SESSION_HANDLE, signature: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument
1058 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in digest_encrypt_update() argument
1100 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument
[all …]
/dports/dns/bind916/bind-9.16.27/bin/tests/pkcs11/benchmarks/
H A Dsign.c85 CK_BYTE modulus[] = {
98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
99 CK_BYTE privexp[] = {
112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
148 CK_BYTE buf[1024];
149 CK_BYTE sig[128];
/dports/dns/bind911/bind-9.11.37/bin/tests/pkcs11/benchmarks/
H A Dsign.c89 CK_BYTE modulus[] = {
108 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
109 CK_BYTE privexp[] = {
128 CK_BYTE prime1[] = {
139 CK_BYTE prime2[] = {
150 CK_BYTE exp_1[] = {
160 CK_BYTE exp_2[] = {
171 CK_BYTE coeff[] = {
183 CK_BYTE buf[1024];
184 CK_BYTE sig[128];
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/pkcs11/benchmarks/
H A Dsign.c83 CK_BYTE modulus[] = {
96 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
97 CK_BYTE privexp[] = {
110 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
117 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
124 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
131 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
138 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
146 CK_BYTE buf[1024];
147 CK_BYTE sig[128];
/dports/dns/bind-tools/bind-9.16.27/bin/tests/pkcs11/benchmarks/
H A Dsign.c85 CK_BYTE modulus[] = {
98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
99 CK_BYTE privexp[] = {
112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
148 CK_BYTE buf[1024];
149 CK_BYTE sig[128];
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/misc_tests/
H A Dtok_obj2.c35 void show_error(CK_BYTE * str, CK_RV rc) in show_error()
64 CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; in do_create_token_object()
67 CK_BYTE true = TRUE; in do_create_token_object()
68 CK_BYTE false = FALSE; in do_create_token_object()
74 CK_BYTE cert1_id[] = "Certificate ID #1"; in do_create_token_object()
75 CK_BYTE cert1_value[] = in do_create_token_object()
248 CK_BYTE buf1[100]; in do_verify_token_object()
402 CK_BYTE label[32]; in do_inittoken()
403 CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; in do_inittoken()
458 CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; in do_setUserPIN()
[all …]
H A Dtok_obj.c42 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_create_token_object()
45 CK_BYTE true = TRUE; in do_create_token_object()
46 CK_BYTE false = FALSE; in do_create_token_object()
53 CK_BYTE cert1_value[] = in do_create_token_object()
149 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_count_token_objects()
216 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_verify_token_object()
223 CK_BYTE buf1[100]; in do_verify_token_object()
378 CK_BYTE label[32]; in do_inittoken()
379 CK_BYTE so_pin[PKCS11_MAX_PIN_LEN]; in do_inittoken()
440 CK_BYTE so_pin[PKCS11_MAX_PIN_LEN]; in do_setUserPIN()
[all …]

12345678910>>...23