/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/ica_s390_stdll/ |
H A D | ica_specific.c | 252 static CK_BYTE count_ones_in_byte(CK_BYTE byte) in count_ones_in_byte() 354 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_des_cbc() 455 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_tdes_cbc() 1136 CK_BYTE *ptr = NULL; in rsa_convert_mod_expo_key() 1209 CK_BYTE *ptr = NULL; in rsa_convert_crt_key() 1308 CK_BYTE *ptr = NULL; in os_specific_rsa_keygen() 2337 CK_BYTE *emdata = NULL; in token_specific_rsa_pss_sign() 2509 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_aes_cbc() 2664 CK_BYTE *counterblock; in token_specific_aes_gcm() 2753 CK_BYTE *ucb, *subkey; in token_specific_aes_gcm_update() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/sbin/pkcscca/ |
H A D | pkcscca.h | 52 CK_RV sw_des3_cbc(CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *, CK_BYTE *, 53 CK_BYTE *, CK_BYTE); 108 CK_BYTE key[MASTER_KEY_SIZE]; 109 CK_BYTE sha_hash[SHA1_HASH_SIZE]; 124 CK_BYTE user_pin_sha[3 * DES_BLOCK_SIZE]; 125 CK_BYTE so_pin_sha[3 * DES_BLOCK_SIZE]; 126 CK_BYTE next_token_object_name[8]; 133 CK_BYTE *opaque_attr; 173 CK_BYTE name[8]; // for token objects
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/soft_stdll/ |
H A D | soft_specific.c | 182 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_des_cbc() 310 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) in token_specific_tdes_cbc() 603 CK_BYTE *ssl_ptr = NULL; 1037 CK_BYTE out[MAX_RSA_KEYLEN]; 1182 CK_BYTE out[MAX_RSA_KEYLEN]; 1227 CK_BYTE *emdata = NULL; 1562 CK_BYTE *em_data = NULL; 1590 em_data = (CK_BYTE *) malloc(modulus_bytes * sizeof(CK_BYTE)); 1626 CK_BYTE *decr_data = NULL; 1740 OBJECT *key, CK_BYTE *init_v, CK_BYTE encrypt) [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/ |
H A D | loadsave.c | 103 static CK_BYTE *duplicate_initial_vector(const CK_BYTE *iv) in duplicate_initial_vector() 243 CK_BYTE *key, CK_ULONG keylen, const CK_BYTE *iv, in decrypt_data() 644 CK_BYTE *ptr = NULL; in save_private_token_object() 647 CK_BYTE *key = NULL; in save_private_token_object() 771 CK_BYTE *buf = NULL; in load_public_token_objects() 851 CK_BYTE *buf = NULL; in load_private_token_objects() 943 CK_BYTE *ptr = NULL; in restore_private_token_object() 944 CK_BYTE *key = NULL; in restore_private_token_object() 1053 CK_BYTE *key = NULL; in load_masterkey_so() 1156 CK_BYTE *key = NULL; in load_masterkey_user() [all …]
|
H A D | mech_sha.c | 289 CK_BYTE hash[SHA1_HASH_SIZE]; in sha1_hmac_sign() 292 CK_BYTE k_ipad[SHA1_BLOCK_SIZE]; in sha1_hmac_sign() 293 CK_BYTE k_opad[SHA1_BLOCK_SIZE]; in sha1_hmac_sign() 378 CK_BYTE *key = attr->pValue; in sha1_hmac_sign() 472 CK_BYTE hash[SHA224_HASH_SIZE]; in sha224_hmac_sign() 558 CK_BYTE *key = attr->pValue; in sha224_hmac_sign() 652 CK_BYTE hash[SHA256_HASH_SIZE]; in sha256_hmac_sign() 832 CK_BYTE hash[SHA384_HASH_SIZE]; in sha384_hmac_sign() 1017 CK_BYTE hash[SHA512_HASH_SIZE]; in sha512_hmac_sign() 1199 CK_BYTE hmac[SHA1_HASH_SIZE]; in sha1_hmac_verify() [all …]
|
H A D | mech_ssl3.c | 66 CK_BYTE *key_data = NULL; in ssl3_mac_sign() 213 CK_BYTE *key_data = NULL; in ssl3_mac_sign_update() 216 CK_BYTE inner[48]; in ssl3_mac_sign_update() 308 CK_BYTE *key_data = NULL; in ssl3_mac_sign_final() 312 CK_BYTE outer[48]; in ssl3_mac_sign_final() 480 CK_BYTE *key_data = NULL; in ssl3_mac_verify_update() 483 CK_BYTE inner[48]; in ssl3_mac_verify_update() 577 CK_BYTE outer[48]; in ssl3_mac_verify_final() 690 CK_BYTE key[48]; in ckm_ssl3_pre_master_key_gen() 950 CK_BYTE key_data[48]; in ssl3_master_key_derive() [all …]
|
H A D | lock_sess_mgr.c | 514 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 553 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 592 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 708 CK_BYTE *mech_param = NULL; in session_mgr_set_op_state() 709 CK_BYTE *context = NULL; in session_mgr_set_op_state() 710 CK_BYTE *ptr1 = NULL; in session_mgr_set_op_state() 711 CK_BYTE *ptr2 = NULL; in session_mgr_set_op_state() 712 CK_BYTE *ptr3 = NULL; in session_mgr_set_op_state() 754 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state() 800 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state() [all …]
|
H A D | sess_mgr.c | 485 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 524 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 563 memcpy((CK_BYTE *) op_data + offset, in session_mgr_get_op_state() 679 CK_BYTE *mech_param = NULL; in session_mgr_set_op_state() 680 CK_BYTE *context = NULL; in session_mgr_set_op_state() 681 CK_BYTE *ptr1 = NULL; in session_mgr_set_op_state() 682 CK_BYTE *ptr2 = NULL; in session_mgr_set_op_state() 683 CK_BYTE *ptr3 = NULL; in session_mgr_set_op_state() 725 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state() 771 ptr1 = (CK_BYTE *) ctx; in session_mgr_set_op_state() [all …]
|
H A D | mech_dsa.c | 37 CK_BYTE *in_data, in dsa_sign() 39 CK_BYTE *out_data, CK_ULONG *out_data_len) in dsa_sign() 43 CK_BYTE sig[DSA_SIGNATURE_SIZE]; in dsa_sign() 102 CK_BYTE *in_data, in dsa_verify() 103 CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) in dsa_verify() 181 CK_BYTE *in_data, CK_BYTE *signature, OBJECT *priv_key) in ckm_dsa_sign() 218 CK_BYTE *signature, CK_BYTE *data, OBJECT *publ_key) in ckm_dsa_verify()
|
H A D | mech_dh.c | 57 CK_BYTE secret_key_value[256]; in dh_pkcs_derive() 144 CK_BYTE *secret_value, CK_ULONG *secret_value_len) in ckm_dh_pkcs_derive() 147 CK_BYTE p[256]; in ckm_dh_pkcs_derive() 149 CK_BYTE x[256]; in ckm_dh_pkcs_derive() 153 CK_BYTE *p_other_pubkey; in ckm_dh_pkcs_derive() 171 memcpy(x, (CK_BYTE *) temp_attr->pValue, x_len); in ckm_dh_pkcs_derive() 182 memcpy(p, (CK_BYTE *) temp_attr->pValue, p_len); in ckm_dh_pkcs_derive() 185 p_other_pubkey = (CK_BYTE *) other_pubkey; in ckm_dh_pkcs_derive()
|
/dports/security/yubico-piv-tool/yubico-piv-tool-2.2.0/ykcs11/ |
H A D | ykcs11.h | 75 CK_BYTE algorithm; // PIV Key algorithm 76 CK_BYTE key_id; // Key id 82 CK_BYTE piv_key; // PIV Key id 83 CK_BYTE algorithm; // PIV Key algorithm 97 CK_BYTE piv_key; // PIV Key id 98 CK_BYTE algorithm; // PIV Key algorithm 118 CK_BYTE buf[4096]; 139 CK_BYTE sub_id; // Sub-object id
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/ |
H A D | dsa_func.c | 24 CK_BYTE DSA_PUBL_PRIME[128] = { 40 CK_BYTE DSA_PUBL_SUBPRIME[20] = { 46 CK_BYTE DSA_PUBL_BASE[128] = { 112 CK_BYTE data1[20]; in do_SignDSA() 113 CK_BYTE signature[256]; in do_SignDSA() 211 CK_BYTE DSA1024_BASE[128] = { 227 CK_BYTE DSA1024_PRIME[128] = { 248 CK_BYTE DSA1024_PRIVATE[20] = { 253 CK_BYTE DSA1024_PUBLIC[128] = { 281 CK_BYTE data1[20]; in do_ImportDSAKeyPairSignVerify() [all …]
|
H A D | ec.h | 12 CK_BYTE name[32]; 13 CK_BYTE params[64]; 15 CK_BYTE privkey[196]; 17 CK_BYTE pubkey[196]; 508 CK_BYTE name[32]; 509 CK_BYTE params[64]; 511 CK_BYTE privkeyA[196]; 512 CK_BYTE pubkeyA[196]; 514 CK_BYTE privkeyB[196]; 515 CK_BYTE pubkeyB[196]; [all …]
|
H A D | ec_func.c | 97 const CK_BYTE brainpoolP160r1[] = 99 const CK_BYTE brainpoolP160t1[] = 101 const CK_BYTE brainpoolP192r1[] = 103 const CK_BYTE brainpoolP192t1[] = 105 const CK_BYTE brainpoolP224r1[] = 107 const CK_BYTE brainpoolP224t1[] = 125 const CK_BYTE prime192[] = 128 const CK_BYTE prime256[] = 159 const CK_BYTE invalidCurve[] = 161 const CK_BYTE invalidLen1[] = [all …]
|
H A D | aes_func.c | 35 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptAES() 38 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDecryptAES() 168 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptUpdateAES() 171 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDecryptUpdateAES() 518 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateAES() 520 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateAES() 600 CK_BYTE *data_chunk = NULL; in do_EncryptUpdateAES() 818 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateAES() 820 CK_BYTE plaintext[BIG_REQUEST]; in do_DecryptUpdateAES() 898 CK_BYTE *data_chunk = NULL; in do_DecryptUpdateAES() [all …]
|
/dports/www/firefox/firefox-99.0/third_party/rust/pkcs11/src/ |
H A D | lib.rs | 533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument 698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument 719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument 773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument 848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument 914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument 973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument 1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument 1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument 1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/pkcs11/src/ |
H A D | lib.rs | 533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument 698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument 719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument 773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument 848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument 914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument 973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument 1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument 1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument 1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/pkcs11/src/ |
H A D | lib.rs | 533 operation_state: Vec<CK_BYTE>, in set_operation_state() argument 698 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error>… in encrypt() argument 719 …pub fn encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>,… in encrypt_update() argument 773 … decrypt(&self, session: CK_SESSION_HANDLE, encryptedData: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument 848 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in digest() argument 914 pub fn sign(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Error> { in sign() argument 973 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, E… in sign_recover() argument 1003 …pub fn verify(&self, session: CK_SESSION_HANDLE, data: &[CK_BYTE], signature: &[CK_BYTE]) -> Resul… in verify() argument 1040 …rify_recover(&self, session: CK_SESSION_HANDLE, signature: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument 1103 …gn_encrypt_update(&self, session: CK_SESSION_HANDLE, part: &[CK_BYTE]) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/pkcs11/src/ |
H A D | lib.rs | 530 operation_state: Vec<CK_BYTE>, in set_operation_state() argument 695 …pub fn encrypt(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in encrypt() argument 716 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in encrypt_update() argument 770 …crypt(&self, session: CK_SESSION_HANDLE, encryptedData: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in decrypt() argument 845 …pub fn digest(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Erro… in digest() argument 911 …pub fn sign(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Error>… in sign() argument 970 …pub fn sign_recover(&self, session: CK_SESSION_HANDLE, data: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>… in sign_recover() argument 1037 …y_recover(&self, session: CK_SESSION_HANDLE, signature: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in verify_recover() argument 1058 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in digest_encrypt_update() argument 1100 …encrypt_update(&self, session: CK_SESSION_HANDLE, part: &Vec<CK_BYTE>) -> Result<Vec<CK_BYTE>, Err… in sign_encrypt_update() argument [all …]
|
/dports/dns/bind916/bind-9.16.27/bin/tests/pkcs11/benchmarks/ |
H A D | sign.c | 85 CK_BYTE modulus[] = { 98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 99 CK_BYTE privexp[] = { 112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7, 148 CK_BYTE buf[1024]; 149 CK_BYTE sig[128];
|
/dports/dns/bind911/bind-9.11.37/bin/tests/pkcs11/benchmarks/ |
H A D | sign.c | 89 CK_BYTE modulus[] = { 108 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 109 CK_BYTE privexp[] = { 128 CK_BYTE prime1[] = { 139 CK_BYTE prime2[] = { 150 CK_BYTE exp_1[] = { 160 CK_BYTE exp_2[] = { 171 CK_BYTE coeff[] = { 183 CK_BYTE buf[1024]; 184 CK_BYTE sig[128];
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/pkcs11/benchmarks/ |
H A D | sign.c | 83 CK_BYTE modulus[] = { 96 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 97 CK_BYTE privexp[] = { 110 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 117 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 124 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 131 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 138 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7, 146 CK_BYTE buf[1024]; 147 CK_BYTE sig[128];
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/pkcs11/benchmarks/ |
H A D | sign.c | 85 CK_BYTE modulus[] = { 98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 99 CK_BYTE privexp[] = { 112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7, 148 CK_BYTE buf[1024]; 149 CK_BYTE sig[128];
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/misc_tests/ |
H A D | tok_obj2.c | 35 void show_error(CK_BYTE * str, CK_RV rc) in show_error() 64 CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; in do_create_token_object() 67 CK_BYTE true = TRUE; in do_create_token_object() 68 CK_BYTE false = FALSE; in do_create_token_object() 74 CK_BYTE cert1_id[] = "Certificate ID #1"; in do_create_token_object() 75 CK_BYTE cert1_value[] = in do_create_token_object() 248 CK_BYTE buf1[100]; in do_verify_token_object() 402 CK_BYTE label[32]; in do_inittoken() 403 CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; in do_inittoken() 458 CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; in do_setUserPIN() [all …]
|
H A D | tok_obj.c | 42 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_create_token_object() 45 CK_BYTE true = TRUE; in do_create_token_object() 46 CK_BYTE false = FALSE; in do_create_token_object() 53 CK_BYTE cert1_value[] = in do_create_token_object() 149 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_count_token_objects() 216 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_verify_token_object() 223 CK_BYTE buf1[100]; in do_verify_token_object() 378 CK_BYTE label[32]; in do_inittoken() 379 CK_BYTE so_pin[PKCS11_MAX_PIN_LEN]; in do_inittoken() 440 CK_BYTE so_pin[PKCS11_MAX_PIN_LEN]; in do_setUserPIN() [all …]
|