/dports/dns/bind916/bind-9.16.27/bin/pkcs11/ |
H A D | pkcs11-keygen.c | 78 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1; 79 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519; 80 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448; 193 CK_BYTE exponent[5]; in main() 201 CK_BYTE idbuf[4]; in main() 379 idbuf[0] = (CK_BYTE)(id >> 8); in main() 380 idbuf[1] = (CK_BYTE)id; in main() 382 idbuf[0] = (CK_BYTE)(id >> 24); in main() 383 idbuf[1] = (CK_BYTE)(id >> 16); in main() 384 idbuf[2] = (CK_BYTE)(id >> 8); in main() [all …]
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/pkcs11/ |
H A D | pkcs11-keygen.c | 80 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1; 81 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519; 82 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448; 195 CK_BYTE exponent[5]; in main() 203 CK_BYTE idbuf[4]; in main() 381 idbuf[0] = (CK_BYTE)(id >> 8); in main() 382 idbuf[1] = (CK_BYTE)id; in main() 384 idbuf[0] = (CK_BYTE)(id >> 24); in main() 385 idbuf[1] = (CK_BYTE)(id >> 16); in main() 386 idbuf[2] = (CK_BYTE)(id >> 8); in main() [all …]
|
/dports/dns/bind-tools/bind-9.16.27/bin/pkcs11/ |
H A D | pkcs11-keygen.c | 78 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1; 79 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519; 80 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448; 193 CK_BYTE exponent[5]; in main() 201 CK_BYTE idbuf[4]; in main() 379 idbuf[0] = (CK_BYTE)(id >> 8); in main() 380 idbuf[1] = (CK_BYTE)id; in main() 382 idbuf[0] = (CK_BYTE)(id >> 24); in main() 383 idbuf[1] = (CK_BYTE)(id >> 16); in main() 384 idbuf[2] = (CK_BYTE)(id >> 8); in main() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/ep11_stdll/ |
H A D | ep11_specific.h | 58 CK_BBOOL length_only, CK_BYTE * in_data, 59 CK_ULONG in_data_len, CK_BYTE * signature, 63 CK_BYTE * in_data, CK_ULONG in_data_len); 66 CK_BBOOL length_only, CK_BYTE * signature, 80 CK_BYTE * in_data, CK_ULONG in_data_len, 81 CK_BYTE * signature, CK_ULONG sig_len); 84 CK_BYTE * in_data, CK_ULONG in_data_len); 87 CK_BYTE * signature, CK_ULONG sig_len); 125 CK_OBJECT_HANDLE key, CK_BYTE *input_data, 126 CK_ULONG input_data_len, CK_BYTE *output_data,
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/ |
H A D | digest_func.c | 29 CK_BYTE data[MAX_DATA_SIZE]; in do_Digest() 31 CK_BYTE actual[MAX_HASH_SIZE]; in do_Digest() 33 CK_BYTE expected[MAX_HASH_SIZE]; in do_Digest() 124 CK_BYTE data[MAX_DATA_SIZE]; in do_DigestUpdate() 126 CK_BYTE actual[MAX_HASH_SIZE]; in do_DigestUpdate() 128 CK_BYTE expected[MAX_HASH_SIZE]; in do_DigestUpdate() 1118 CK_BYTE key[MAX_KEY_SIZE]; in do_SignVerify_HMAC() 1120 CK_BYTE data[MAX_DATA_SIZE]; in do_SignVerify_HMAC() 1122 CK_BYTE actual[MAX_HASH_SIZE]; in do_SignVerify_HMAC() 1259 CK_BYTE key[MAX_KEY_SIZE]; in do_SignVerify_HMAC_Update() [all …]
|
H A D | des3_func.c | 31 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDES3() 146 CK_BYTE expected[BIG_REQUEST]; in do_EncryptUpdateDES3() 147 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateDES3() 148 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateDES3() 152 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptUpdateDES3() 226 CK_BYTE *data_chunk = NULL; in do_EncryptUpdateDES3() 435 CK_BYTE expected[BIG_REQUEST]; in do_DecryptUpdateDES3() 436 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateDES3() 437 CK_BYTE plaintext[BIG_REQUEST]; in do_DecryptUpdateDES3() 604 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptDES3() [all …]
|
H A D | des_func.c | 26 CK_BYTE expected[BIG_REQUEST]; in do_EncryptDES() 27 CK_BYTE actual[BIG_REQUEST]; in do_EncryptDES() 147 CK_BYTE expected[BIG_REQUEST]; in do_EncryptUpdateDES() 148 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateDES() 149 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateDES() 316 CK_BYTE expected[BIG_REQUEST]; in do_DecryptDES() 317 CK_BYTE actual[BIG_REQUEST]; in do_DecryptDES() 438 CK_BYTE expected[BIG_REQUEST]; in do_DecryptUpdateDES() 439 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateDES() 609 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptDES() [all …]
|
H A D | dh_func.c | 42 CK_BYTE DH_PUBL_PRIME[128] = { 61 CK_BYTE DH_PUBL_BASE[128] = { 79 CK_BYTE DH_PRIVATE_A[128] = { 97 CK_BYTE DH_PUBLIC_A[128] = { 115 CK_BYTE DH_PRIVATE_B[128] = { 133 CK_BYTE DH_PUBLIC_B[128] = { 167 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_DeriveDHKey() 172 CK_BYTE clear[32]; in do_DeriveDHKey() 173 CK_BYTE cipher[32]; in do_DeriveDHKey() 174 CK_BYTE re_cipher[32]; in do_DeriveDHKey() [all …]
|
H A D | rsaupdate_func.c | 49 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignVerifyUpdateRSA() 51 CK_BYTE signature[MAX_SIGNATURE_SIZE]; in do_SignVerifyUpdateRSA() 60 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_SignVerifyUpdateRSA() 300 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignVerifyUpdate_RSAPSS() 408 CK_BYTE *data_chunk = NULL; in do_SignVerifyUpdate_RSAPSS() 468 CK_BYTE *data_chunk = NULL; in do_SignVerifyUpdate_RSAPSS() 549 CK_BYTE actual[MAX_SIGNATURE_SIZE]; in do_VerifyUpdateRSA() 550 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_VerifyUpdateRSA() 724 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignUpdateRSA() 725 CK_BYTE actual[MAX_SIGNATURE_SIZE]; in do_SignUpdateRSA() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/ |
H A D | mech_md5.c | 28 static CK_BYTE PADDING[64] = { 47 CK_BYTE *in_data, in md5_hash() 49 CK_BYTE *out_data, CK_ULONG *out_data_len) in md5_hash() 101 CK_BYTE length_only, in md5_hash_final() 142 CK_BYTE *in_data, in md5_hmac_sign() 148 CK_BYTE hash[MD5_HASH_SIZE]; in md5_hmac_sign() 151 CK_BYTE k_ipad[MD5_BLOCK_SIZE]; in md5_hmac_sign() 152 CK_BYTE k_opad[MD5_BLOCK_SIZE]; in md5_hmac_sign() 224 CK_BYTE *key = attr->pValue; in md5_hmac_sign() 314 CK_BYTE *in_data, in md5_hmac_verify() [all …]
|
H A D | key.c | 3419 CK_BYTE *ptr = NULL; in generic_secret_wrap_get_data() 3463 CK_BYTE *ptr = NULL; in generic_secret_unwrap() 3971 CK_BYTE *ptr = NULL; in des_unwrap() 4031 CK_BYTE *ptr = NULL; in des_validate_attribute() 4088 CK_BYTE *ptr = NULL; in des_wrap_get_data() 4188 CK_BYTE *ptr = NULL; in des2_validate_attribute() 4307 CK_BYTE *ptr = NULL; in des3_unwrap() 4368 CK_BYTE *ptr = NULL; in des3_validate_attribute() 4420 CK_BYTE *ptr = NULL; in des3_wrap_get_data() 5365 CK_BYTE *ptr = NULL; in aes_wrap_get_data() [all …]
|
H A D | utility.c | 594 CK_RV compute_next_token_obj_name(CK_BYTE *current, CK_BYTE *next) in compute_next_token_obj_name() 658 attr->pValue = (CK_BYTE *) attr + sizeof(CK_ATTRIBUTE); in build_attribute() 697 CK_RV add_pkcs_padding(CK_BYTE *ptr, in add_pkcs_padding() 702 CK_BYTE pad_value; in add_pkcs_padding() 705 pad_value = (CK_BYTE) pad_len; in add_pkcs_padding() 721 CK_BYTE pad_value; in strip_pkcs_padding() 737 CK_BYTE parity_adjust(CK_BYTE b) in parity_adjust() 747 CK_RV parity_is_odd(CK_BYTE b) in parity_is_odd() 867 CK_BYTE *hash, CK_ULONG mech) in compute_sha() 893 CK_BYTE *hash) in compute_sha1() [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/services/crypto/component/ |
H A D | nsSyncJPAKE.cpp | 156 CK_BYTE pBuf[(NUM_ELEM(p) - 1) / 2]; in Round1() 157 CK_BYTE qBuf[(NUM_ELEM(q) - 1) / 2]; in Round1() 158 CK_BYTE gBuf[(NUM_ELEM(g) - 1) / 2]; in Round1() 173 CK_BYTE gx1Buf[NUM_ELEM(p) / 2]; in Round1() 174 CK_BYTE gv1Buf[NUM_ELEM(p) / 2]; in Round1() 175 CK_BYTE r1Buf [NUM_ELEM(p) / 2]; in Round1() 176 CK_BYTE gx2Buf[NUM_ELEM(p) / 2]; in Round1() 177 CK_BYTE gv2Buf[NUM_ELEM(p) / 2]; in Round1() 178 CK_BYTE r2Buf [NUM_ELEM(p) / 2]; in Round1() 252 rp.pSharedKey = (CK_BYTE *) aPIN.Data(); in Round2() [all …]
|
/dports/dns/bind911/bind-9.11.37/bin/tests/pkcs11/benchmarks/ |
H A D | privrsa.c | 89 CK_BYTE modulus[] = { 108 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 109 CK_BYTE privexp[] = { 128 CK_BYTE prime1[] = { 139 CK_BYTE prime2[] = { 150 CK_BYTE exp_1[] = { 160 CK_BYTE exp_2[] = { 171 CK_BYTE coeff[] = {
|
/dports/dns/bind916/bind-9.16.27/bin/tests/pkcs11/benchmarks/ |
H A D | privrsa.c | 85 CK_BYTE modulus[] = { 98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 99 CK_BYTE privexp[] = { 112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/pkcs11/benchmarks/ |
H A D | privrsa.c | 83 CK_BYTE modulus[] = { 96 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 97 CK_BYTE privexp[] = { 110 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 117 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 124 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 131 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 138 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/pkcs11/benchmarks/ |
H A D | privrsa.c | 85 CK_BYTE modulus[] = { 98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 }; 99 CK_BYTE privexp[] = { 112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74, 119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb, 126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b, 133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde, 140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/sbin/pkcscca/ |
H A D | pkcscca.c | 48 static struct algo aes = {(CK_BYTE *)"RTCMK AES ", (CK_BYTE *)"AES", 2 }; 49 static struct algo des = {(CK_BYTE *)"RTCMK ", (CK_BYTE *)"DES", 1 }; 50 static struct algo hmac = {(CK_BYTE *)"RTCMK HMAC ", (CK_BYTE *)"HMAC", 2 }; 51 static struct algo ecc = {(CK_BYTE *)"RTCMK ECC ", (CK_BYTE *)"ECC", 2 }; 52 static struct algo rsa = {(CK_BYTE *)"RTCMK ", (CK_BYTE *)"RSA", 1 }; 278 CK_BYTE *ptr = NULL; in template_unflatten_withSize() 426 CK_BYTE *ptr = NULL; in template_flatten() 701 CK_BYTE *buf = NULL; in object_flatten() 753 CK_BYTE pad_value; in add_pkcs_padding() 778 CK_BYTE *zero = NULL; in adjust_secret_key_attributes() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/icsf_stdll/ |
H A D | icsf_specific.h | 96 CK_RV icsftok_sign(SESSION * session, CK_BYTE * in_data, CK_ULONG in_data_len, 97 CK_BYTE * signature, CK_ULONG * sig_len); 99 CK_RV icsftok_sign_update(SESSION * session, CK_BYTE * in_data, 102 CK_RV icsftok_sign_final(SESSION * session, CK_BYTE * signature, 108 CK_RV icsftok_verify(SESSION * session, CK_BYTE * in_data, CK_ULONG in_data_len, 109 CK_BYTE * signature, CK_ULONG sig_len); 111 CK_RV icsftok_verify_update(SESSION * session, CK_BYTE * in_data, 114 CK_RV icsftok_verify_final(SESSION * session, CK_BYTE * signature,
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/pkcs11/ |
H A D | sess_mgmt.c | 458 CK_BYTE crypt1[1024]; in do_OperationState1() 459 CK_BYTE crypt2[1024]; in do_OperationState1() 460 CK_BYTE trash1[8]; in do_OperationState1() 461 CK_BYTE trash2[8]; in do_OperationState1() 673 CK_BYTE digest1[16]; in do_OperationState2() 674 CK_BYTE digest2[16]; in do_OperationState2() 675 CK_BYTE digest3[16]; in do_OperationState2() 920 CK_BYTE digest1[16]; in do_OperationState3() 921 CK_BYTE digest2[16]; in do_OperationState3() 922 CK_BYTE digest3[16]; in do_OperationState3() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/cca_stdll/ |
H A D | cca_specific.c | 547 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_des_cbc() 554 CK_BYTE *local_out = out_data; in token_specific_des_cbc() 665 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_tdes_cbc() 679 CK_RV cca_inttok_privkey_get_n(CK_BYTE * tok, CK_ULONG * n_len, CK_BYTE * n) in cca_inttok_privkey_get_n() 702 CK_RV cca_inttok_pubkey_get_e(CK_BYTE * tok, CK_ULONG * e_len, CK_BYTE * e) in cca_inttok_pubkey_get_e() 774 CK_BYTE n[CCATOK_MAX_N_LEN]; 1276 CK_BYTE *local_out = out_data; in token_specific_aes_ecb() 1366 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_aes_cbc() 1374 CK_BYTE *local_out = out_data; in token_specific_aes_cbc() 2357 CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, in ccatok_hmac() [all …]
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/ |
H A D | pkcs-11v2-20a3.h | 87 CK_BYTE cb[16]; 95 CK_BYTE cb[16]; 102 CK_BYTE iv[16]; 111 CK_BYTE iv[16];
|
/dports/security/yubico-piv-tool/yubico-piv-tool-2.2.0/ykcs11/tests/ |
H A D | ykcs11_tests.c | 331 CK_BYTE i; in test_max_multiple_sessions() 390 CK_BYTE data[32] = {0}; in test_login_order() 391 CK_BYTE sig[128] = {0}; in test_login_order() 392 CK_BYTE i; in test_login_order() 558 CK_BYTE i; in test_find_objects() 571 CK_BYTE ckaid = 0; in test_find_objects() 572 CK_BYTE n_privkey_obj = 0; in test_find_objects() 573 CK_BYTE n_pubkey_obj = 0; in test_find_objects() 574 CK_BYTE n_cert_obj = 0; in test_find_objects() 575 CK_BYTE n_data_obj = 0; in test_find_objects() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/misc_tests/ |
H A D | speed.c | 85 CK_BYTE data1[100]; in do_RSA_PKCS_EncryptDecrypt() 86 CK_BYTE data2[512]; in do_RSA_PKCS_EncryptDecrypt() 87 CK_BYTE encdata[512]; in do_RSA_PKCS_EncryptDecrypt() 340 CK_BYTE signature[512]; in do_RSA_PKCS_SignVerify() 341 CK_BYTE data1[100]; in do_RSA_PKCS_SignVerify() 494 CK_BYTE cipher[BIG_REQUEST]; in do_DES3_EncrDecr() 495 CK_BYTE clear[BIG_REQUEST]; in do_DES3_EncrDecr() 668 CK_BYTE clear[BIG_REQUEST]; in do_AES_EncrDecr() 672 CK_BYTE init_v[16] = { in do_AES_EncrDecr() 831 CK_BYTE data[BIG_REQUEST]; in do_SHA() [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/tpm_stdll/ |
H A D | tpm_specific.c | 109 CK_BYTE master_key_private[MK_SIZE]; 133 CK_BYTE current_so_pin_sha[SHA1_HASH_SIZE]; 642 CK_BYTE *blob = NULL; in token_load_key() 1628 CK_BYTE encrypted_masterkey[256]; in load_masterkey_private() 1727 CK_BYTE hash_sha[SHA1_HASH_SIZE]; in token_specific_login() 2270 CK_BYTE hash_sha[SHA1_HASH_SIZE]; in token_specific_init_token() 2458 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_des_cbc() 2512 CK_BYTE key_value[3 * DES_KEY_SIZE]; in token_specific_tdes_ecb() 2590 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_tdes_cbc() 2774 CK_BYTE *ret; in rsa_convert_public_key() [all …]
|