Home
last modified time | relevance | path

Searched refs:CK_BYTE (Results 51 – 75 of 563) sorted by relevance

12345678910>>...23

/dports/dns/bind916/bind-9.16.27/bin/pkcs11/
H A Dpkcs11-keygen.c78 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1;
79 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519;
80 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448;
193 CK_BYTE exponent[5]; in main()
201 CK_BYTE idbuf[4]; in main()
379 idbuf[0] = (CK_BYTE)(id >> 8); in main()
380 idbuf[1] = (CK_BYTE)id; in main()
382 idbuf[0] = (CK_BYTE)(id >> 24); in main()
383 idbuf[1] = (CK_BYTE)(id >> 16); in main()
384 idbuf[2] = (CK_BYTE)(id >> 8); in main()
[all …]
/dports/dns/samba-nsupdate/bind-9.16.5/bin/pkcs11/
H A Dpkcs11-keygen.c80 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1;
81 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519;
82 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448;
195 CK_BYTE exponent[5]; in main()
203 CK_BYTE idbuf[4]; in main()
381 idbuf[0] = (CK_BYTE)(id >> 8); in main()
382 idbuf[1] = (CK_BYTE)id; in main()
384 idbuf[0] = (CK_BYTE)(id >> 24); in main()
385 idbuf[1] = (CK_BYTE)(id >> 16); in main()
386 idbuf[2] = (CK_BYTE)(id >> 8); in main()
[all …]
/dports/dns/bind-tools/bind-9.16.27/bin/pkcs11/
H A Dpkcs11-keygen.c78 static CK_BYTE pk11_ecc_secp384r1[] = PK11_ECC_SECP384R1;
79 static CK_BYTE pk11_ecx_ed25519[] = PK11_ECX_ED25519;
80 static CK_BYTE pk11_ecx_ed448[] = PK11_ECX_ED448;
193 CK_BYTE exponent[5]; in main()
201 CK_BYTE idbuf[4]; in main()
379 idbuf[0] = (CK_BYTE)(id >> 8); in main()
380 idbuf[1] = (CK_BYTE)id; in main()
382 idbuf[0] = (CK_BYTE)(id >> 24); in main()
383 idbuf[1] = (CK_BYTE)(id >> 16); in main()
384 idbuf[2] = (CK_BYTE)(id >> 8); in main()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/ep11_stdll/
H A Dep11_specific.h58 CK_BBOOL length_only, CK_BYTE * in_data,
59 CK_ULONG in_data_len, CK_BYTE * signature,
63 CK_BYTE * in_data, CK_ULONG in_data_len);
66 CK_BBOOL length_only, CK_BYTE * signature,
80 CK_BYTE * in_data, CK_ULONG in_data_len,
81 CK_BYTE * signature, CK_ULONG sig_len);
84 CK_BYTE * in_data, CK_ULONG in_data_len);
87 CK_BYTE * signature, CK_ULONG sig_len);
125 CK_OBJECT_HANDLE key, CK_BYTE *input_data,
126 CK_ULONG input_data_len, CK_BYTE *output_data,
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/
H A Ddigest_func.c29 CK_BYTE data[MAX_DATA_SIZE]; in do_Digest()
31 CK_BYTE actual[MAX_HASH_SIZE]; in do_Digest()
33 CK_BYTE expected[MAX_HASH_SIZE]; in do_Digest()
124 CK_BYTE data[MAX_DATA_SIZE]; in do_DigestUpdate()
126 CK_BYTE actual[MAX_HASH_SIZE]; in do_DigestUpdate()
128 CK_BYTE expected[MAX_HASH_SIZE]; in do_DigestUpdate()
1118 CK_BYTE key[MAX_KEY_SIZE]; in do_SignVerify_HMAC()
1120 CK_BYTE data[MAX_DATA_SIZE]; in do_SignVerify_HMAC()
1122 CK_BYTE actual[MAX_HASH_SIZE]; in do_SignVerify_HMAC()
1259 CK_BYTE key[MAX_KEY_SIZE]; in do_SignVerify_HMAC_Update()
[all …]
H A Ddes3_func.c31 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptDES3()
146 CK_BYTE expected[BIG_REQUEST]; in do_EncryptUpdateDES3()
147 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateDES3()
148 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateDES3()
152 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_EncryptUpdateDES3()
226 CK_BYTE *data_chunk = NULL; in do_EncryptUpdateDES3()
435 CK_BYTE expected[BIG_REQUEST]; in do_DecryptUpdateDES3()
436 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateDES3()
437 CK_BYTE plaintext[BIG_REQUEST]; in do_DecryptUpdateDES3()
604 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptDES3()
[all …]
H A Ddes_func.c26 CK_BYTE expected[BIG_REQUEST]; in do_EncryptDES()
27 CK_BYTE actual[BIG_REQUEST]; in do_EncryptDES()
147 CK_BYTE expected[BIG_REQUEST]; in do_EncryptUpdateDES()
148 CK_BYTE plaintext[BIG_REQUEST]; in do_EncryptUpdateDES()
149 CK_BYTE crypt[BIG_REQUEST]; in do_EncryptUpdateDES()
316 CK_BYTE expected[BIG_REQUEST]; in do_DecryptDES()
317 CK_BYTE actual[BIG_REQUEST]; in do_DecryptDES()
438 CK_BYTE expected[BIG_REQUEST]; in do_DecryptUpdateDES()
439 CK_BYTE cipher[BIG_REQUEST]; in do_DecryptUpdateDES()
609 CK_BYTE original[BIG_REQUEST]; in do_EncryptDecryptDES()
[all …]
H A Ddh_func.c42 CK_BYTE DH_PUBL_PRIME[128] = {
61 CK_BYTE DH_PUBL_BASE[128] = {
79 CK_BYTE DH_PRIVATE_A[128] = {
97 CK_BYTE DH_PUBLIC_A[128] = {
115 CK_BYTE DH_PRIVATE_B[128] = {
133 CK_BYTE DH_PUBLIC_B[128] = {
167 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_DeriveDHKey()
172 CK_BYTE clear[32]; in do_DeriveDHKey()
173 CK_BYTE cipher[32]; in do_DeriveDHKey()
174 CK_BYTE re_cipher[32]; in do_DeriveDHKey()
[all …]
H A Drsaupdate_func.c49 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignVerifyUpdateRSA()
51 CK_BYTE signature[MAX_SIGNATURE_SIZE]; in do_SignVerifyUpdateRSA()
60 CK_BYTE user_pin[PKCS11_MAX_PIN_LEN]; in do_SignVerifyUpdateRSA()
300 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignVerifyUpdate_RSAPSS()
408 CK_BYTE *data_chunk = NULL; in do_SignVerifyUpdate_RSAPSS()
468 CK_BYTE *data_chunk = NULL; in do_SignVerifyUpdate_RSAPSS()
549 CK_BYTE actual[MAX_SIGNATURE_SIZE]; in do_VerifyUpdateRSA()
550 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_VerifyUpdateRSA()
724 CK_BYTE message[MAX_MESSAGE_SIZE]; in do_SignUpdateRSA()
725 CK_BYTE actual[MAX_SIGNATURE_SIZE]; in do_SignUpdateRSA()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/
H A Dmech_md5.c28 static CK_BYTE PADDING[64] = {
47 CK_BYTE *in_data, in md5_hash()
49 CK_BYTE *out_data, CK_ULONG *out_data_len) in md5_hash()
101 CK_BYTE length_only, in md5_hash_final()
142 CK_BYTE *in_data, in md5_hmac_sign()
148 CK_BYTE hash[MD5_HASH_SIZE]; in md5_hmac_sign()
151 CK_BYTE k_ipad[MD5_BLOCK_SIZE]; in md5_hmac_sign()
152 CK_BYTE k_opad[MD5_BLOCK_SIZE]; in md5_hmac_sign()
224 CK_BYTE *key = attr->pValue; in md5_hmac_sign()
314 CK_BYTE *in_data, in md5_hmac_verify()
[all …]
H A Dkey.c3419 CK_BYTE *ptr = NULL; in generic_secret_wrap_get_data()
3463 CK_BYTE *ptr = NULL; in generic_secret_unwrap()
3971 CK_BYTE *ptr = NULL; in des_unwrap()
4031 CK_BYTE *ptr = NULL; in des_validate_attribute()
4088 CK_BYTE *ptr = NULL; in des_wrap_get_data()
4188 CK_BYTE *ptr = NULL; in des2_validate_attribute()
4307 CK_BYTE *ptr = NULL; in des3_unwrap()
4368 CK_BYTE *ptr = NULL; in des3_validate_attribute()
4420 CK_BYTE *ptr = NULL; in des3_wrap_get_data()
5365 CK_BYTE *ptr = NULL; in aes_wrap_get_data()
[all …]
H A Dutility.c594 CK_RV compute_next_token_obj_name(CK_BYTE *current, CK_BYTE *next) in compute_next_token_obj_name()
658 attr->pValue = (CK_BYTE *) attr + sizeof(CK_ATTRIBUTE); in build_attribute()
697 CK_RV add_pkcs_padding(CK_BYTE *ptr, in add_pkcs_padding()
702 CK_BYTE pad_value; in add_pkcs_padding()
705 pad_value = (CK_BYTE) pad_len; in add_pkcs_padding()
721 CK_BYTE pad_value; in strip_pkcs_padding()
737 CK_BYTE parity_adjust(CK_BYTE b) in parity_adjust()
747 CK_RV parity_is_odd(CK_BYTE b) in parity_is_odd()
867 CK_BYTE *hash, CK_ULONG mech) in compute_sha()
893 CK_BYTE *hash) in compute_sha1()
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/services/crypto/component/
H A DnsSyncJPAKE.cpp156 CK_BYTE pBuf[(NUM_ELEM(p) - 1) / 2]; in Round1()
157 CK_BYTE qBuf[(NUM_ELEM(q) - 1) / 2]; in Round1()
158 CK_BYTE gBuf[(NUM_ELEM(g) - 1) / 2]; in Round1()
173 CK_BYTE gx1Buf[NUM_ELEM(p) / 2]; in Round1()
174 CK_BYTE gv1Buf[NUM_ELEM(p) / 2]; in Round1()
175 CK_BYTE r1Buf [NUM_ELEM(p) / 2]; in Round1()
176 CK_BYTE gx2Buf[NUM_ELEM(p) / 2]; in Round1()
177 CK_BYTE gv2Buf[NUM_ELEM(p) / 2]; in Round1()
178 CK_BYTE r2Buf [NUM_ELEM(p) / 2]; in Round1()
252 rp.pSharedKey = (CK_BYTE *) aPIN.Data(); in Round2()
[all …]
/dports/dns/bind911/bind-9.11.37/bin/tests/pkcs11/benchmarks/
H A Dprivrsa.c89 CK_BYTE modulus[] = {
108 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
109 CK_BYTE privexp[] = {
128 CK_BYTE prime1[] = {
139 CK_BYTE prime2[] = {
150 CK_BYTE exp_1[] = {
160 CK_BYTE exp_2[] = {
171 CK_BYTE coeff[] = {
/dports/dns/bind916/bind-9.16.27/bin/tests/pkcs11/benchmarks/
H A Dprivrsa.c85 CK_BYTE modulus[] = {
98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
99 CK_BYTE privexp[] = {
112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/pkcs11/benchmarks/
H A Dprivrsa.c83 CK_BYTE modulus[] = {
96 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
97 CK_BYTE privexp[] = {
110 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
117 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
124 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
131 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
138 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
/dports/dns/bind-tools/bind-9.16.27/bin/tests/pkcs11/benchmarks/
H A Dprivrsa.c85 CK_BYTE modulus[] = {
98 CK_BYTE pubexp[] = { 0x01, 0x00, 0x01 };
99 CK_BYTE privexp[] = {
112 CK_BYTE prime1[] = { 0x00, 0xe8, 0x98, 0xeb, 0xa1, 0xf0, 0xce, 0xde, 0xc2, 0x74,
119 CK_BYTE prime2[] = { 0x00, 0xca, 0x15, 0x6a, 0x43, 0x5e, 0x83, 0xc9, 0x09, 0xeb,
126 CK_BYTE exp_1[] = { 0x66, 0x2d, 0xb7, 0x65, 0xbe, 0x99, 0xc2, 0x35, 0xfe, 0x2b,
133 CK_BYTE exp_2[] = { 0x00, 0x87, 0x22, 0x74, 0xf1, 0xe2, 0x15, 0x3c, 0x6d, 0xde,
140 CK_BYTE coeff[] = { 0x00, 0xd0, 0x1f, 0xb3, 0x47, 0x40, 0x93, 0x8b, 0x99, 0xd7,
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/sbin/pkcscca/
H A Dpkcscca.c48 static struct algo aes = {(CK_BYTE *)"RTCMK AES ", (CK_BYTE *)"AES", 2 };
49 static struct algo des = {(CK_BYTE *)"RTCMK ", (CK_BYTE *)"DES", 1 };
50 static struct algo hmac = {(CK_BYTE *)"RTCMK HMAC ", (CK_BYTE *)"HMAC", 2 };
51 static struct algo ecc = {(CK_BYTE *)"RTCMK ECC ", (CK_BYTE *)"ECC", 2 };
52 static struct algo rsa = {(CK_BYTE *)"RTCMK ", (CK_BYTE *)"RSA", 1 };
278 CK_BYTE *ptr = NULL; in template_unflatten_withSize()
426 CK_BYTE *ptr = NULL; in template_flatten()
701 CK_BYTE *buf = NULL; in object_flatten()
753 CK_BYTE pad_value; in add_pkcs_padding()
778 CK_BYTE *zero = NULL; in adjust_secret_key_attributes()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/icsf_stdll/
H A Dicsf_specific.h96 CK_RV icsftok_sign(SESSION * session, CK_BYTE * in_data, CK_ULONG in_data_len,
97 CK_BYTE * signature, CK_ULONG * sig_len);
99 CK_RV icsftok_sign_update(SESSION * session, CK_BYTE * in_data,
102 CK_RV icsftok_sign_final(SESSION * session, CK_BYTE * signature,
108 CK_RV icsftok_verify(SESSION * session, CK_BYTE * in_data, CK_ULONG in_data_len,
109 CK_BYTE * signature, CK_ULONG sig_len);
111 CK_RV icsftok_verify_update(SESSION * session, CK_BYTE * in_data,
114 CK_RV icsftok_verify_final(SESSION * session, CK_BYTE * signature,
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/pkcs11/
H A Dsess_mgmt.c458 CK_BYTE crypt1[1024]; in do_OperationState1()
459 CK_BYTE crypt2[1024]; in do_OperationState1()
460 CK_BYTE trash1[8]; in do_OperationState1()
461 CK_BYTE trash2[8]; in do_OperationState1()
673 CK_BYTE digest1[16]; in do_OperationState2()
674 CK_BYTE digest2[16]; in do_OperationState2()
675 CK_BYTE digest3[16]; in do_OperationState2()
920 CK_BYTE digest1[16]; in do_OperationState3()
921 CK_BYTE digest2[16]; in do_OperationState3()
922 CK_BYTE digest3[16]; in do_OperationState3()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/cca_stdll/
H A Dcca_specific.c547 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_des_cbc()
554 CK_BYTE *local_out = out_data; in token_specific_des_cbc()
665 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_tdes_cbc()
679 CK_RV cca_inttok_privkey_get_n(CK_BYTE * tok, CK_ULONG * n_len, CK_BYTE * n) in cca_inttok_privkey_get_n()
702 CK_RV cca_inttok_pubkey_get_e(CK_BYTE * tok, CK_ULONG * e_len, CK_BYTE * e) in cca_inttok_pubkey_get_e()
774 CK_BYTE n[CCATOK_MAX_N_LEN];
1276 CK_BYTE *local_out = out_data; in token_specific_aes_ecb()
1366 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_aes_cbc()
1374 CK_BYTE *local_out = out_data; in token_specific_aes_cbc()
2357 CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, in ccatok_hmac()
[all …]
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/
H A Dpkcs-11v2-20a3.h87 CK_BYTE cb[16];
95 CK_BYTE cb[16];
102 CK_BYTE iv[16];
111 CK_BYTE iv[16];
/dports/security/yubico-piv-tool/yubico-piv-tool-2.2.0/ykcs11/tests/
H A Dykcs11_tests.c331 CK_BYTE i; in test_max_multiple_sessions()
390 CK_BYTE data[32] = {0}; in test_login_order()
391 CK_BYTE sig[128] = {0}; in test_login_order()
392 CK_BYTE i; in test_login_order()
558 CK_BYTE i; in test_find_objects()
571 CK_BYTE ckaid = 0; in test_find_objects()
572 CK_BYTE n_privkey_obj = 0; in test_find_objects()
573 CK_BYTE n_pubkey_obj = 0; in test_find_objects()
574 CK_BYTE n_cert_obj = 0; in test_find_objects()
575 CK_BYTE n_data_obj = 0; in test_find_objects()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/misc_tests/
H A Dspeed.c85 CK_BYTE data1[100]; in do_RSA_PKCS_EncryptDecrypt()
86 CK_BYTE data2[512]; in do_RSA_PKCS_EncryptDecrypt()
87 CK_BYTE encdata[512]; in do_RSA_PKCS_EncryptDecrypt()
340 CK_BYTE signature[512]; in do_RSA_PKCS_SignVerify()
341 CK_BYTE data1[100]; in do_RSA_PKCS_SignVerify()
494 CK_BYTE cipher[BIG_REQUEST]; in do_DES3_EncrDecr()
495 CK_BYTE clear[BIG_REQUEST]; in do_DES3_EncrDecr()
668 CK_BYTE clear[BIG_REQUEST]; in do_AES_EncrDecr()
672 CK_BYTE init_v[16] = { in do_AES_EncrDecr()
831 CK_BYTE data[BIG_REQUEST]; in do_SHA()
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/tpm_stdll/
H A Dtpm_specific.c109 CK_BYTE master_key_private[MK_SIZE];
133 CK_BYTE current_so_pin_sha[SHA1_HASH_SIZE];
642 CK_BYTE *blob = NULL; in token_load_key()
1628 CK_BYTE encrypted_masterkey[256]; in load_masterkey_private()
1727 CK_BYTE hash_sha[SHA1_HASH_SIZE]; in token_specific_login()
2270 CK_BYTE hash_sha[SHA1_HASH_SIZE]; in token_specific_init_token()
2458 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_des_cbc()
2512 CK_BYTE key_value[3 * DES_KEY_SIZE]; in token_specific_tdes_ecb()
2590 OBJECT * key, CK_BYTE * init_v, CK_BYTE encrypt) in token_specific_tdes_cbc()
2774 CK_BYTE *ret; in rsa_convert_public_key()
[all …]

12345678910>>...23