/titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | template.c | 315 pTemplate[i].ulValueLen); in template_add_attributes() 320 attr->ulValueLen = pTemplate[i].ulValueLen; in template_add_attributes() 322 if (attr->ulValueLen != 0) { in template_add_attributes() 325 attr->ulValueLen); in template_add_attributes() 573 if (attr1->ulValueLen != attr2->ulValueLen) in template_compare() 575 if (memcmp(attr1->pValue, attr2->pValue, attr1->ulValueLen) in template_compare() 607 len = sizeof (CK_ATTRIBUTE) + attr->ulValueLen; in template_copy() 652 attr->ulValueLen); in template_flatten() 653 ptr += sizeof (CK_ATTRIBUTE) + attr->ulValueLen; in template_flatten() 667 attr->ulValueLen != 0) { in template_flatten() [all …]
|
H A D | key.c | 344 id_attr->ulValueLen = 0; in key_object_set_default_attributes() 348 sdate_attr->ulValueLen = 0; in key_object_set_default_attributes() 352 edate_attr->ulValueLen = 0; in key_object_set_default_attributes() 356 derive_attr->ulValueLen = sizeof (CK_BBOOL); in key_object_set_default_attributes() 362 local_attr->ulValueLen = sizeof (CK_BBOOL); in key_object_set_default_attributes() 452 class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS); in publ_key_set_default_attributes() 458 subject_attr->ulValueLen = 0; // empty string in publ_key_set_default_attributes() 462 encrypt_attr->ulValueLen = sizeof (CK_BBOOL); in publ_key_set_default_attributes() 468 verify_attr->ulValueLen = sizeof (CK_BBOOL); in publ_key_set_default_attributes() 474 verify_recover_attr->ulValueLen = sizeof (CK_BBOOL); in publ_key_set_default_attributes() [all …]
|
H A D | asn1.c | 908 modulus->ulValueLen); in ber_encode_RSAPrivateKey() 911 publ_exp->ulValueLen); in ber_encode_RSAPrivateKey() 914 priv_exp->ulValueLen); in ber_encode_RSAPrivateKey() 917 prime1->ulValueLen); in ber_encode_RSAPrivateKey() 920 prime2->ulValueLen); in ber_encode_RSAPrivateKey() 923 exponent1->ulValueLen); in ber_encode_RSAPrivateKey() 926 exponent2->ulValueLen); in ber_encode_RSAPrivateKey() 929 coeff->ulValueLen); in ber_encode_RSAPrivateKey() 964 (CK_BYTE *)modulus + sizeof (CK_ATTRIBUTE), modulus->ulValueLen); in ber_encode_RSAPrivateKey() 973 (CK_BYTE *)publ_exp + sizeof (CK_ATTRIBUTE), publ_exp->ulValueLen); in ber_encode_RSAPrivateKey() [all …]
|
H A D | object.c | 680 pTemplate[i].ulValueLen = (CK_ULONG) - 1; in object_get_attribute_values() 688 pTemplate[i].ulValueLen = (CK_ULONG) - 1; in object_get_attribute_values() 693 pTemplate[i].ulValueLen = attr->ulValueLen; in object_get_attribute_values() 694 } else if (pTemplate[i].ulValueLen >= attr->ulValueLen) { in object_get_attribute_values() 696 attr->ulValueLen); in object_get_attribute_values() 697 pTemplate[i].ulValueLen = attr->ulValueLen; in object_get_attribute_values() 700 pTemplate[i].ulValueLen = (CK_ULONG) - 1; in object_get_attribute_values()
|
H A D | data_obj.c | 334 app_attr->ulValueLen = 0; // empty string in data_object_set_default_attributes() 338 value_attr->ulValueLen = 0; // empty byte array in data_object_set_default_attributes() 342 class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS); in data_object_set_default_attributes()
|
H A D | hwf_obj.c | 412 value_attr->ulValueLen = 0; in clock_set_default_attributes() 441 value_attr->ulValueLen = 0; in counter_set_default_attributes() 445 hasreset_attr->ulValueLen = sizeof (CK_BBOOL); in counter_set_default_attributes() 452 resetoninit_attr->ulValueLen = sizeof (CK_BBOOL); in counter_set_default_attributes()
|
H A D | cert.c | 397 id_attr->ulValueLen = 0; in cert_x509_set_default_attributes() 401 issuer_attr->ulValueLen = 0; in cert_x509_set_default_attributes() 405 serial_attr->ulValueLen = 0; in cert_x509_set_default_attributes()
|
H A D | utility.c | 510 attr->ulValueLen = data_len; in build_attribute() 569 for (i = 0; i < attr->ulValueLen; i++) { in remove_leading_zeros() 574 new_len = attr->ulValueLen - i; in remove_leading_zeros() 577 attr->ulValueLen = new_len; in remove_leading_zeros()
|
H A D | mech_rsa.c | 198 modulus_bytes = attr->ulValueLen; in rsa_pkcs_encrypt() 241 modulus_bytes = attr->ulValueLen; in rsa_pkcs_decrypt() 288 modulus_bytes = attr->ulValueLen; in rsa_pkcs_sign() 329 modulus_bytes = attr->ulValueLen; in rsa_pkcs_verify() 371 modulus_bytes = attr->ulValueLen; in rsa_pkcs_verify_recover()
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelAttributeUtil.c | 367 attrp->attr.ulValueLen = template->ulValueLen; in kernel_add_extra_attr() 370 (template->ulValueLen > 0)) { in kernel_add_extra_attr() 372 attrp->attr.pValue = malloc(template->ulValueLen); in kernel_add_extra_attr() 379 template->ulValueLen); in kernel_add_extra_attr() 415 attrp->attr.ulValueLen = old_attrp->attr.ulValueLen; in kernel_copy_extra_attr() 418 (old_attrp->attr.ulValueLen > 0)) { in kernel_copy_extra_attr() 419 attrp->attr.pValue = malloc(old_attrp->attr.ulValueLen); in kernel_copy_extra_attr() 426 old_attrp->attr.ulValueLen); in kernel_copy_extra_attr() 472 template->ulValueLen = 0; in get_extra_attr_from_object() 480 template->ulValueLen = extra_attr->attr.ulValueLen; in get_extra_attr_from_object() [all …]
|
H A D | kernelKeys.c | 93 t[j].ulValueLen = t[i].ulValueLen; in remove_one_attribute() 102 t[j].ulValueLen = 0; in remove_one_attribute() 197 *key_len = tmp.ulValueLen; in get_key_len_from_template() 283 newTemplate[ulCount].ulValueLen = key_len; in key_gen_by_value() 594 pubTemplate[n].ulValueLen = sizeof (pub_class); in key_gen_rsa_by_value() 601 pubTemplate[n].ulValueLen = sizeof (key_type); in key_gen_rsa_by_value() 607 pubTemplate[n].ulValueLen = modulus_bytes; in key_gen_rsa_by_value() 613 pubTemplate[n].ulValueLen = modulus_bytes; in key_gen_rsa_by_value() 676 priTemplate[n].ulValueLen = sizeof (pri_class); in key_gen_rsa_by_value() 683 priTemplate[n].ulValueLen = sizeof (key_type); in key_gen_rsa_by_value() [all …]
|
H A D | kernelUtil.c | 665 tmp.pValue = malloc(tmp.ulValueLen); in get_ec_private_key() 679 cur_attr->oa_value_len = tmp.ulValueLen; in get_ec_private_key() 737 tmp.pValue = malloc(tmp.ulValueLen); in get_ec_public_key() 751 cur_attr->oa_value_len = tmp.ulValueLen; in get_ec_public_key() 810 (pTemplate[i].ulValueLen < value_len)) { in process_object_attributes() 817 value_len = pTemplate[i].ulValueLen; in process_object_attributes() 825 (pTemplate[i].ulValueLen > 0)) { in process_object_attributes() 826 ptr = malloc(pTemplate[i].ulValueLen); in process_object_attributes() 833 pTemplate[i].ulValueLen); in process_object_attributes() 895 pTemplate[i].ulValueLen = cur_attr->oa_value_len; in get_object_attributes() [all …]
|
/titanic_44/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaAttrManager.c | 57 attr.ulValueLen = sizeof (class); in get_master_attributes_by_object() 65 attr.ulValueLen = sizeof (subtype); in get_master_attributes_by_object() 409 switch (attr->attribute.ulValueLen) { in get_master_attributes_by_type() 466 malloc(src->attribute.ulValueLen); in get_master_attributes_by_duplication() 473 dst->attribute.ulValueLen = 0; in get_master_attributes_by_duplication() 486 dst->attribute.ulValueLen = 0; in get_master_attributes_by_duplication() 493 src->attribute.ulValueLen); in get_master_attributes_by_duplication() 528 bzero(attr->attribute.pValue, attr->attribute.ulValueLen); in dealloc_attributes() 562 if (attr->attribute.ulValueLen >= new_attr->ulValueLen) { in attribute_set_value() 566 bzero((char *)attr->attribute.pValue + new_attr->ulValueLen, in attribute_set_value() [all …]
|
H A D | pkcs11SUNWExtensions.c | 319 template[i].ulValueLen = sizeof (objclass); in SUNW_C_KeyToObject() 330 template[i].ulValueLen = sizeof (keytype); in SUNW_C_KeyToObject() 343 template[i].ulValueLen = sizeof (falsevalue); in SUNW_C_KeyToObject() 355 template[i].ulValueLen = sizeof (falsevalue); in SUNW_C_KeyToObject() 361 template[i].ulValueLen = (CK_ULONG)rawkey_len; in SUNW_C_KeyToObject() 455 template[i].ulValueLen = sizeof (objclass); in pkcs11_PasswdToPBKD2Object() 461 template[i].ulValueLen = sizeof (key_type); in pkcs11_PasswdToPBKD2Object() 467 template[i].ulValueLen = sizeof (falsevalue); in pkcs11_PasswdToPBKD2Object() 474 template[i].ulValueLen = sizeof (key_len); in pkcs11_PasswdToPBKD2Object() 488 template[i].ulValueLen = sizeof (falsevalue); in pkcs11_PasswdToPBKD2Object() [all …]
|
H A D | metaObjectManager.c | 291 attrs[0].ulValueLen = sizeof (class); in meta_object_get_attr() 296 attrs[1].ulValueLen = sizeof (is_token); in meta_object_get_attr() 307 attrs[count].ulValueLen = sizeof (is_private); in meta_object_get_attr() 325 attrs[0].ulValueLen = sizeof (is_extractable); in meta_object_get_attr() 337 attrs[1].ulValueLen = sizeof (is_sensitive); in meta_object_get_attr() 347 attrs[2].ulValueLen = sizeof (keytype); in meta_object_get_attr() 358 attrs[count].ulValueLen = sizeof (keytype); in meta_object_get_attr() 809 if (!(((CK_LONG)(attrs[i].ulValueLen)) > 0)) { in meta_object_copyin() 817 attrs_with_val[num_attrs_with_val].ulValueLen = in meta_object_copyin() 818 attrs[i].ulValueLen; in meta_object_copyin() [all …]
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softAttributeUtil.c | 460 attrp->attr.ulValueLen = template->ulValueLen; in soft_add_extra_attr() 463 (template->ulValueLen > 0)) { in soft_add_extra_attr() 465 attrp->attr.pValue = malloc(template->ulValueLen); in soft_add_extra_attr() 472 template->ulValueLen); in soft_add_extra_attr() 549 attrp->attr.ulValueLen = old_attrp->attr.ulValueLen; in soft_copy_extra_attr() 552 (old_attrp->attr.ulValueLen > 0)) { in soft_copy_extra_attr() 553 attrp->attr.pValue = malloc(old_attrp->attr.ulValueLen); in soft_copy_extra_attr() 560 old_attrp->attr.ulValueLen); in soft_copy_extra_attr() 606 template->ulValueLen = 0; in get_extra_attr_from_object() 614 template->ulValueLen = extra_attr->attr.ulValueLen; in get_extra_attr_from_object() [all …]
|
H A D | softSSL.c | 537 new_tmpl[0].ulValueLen = sizeof (class); in soft_ssl_master_key_derive() 540 new_tmpl[1].ulValueLen = sizeof (keyType); in soft_ssl_master_key_derive() 543 new_tmpl[2].ulValueLen = sizeof (true); in soft_ssl_master_key_derive() 546 new_tmpl[3].ulValueLen = 48; in soft_ssl_master_key_derive() 775 obj_tmpl[0].ulValueLen = sizeof (class); in soft_ssl_key_and_mac_derive() 778 obj_tmpl[1].ulValueLen = sizeof (keyType); in soft_ssl_key_and_mac_derive() 781 obj_tmpl[2].ulValueLen = sizeof (true); in soft_ssl_key_and_mac_derive() 784 obj_tmpl[3].ulValueLen = sizeof (true); in soft_ssl_key_and_mac_derive() 787 obj_tmpl[4].ulValueLen = sizeof (true); in soft_ssl_key_and_mac_derive() 790 obj_tmpl[5].ulValueLen = mac_key_bytes; in soft_ssl_key_and_mac_derive() [all …]
|
H A D | softEC.c | 168 template.ulValueLen = sizeof (param_buffer); in soft_ec_genkey_pair() 173 paramlen = template.ulValueLen; in soft_ec_genkey_pair() 236 template.ulValueLen = value_len; in soft_ec_key_derive() 241 value_len = template.ulValueLen; in soft_ec_key_derive() 247 template.ulValueLen = params_len; in soft_ec_key_derive() 252 params_len = template.ulValueLen; in soft_ec_key_derive() 376 template.ulValueLen = sizeof (params); in soft_ecc_sign_verify_init_common() 385 params[1] != template.ulValueLen - 2) { in soft_ecc_sign_verify_init_common() 390 params_item.len = template.ulValueLen; in soft_ecc_sign_verify_init_common() 562 template.ulValueLen = sizeof (point); in soft_ecc_verify() [all …]
|
H A D | softKeystore.c | 363 len_attrs += ROUNDUP(extra_attr->attr.ulValueLen, 8); in soft_keystore_pack_obj() 379 attr_hdr.ulValueLen = in soft_keystore_pack_obj() 380 SWAP64((uint64_t)extra_attr->attr.ulValueLen); in soft_keystore_pack_obj() 384 extra_attr->attr.ulValueLen); in soft_keystore_pack_obj() 385 buf1 = buf1 + ROUNDUP(extra_attr->attr.ulValueLen, 8); in soft_keystore_pack_obj() 465 template.ulValueLen = (CK_ULONG)(SWAP64(attr_hdr->ulValueLen)); in soft_keystore_unpack_obj() 468 if (template.ulValueLen > 0) { in soft_keystore_unpack_obj() 469 template.pValue = malloc(template.ulValueLen); in soft_keystore_unpack_obj() 474 template.ulValueLen); in soft_keystore_unpack_obj() 486 buf = buf + ROUNDUP(template.ulValueLen, 8); in soft_keystore_unpack_obj() [all …]
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | encrypt.c | 140 template[0].ulValueLen = sizeof (class); in init_key_uef() 143 template[1].ulValueLen = sizeof (keyType); in init_key_uef() 146 template[2].ulValueLen = sizeof (false); in init_key_uef() 149 template[3].ulValueLen = sizeof (true); in init_key_uef() 152 template[4].ulValueLen = sizeof (true); in init_key_uef() 155 template[5].ulValueLen = key->length; in init_key_uef()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 72 tmpl[attrs].ulValueLen = sizeof (class); in krb5int_pbkdf2_hmac_sha1() 81 tmpl[attrs].ulValueLen = sizeof (keytype); in krb5int_pbkdf2_hmac_sha1() 98 tmpl[attrs].ulValueLen = sizeof (outlen); in krb5int_pbkdf2_hmac_sha1() 123 tmpl[0].ulValueLen = out->length; in krb5int_pbkdf2_hmac_sha1()
|
/titanic_44/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 304 pTmpl[i].ulValueLen = sizeof (CK_BBOOL); in get_token_key() 309 pTmpl[i].ulValueLen = sizeof (class); in get_token_key() 314 pTmpl[i].ulValueLen = strlen(keylabel); in get_token_key() 319 pTmpl[i].ulValueLen = sizeof (ckKeyType); in get_token_key() 324 pTmpl[i].ulValueLen = sizeof (true); in get_token_key() 624 template[nattr].ulValueLen = sizeof (class); in execute_cmd() 629 template[nattr].ulValueLen = sizeof (tmpl_keytype); in execute_cmd() 634 template[nattr].ulValueLen = sizeof (true); in execute_cmd() 639 template[nattr].ulValueLen = sizeof (false); in execute_cmd() 644 template[nattr].ulValueLen = keylen; in execute_cmd()
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 45 t[n].ulValueLen = (CK_ULONG)size; 272 subject_len = templ[0].ulValueLen; in PK11Cert2KMFCert() 273 issuer_len = templ[1].ulValueLen; in PK11Cert2KMFCert() 274 serno_len = templ[2].ulValueLen; in PK11Cert2KMFCert() 275 id_len = templ[3].ulValueLen; in PK11Cert2KMFCert() 276 value_len = templ[4].ulValueLen; in PK11Cert2KMFCert() 369 if (templ->ulValueLen > 0) { in get_attr() 370 templ->pValue = malloc(templ->ulValueLen); in get_attr() 405 certattr.ulValueLen = 0; in matchcert() 411 name.Length = certattr.ulValueLen; in matchcert() [all …]
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 42 template[0].ulValueLen = sizeof (class); in setup_arcfour_crypto() 45 template[1].ulValueLen = sizeof (keyType); in setup_arcfour_crypto() 48 template[2].ulValueLen = sizeof (false); in setup_arcfour_crypto() 51 template[3].ulValueLen = sizeof (true); in setup_arcfour_crypto() 54 template[4].ulValueLen = key->length; in setup_arcfour_crypto()
|
/titanic_44/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 362 pTmpl[i].ulValueLen = sizeof (CK_BBOOL); in get_token_key() 367 pTmpl[i].ulValueLen = sizeof (class); in get_token_key() 372 pTmpl[i].ulValueLen = strlen(keylabel); in get_token_key() 377 pTmpl[i].ulValueLen = sizeof (ckKeyType); in get_token_key() 382 pTmpl[i].ulValueLen = sizeof (true); in get_token_key() 842 template[nattr].ulValueLen = sizeof (objclass); in execute_cmd() 847 template[nattr].ulValueLen = sizeof (keytype); in execute_cmd() 852 template[nattr].ulValueLen = sizeof (truevalue); in execute_cmd() 857 template[nattr].ulValueLen = sizeof (falsevalue); in execute_cmd() 862 template[nattr].ulValueLen = keysize; in execute_cmd()
|