Searched refs:mechanism (Results 1 - 25 of 123) sorted by last modified time

12345

/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c166 switch (pMechanism->mechanism) {
214 * mechanism.
247 * mechanism.
266 switch (pMechanism->mechanism) {
333 switch (pMechanism->mechanism) {
423 switch (pMechanism->mechanism) {
628 if (pMechanism->mechanism == CKM_PBE_SHA1_RC4_128) {
631 digest_mech.mechanism = CKM_SHA_1;
840 switch (pMechanism->mechanism) {
901 digest_mech.mechanism
[all...]
H A DsoftKeystore.c371 hdr.mechanism = SWAP64((uint64_t)obj->mechanism);
464 obj->mechanism = (CK_MECHANISM_TYPE)(SWAP64(hdr->mechanism));
2049 Mechanism.mechanism = CKM_PKCS5_PBKD2;
2171 Mechanism.mechanism = CKM_PKCS5_PBKD2;
2273 mech.mechanism = CKM_AES_CBC_PAD;
2342 mech.mechanism = CKM_MD5_HMAC;
H A DsoftObject.h307 CK_MECHANISM_TYPE mechanism; member in struct:object
H A DsoftObjectUtil.c153 new_objp->mechanism = old_object->mechanism;
H A DsoftSSL.c400 * . mech_p: key derivation mechanism. the mechanism parameter carries the
449 /* Check the validity of the mechanism's parameter */
459 switch (mech->mechanism) {
534 * We put the attributes contributed by the mechanism first
586 * . mech_p: key derivation mechanism. the mechanism parameter carries the
646 /* Check the validity of the mechanism's parameter */
696 if (mech->mechanism == CKM_SSL3_KEY_AND_MAC_DERIVE) {
754 if (mech->mechanism
[all...]
H A DsoftSessionUtil.c512 switch (session_p->digest.mech.mechanism) {
548 switch (session_p->digest.mech.mechanism) {
642 mech = p_active_op->mech.mechanism;
666 (session_p->digest.mech.mechanism != mech)) {
687 session_p->digest.mech.mechanism = mech;
H A DsoftAESCrypt.c44 * Check that the mechanism parameter is present and the correct size if
54 switch (mech->mechanism) {
207 switch (mech_p->mechanism) {
306 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
310 session_p->decrypt.mech.mechanism = pMechanism->mechanism;
329 CK_MECHANISM_TYPE mech = session_p->encrypt.mech.mechanism;
639 CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism;
812 CK_MECHANISM_TYPE mech = session_p->encrypt.mech.mechanism;
[all...]
H A DsoftDigestUtil.c51 * init routine based on the mechanism.
56 * CKR_MECHANISM_INVALID: invalid mechanism type
62 switch (pMechanism->mechanism) {
74 session_p->digest.mech.mechanism = CKM_MD5;
92 session_p->digest.mech.mechanism = CKM_SHA_1;
117 session_p->digest.mech.mechanism = pMechanism->mechanism;
120 switch (pMechanism->mechanism) {
167 * software provided digest routine based on the mechanism.
171 * CKR_MECHANISM_INVALID: invalid mechanism typ
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Daes.c265 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) argument
273 switch (mechanism->cm_type) {
306 if (param_required && mechanism->cm_param != NULL &&
307 mechanism->cm_param_len != param_len) {
356 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
360 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE));
364 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
368 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE));
377 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
393 if ((rv = aes_check_mech_param(mechanism,
963 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1116 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1281 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
1341 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument
1461 aes_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1499 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1526 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
H A Dsha1_mod.c72 /* to extract the digest length passed as mechanism parameter */
75 (len) = (uint32_t)*((ulong_t *)(void *)mechanism->cm_param); \
241 sha1_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
244 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE)
719 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
726 if (mechanism->cm_type != SHA1_MECH_INFO_TYPE)
847 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
854 if (mechanism->cm_type != SHA1_HMAC_MECH_INFO_TYPE &&
855 mechanism->cm_type != SHA1_HMAC_GEN_MECH_INFO_TYPE)
893 * Get the mechanism parameter
718 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1151 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1271 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1465 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Ddprov.c1943 dprov_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
1955 /* check mechanism */
1956 if (mechanism->cm_type != MD4_MECH_INFO_TYPE &&
1957 mechanism->cm_type != MD5_MECH_INFO_TYPE &&
1958 mechanism->cm_type != SHA1_MECH_INFO_TYPE &&
1959 mechanism->cm_type != SHA256_MECH_INFO_TYPE &&
1960 mechanism->cm_type != SHA384_MECH_INFO_TYPE &&
1961 mechanism->cm_type != SHA512_MECH_INFO_TYPE &&
1962 mechanism->cm_type != SHA512_224_MECH_INFO_TYPE &&
1963 mechanism
2076 dprov_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
2141 dprov_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2243 dprov_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2277 dprov_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2362 dprov_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2468 dprov_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2503 dprov_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2610 dprov_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2677 dprov_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2780 dprov_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2814 dprov_sign_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2865 dprov_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2897 dprov_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
3000 dprov_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
3035 dprov_verify_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
3087 dprov_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
4000 dprov_key_generate(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *object, crypto_req_handle_t req) argument
4026 dprov_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *public_key_template, uint_t public_key_attribute_count, crypto_object_attribute_t *private_key_template, uint_t private_key_attribute_count, crypto_object_id_t *public_key, crypto_object_id_t *private_key, crypto_req_handle_t req) argument
4058 dprov_key_wrap(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len_ptr, crypto_req_handle_t req) argument
4085 dprov_key_unwrap(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len_ptr, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *key, crypto_req_handle_t req) argument
4113 dprov_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *key, crypto_req_handle_t req) argument
4934 dprov_nostore_key_generate(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_attribute_t *out_template, uint_t out_attribute_count, crypto_req_handle_t req) argument
4962 dprov_nostore_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *public_key_template, uint_t public_key_attribute_count, crypto_object_attribute_t *private_key_template, uint_t private_key_attribute_count, crypto_object_attribute_t *out_public_key_template, uint_t out_public_key_attribute_count, crypto_object_attribute_t *out_private_key_template, uint_t out_private_key_attribute_count, crypto_req_handle_t req) argument
4998 dprov_nostore_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_attribute_t *out_template, uint_t out_attribute_count, crypto_req_handle_t req) argument
5067 dprov_digest_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_key_t *key, crypto_data_t *digest, crypto_ctx_t *ctx, int kmflag) argument
5092 dprov_mac_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_key_t *key, crypto_data_t *mac, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
5118 dprov_sign_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
5145 dprov_verify_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
5228 dprov_cipher_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
5341 dprov_key_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *object_id_ptr, crypto_object_attribute_t *private_key_template, uint_t private_key_attribute_count, crypto_object_id_t *private_key_object_id_ptr, crypto_key_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len_ptr, crypto_object_attribute_t *out_template1, uint_t out_attribute_count1, crypto_object_attribute_t *out_template2, uint_t out_attribute_count2) argument
[all...]
H A Dsha2_mod.c69 /* to extract the digest length passed as mechanism parameter */
272 sha2_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
284 PROV_SHA2_CTX(ctx)->sc_mech_type = mechanism->cm_type;
285 SHA2Init(mechanism->cm_type, &PROV_SHA2_CTX(ctx)->sc_sha2_ctx);
795 crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
807 SHA2Init(mechanism->cm_type, &sha2_ctx);
834 if (mechanism->cm_type <= SHA256_HMAC_GEN_MECH_INFO_TYPE)
933 sha2_is_general_hmech(const crypto_mechanism_t *mechanism) argument
935 switch (mechanism->cm_type) {
948 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
794 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1190 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1332 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1552 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Darcfour.c200 rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument
206 if ((mechanism)->cm_type != RC4_MECH_INFO_TYPE)
497 crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input,
505 ret = rc4_common_init(&ctx, mechanism, key, template, req);
496 rc4_crypt_atomic(crypto_provider_handle_t handle, crypto_session_id_t session, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_export.c226 /* copy mechanism oid */
1106 * Check if 2 gss mechanism identifiers are the same.
1167 * (mechanism, service, qop) between
1179 raw_cred->mechanism)) &&
1605 /* Copyin mechanism type */
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Kstat/
H A DKstat.xs32 * mechanism for providing kernel statistics to users. The Solaris API is
36 * uses the Perl TIEHASH mechanism to implement a read-on-demand semantic, which
1370 # The following XS methods implement the TIEHASH mechanism used to update the
/illumos-gate/usr/src/test/crypto-tests/tests/common/
H A Dcryptotest_pkcs.c116 (void) fprintf(stderr, "failed to resolve mechanism name %s\n",
132 "could not find provider for mechanism %lu\n",
148 mech.mechanism = op->mech;
235 mech.mechanism = op->mech;
295 mech.mechanism = op->mech;
359 mech.mechanism = op->mech;
423 mech.mechanism = op->mech;
/illumos-gate/usr/src/lib/smbclnt/libfknsmb/common/
H A Dfksmb_sign_pkcs.c48 mech->mechanism = mid;
76 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
139 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
143 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
213 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
217 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_sign_pkcs.c47 mech->mechanism = mid;
75 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
138 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
142 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
212 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
216 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c36 * For RSA, the verify can be done using a single mechanism,
515 ckMechanism.mechanism = mechtype;
612 ckMechanism.mechanism = mechtype;
799 CK_MECHANISM mechanism; local
805 mechanism.mechanism = mechtype;
806 mechanism.pParameter = NULL;
807 mechanism.ulParameterLen = 0;
809 ckrv = C_DigestInit(hSession, &mechanism);
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2009 CK_MECHANISM mechanism; local
2061 mechanism.mechanism = mechtype;
2062 mechanism.pParameter = NULL;
2063 mechanism.ulParameterLen = 0;
2065 ckrv = C_SignInit(hSession, &mechanism, (CK_OBJECT_HANDLE)keyp->keyp);
2325 CK_MECHANISM mechanism; local
2348 /* Map the Algorithm ID to a PKCS#11 mechanism */
2352 mechanism.mechanism
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDigest.c54 * Get the kernel's internal mechanism number.
56 rv = kernel_mech(pMechanism->mechanism, &k_mech_type);
80 session_p->digest.mech.mechanism = pMechanism->mechanism;
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c100 if (pMechanism->mechanism == mech_list[i].mech_type) {
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaObjectManager.c1023 * first mechanism that's supported by the source slot
1070 * Determine the wrapping/unwrapping mechanism to be used
1072 * If possible, select a mechanism that's supported by both source
1178 * If we are here, we did not find a mechanism that's supported
1275 * which wrap mechanism and which key to use for
1333 wrappingMech.mechanism = wrap_info.mech_type;
1376 * support the wrapping mechanism, no point in trying.
1847 if (pMech->mechanism == CKM_RSA_PKCS_KEY_PAIR_GEN ||
1848 pMech->mechanism == CKM_EC_KEY_PAIR_GEN ||
1849 pMech->mechanism
[all...]
H A DmetaUtil.c91 session->init.pMech->mechanism =
92 pMechanism->mechanism;
166 * If the specified mechanism is used in this session last time,
170 if (((session->mech_support_info).mech != pMechanism->mechanism) ||
172 (session->mech_support_info).mech = pMechanism->mechanism;
474 meta_GetThreshold(CK_MECHANISM_TYPE mechanism) argument
480 if (mechanism == meta_mechs_threshold[i].mech_type)
484 /* no matching mechanism */
536 session->init.pMech->mechanism);
848 * Gets the list of slots that supports the specified mechanism
[all...]
H A Dpkcs11SUNWExtensions.c193 * mechanism.
250 /* find slot with matching mechanism */
254 /* found mechanism */
260 /* no matching mechanism found */
274 * mechanism from the rawkey data.
298 * Check to make sure mechanism type is not for asymmetric key
322 /* get the key type for this mechanism */
338 /* set the attribute type flag on object based on mechanism */
384 CK_MECHANISM mechanism; local
448 mechanism
[all...]

Completed in 131 milliseconds

12345