| /src/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/ |
| rpc_quote.c | 34 TCS_KEY_HANDLE hKey; 58 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 85 result = TCSP_Quote_Internal(hContext, hKey, antiReplay, pcrDataSizeIn, pcrDataIn,
|
| rpc_selftest.c | 60 TCS_KEY_HANDLE hKey; 74 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 89 result = TCSP_CertifySelfTest_Internal(hContext, hKey, antiReplay, pPrivAuth, &sigSize,
|
| rpc_sign.c | 34 TCS_KEY_HANDLE hKey; 55 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 80 result = TCSP_Sign_Internal(hContext, hKey, areaToSignSize, areaToSign, pAuth, &sigSize,
|
| rpc_tick.c | 72 TCS_KEY_HANDLE hKey; 88 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 101 result = TCSP_TickStampBlob_Internal(hContext, hKey, &nonce, &digest, pAuth, &sigSize, &sig,
|
| rpc_quote2.c | 35 TCS_KEY_HANDLE hKey; 63 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 93 result = TCSP_Quote2_Internal(hContext, hKey, antiReplay, pcrDataSizeIn, pcrDataIn,
|
| rpc_key.c | 34 TCS_KEY_HANDLE hKey; 45 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 50 result = key_mgr_evict(hContext, hKey); 64 TCS_KEY_HANDLE hKey; 80 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 93 result = TCSP_GetPubKey_Internal(hContext, hKey, pAuth, &pubKeySize, &pubKey); 387 TCS_KEY_HANDLE hKey; 401 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 408 result = TCSP_OwnerReadInternalPub_Internal(hContext, hKey, &ownerAuth, &pubKeySize, &pubKeyData); 431 TCS_KEY_HANDLE hKey; [all...] |
| rpc_cmk.c | 119 TCS_KEY_HANDLE hKey; 139 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 176 result = TCSP_CMK_CreateKey_Internal(hContext, hKey, keyUsageAuth, migAuthorityApproval, 296 TCS_KEY_HANDLE hKey; 320 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 446 result = TCSP_CMK_CreateBlob_Internal(hContext, hKey, migrationType, migKeyAuthSize, 504 TCS_KEY_HANDLE hKey; 526 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 599 result = TCSP_CMK_ConvertMigration_Internal(hContext, hKey, restrictTicket, sigTicket,
|
| rpc_delegate.c | 123 TCS_KEY_HANDLE hKey; 144 if (getData(TCSD_PACKET_TYPE_UINT32, 1, &hKey, 0, &data->comm)) 177 result = TCSP_Delegate_CreateKeyDelegation_Internal(hContext, hKey,
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| evp-crypt.c | 57 HCRYPTKEY *hKey; 70 bResult = CryptSetKeyParam(gk->hKey, KP_IV, ctx->iv, 0); 76 bResult = CryptEncrypt(gk->hKey, 0, TRUE, 0, out, &length, size); 78 bResult = CryptDecrypt(gk->hKey, 0, TRUE, 0, out, &length); 88 CryptDestroyKey(gk->hKey); 89 gk->hKey = NULL; 114 &gk->hKey); 118 return hKey; 130 gk->hKey = import_key(CALG_3DES,
|
| evp-wincng.c | 49 BCRYPT_KEY_HANDLE hKey; 70 status = BCryptEncrypt(cng->hKey, 81 status = BCryptDecrypt(cng->hKey, 101 if (cng->hKey) 102 BCryptDestroyKey(cng->hKey); 201 if (cng->hKey) { 202 BCryptDestroyKey(cng->hKey); /* allow reinitialization */ 203 cng->hKey = (BCRYPT_KEY_HANDLE)0; 211 &cng->hKey,
|
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_cryptor.c | 206 BCRYPT_KEY_HANDLE hKey; 214 ctx->hKey = NULL; 255 status = BCryptGenerateSymmetricKey(hAlg, &hKey, 265 ctx->hKey = hKey; 279 status = BCryptEncrypt(ctx->hKey, (PUCHAR)ctx->nonce, AES_BLOCK_SIZE, 292 BCryptDestroyKey(ctx->hKey); 293 ctx->hKey = NULL;
|
| archive_cryptor_private.h | 78 BCRYPT_KEY_HANDLE hKey;
|
| /src/crypto/external/cpl/tpm-tools/dist/lib/ |
| tpm_unseal.c | 80 TSS_HKEY hSrk, hKey; 369 tssKeyData, &hKey)) != TSS_SUCCESS) { 389 if ((rc=Tspi_Policy_AssignToObject(hPolicy, hKey)) != TSS_SUCCESS) { 394 if ((rc=Tspi_Data_Unseal(hEncdata, hKey, &symKeyLen,
|
| /src/crypto/external/cpl/tpm-tools/dist/src/cmds/ |
| tpm_sealdata.c | 94 TSS_HKEY hSrk, hKey; 238 &hKey) != TSS_SUCCESS) 250 if (policyAssign(hPolicy, hKey) != TSS_SUCCESS) 254 if (keyCreateKey(hKey, hSrk, NULL_HPCRS) != TSS_SUCCESS) 258 if (keyLoadKey(hKey, hSrk) != TSS_SUCCESS) 282 (hEncdata, hKey, EVP_CIPHER_key_length(EVP_aes_256_cbc()), 292 (hKey, TSS_TSPATTRIB_KEY_BLOB, TSS_TSPATTRIB_KEYBLOB_BLOB,
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tspi_key.c | 33 Tspi_Key_UnloadKey(TSS_HKEY hKey) /* in */ 39 if ((result = obj_rsakey_get_tsp_context(hKey, &tspContext))) 42 if ((result = obj_rsakey_get_tcs_handle(hKey, &hTcsKey))) 49 Tspi_Key_LoadKey(TSS_HKEY hKey, /* in */ 69 if ((result = obj_rsakey_get_tsp_context(hKey, &tspContext))) 75 if ((result = obj_rsakey_get_blob(hKey, &keySize, &keyBlob))) 127 return obj_rsakey_set_tcs_handle(hKey, tcsKey); 131 Tspi_Key_GetPubKey(TSS_HKEY hKey, /* in */ 148 if ((result = obj_rsakey_get_tsp_context(hKey, &tspContext))) 151 if ((result = obj_rsakey_get_policy(hKey, TSS_POLICY_USAGE [all...] |
| /src/external/bsd/openldap/dist/libraries/liblutil/ |
| ntservice.c | 63 HKEY hKey; 95 "REG_SZ", REG_OPTION_NON_VOLATILE, KEY_ALL_ACCESS, NULL, &hKey, 99 RegCloseKey(hKey); 103 if ( RegSetValueEx(hKey, "EventMessageFile", 0, REG_EXPAND_SZ, lpszBinaryPathName, strlen(lpszBinaryPathName) + 1) != ERROR_SUCCESS) 106 RegCloseKey(hKey); 111 if ( RegSetValueEx(hKey, "TypesSupported", 0, REG_DWORD, (LPBYTE) &dwValue, sizeof(DWORD)) != ERROR_SUCCESS) 114 RegCloseKey(hKey); 117 RegCloseKey(hKey); 171 HKEY key 358 HKEY hkey; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| pkcs11ecdsa_link.c | 159 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 238 (pk11_ctx->session, keyTemplate, (CK_ULONG)7, &hKey), 245 pk11_ctx->ontoken ? pk11_ctx->object : hKey), 257 if (hKey != CK_INVALID_HANDLE) { 258 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); 282 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 346 (pk11_ctx->session, keyTemplate, (CK_ULONG)7, &hKey), 349 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 359 if (hKey != CK_INVALID_HANDLE) { 360 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); [all...] |
| pkcs11eddsa_link.c | 120 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 207 (pk11_ctx->session, keyTemplate, (CK_ULONG)7, &hKey), 214 pk11_ctx->ontoken ? pk11_ctx->object : hKey), 228 if (hKey != CK_INVALID_HANDLE) { 229 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); 255 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 318 (pk11_ctx->session, keyTemplate, (CK_ULONG)7, &hKey), 321 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 333 if (hKey != CK_INVALID_HANDLE) { 334 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); [all...] |
| pkcs11rsa_link.c | 671 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 852 (pk11_ctx->session, keyTemplate, (CK_ULONG)14, &hKey), 859 pk11_ctx->ontoken ? pk11_ctx->object : hKey), 878 if (hKey != CK_INVALID_HANDLE) { 879 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); 903 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; 994 (pk11_ctx->session, keyTemplate, (CK_ULONG)7, &hKey), 997 PK11_RET(pkcs_C_VerifyInit, (pk11_ctx->session, &mech, hKey), 1006 if (hKey != CK_INVALID_HANDLE) { 1007 (void)pkcs_C_DestroyObject(pk11_ctx->session, hKey); [all...] |
| /src/external/gpl3/binutils/dist/libiberty/ |
| pex-win32.c | 165 static HKEY 166 openkey (HKEY hStart, const char *keys[]) 168 HKEY hKey, hTmp; 169 for (hKey = hStart; *keys; keys++) 172 hTmp = hKey; 173 res = RegOpenKey (hTmp, *keys, &hKey); 181 return hKey; 188 HKEY hKey, hTmp [all...] |
| /src/external/gpl3/binutils.old/dist/libiberty/ |
| pex-win32.c | 165 static HKEY 166 openkey (HKEY hStart, const char *keys[]) 168 HKEY hKey, hTmp; 169 for (hKey = hStart; *keys; keys++) 172 hTmp = hKey; 173 res = RegOpenKey (hTmp, *keys, &hKey); 181 return hKey; 188 HKEY hKey, hTmp [all...] |
| /src/external/gpl3/gcc/dist/libiberty/ |
| pex-win32.c | 165 static HKEY 166 openkey (HKEY hStart, const char *keys[]) 168 HKEY hKey, hTmp; 169 for (hKey = hStart; *keys; keys++) 172 hTmp = hKey; 173 res = RegOpenKey (hTmp, *keys, &hKey); 181 return hKey; 188 HKEY hKey, hTmp [all...] |
| /src/external/gpl3/gcc.old/dist/libiberty/ |
| pex-win32.c | 164 static HKEY 165 openkey (HKEY hStart, const char *keys[]) 167 HKEY hKey, hTmp; 168 for (hKey = hStart; *keys; keys++) 171 hTmp = hKey; 172 res = RegOpenKey (hTmp, *keys, &hKey); 180 return hKey; 187 HKEY hKey, hTmp [all...] |
| /src/external/gpl3/gdb/dist/libiberty/ |
| pex-win32.c | 165 static HKEY 166 openkey (HKEY hStart, const char *keys[]) 168 HKEY hKey, hTmp; 169 for (hKey = hStart; *keys; keys++) 172 hTmp = hKey; 173 res = RegOpenKey (hTmp, *keys, &hKey); 181 return hKey; 188 HKEY hKey, hTmp [all...] |
| /src/external/gpl3/gdb.old/dist/libiberty/ |
| pex-win32.c | 165 static HKEY 166 openkey (HKEY hStart, const char *keys[]) 168 HKEY hKey, hTmp; 169 for (hKey = hStart; *keys; keys++) 172 hTmp = hKey; 173 res = RegOpenKey (hTmp, *keys, &hKey); 181 return hKey; 188 HKEY hKey, hTmp [all...] |