/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | evp-crypt.c | 58 HCRYPTKEY *hKey; member in struct:generic_key 71 bResult = CryptSetKeyParam(gk->hKey, KP_IV, ctx->iv, 0); 77 bResult = CryptEncrypt(gk->hKey, 0, TRUE, 0, out, &length, size); 79 bResult = CryptDecrypt(gk->hKey, 0, TRUE, 0, out, &length); 89 CryptDestroyKey(gk->hKey); 90 gk->hKey = NULL; 115 &gk->hKey); 119 return hKey; 131 gk->hKey = import_key(CALG_3DES,
|
/macosx-10.9.5/SecurityTokend-55107/lib/ |
H A D | SecTokend.h | 119 CSSM_RETURN (*releaseKey)(CSSM_HANDLE hKey); 120 CSSM_RETURN (*getKeySize)(CSSM_HANDLE hKey, CSSM_KEY_SIZE *size); 121 CSSM_RETURN (*getOutputSize)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 124 CSSM_RETURN (*generateSignature)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 126 CSSM_RETURN (*verifySignature)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 128 CSSM_RETURN (*generateMac)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 130 CSSM_RETURN (*verifyMac)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 132 CSSM_RETURN (*encrypt)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 134 CSSM_RETURN (*decrypt)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 140 CSSM_HANDLE *hKey, CSSM_KE [all...] |
H A D | tdtransit.cpp | 153 SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, 162 outData != NULL, &dataPtr, &dataLength, &hKey, 182 CssmData *outData, KeyHandle &hKey, 190 outData != NULL, &dataPtr, &dataLength, &hKey, 209 CssmData *outData, KeyHandle &hKey, 216 outData != NULL, &dataPtr, &dataLength, &hKey, 268 void ClientSession::releaseKey(KeyHandle hKey) argument 270 IPC(tokend_client_releaseKey(TOKEND_ARGS, hKey)); 273 void ClientSession::queryKeySizeInBits(KeyHandle hKey, CssmKeySize &result) argument 275 IPC(tokend_client_queryKeySizeInBits(TOKEND_ARGS, hKey, 151 findFirst(const CssmQuery &query, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 180 findNext(SearchHandle hSearch, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 207 findRecordHandle(RecordHandle hRecord, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 279 getOutputSize(const Context &context, KeyHandle hKey, uint32 inputSize, bool encrypt, uint32 &result) argument 290 generateSignature(const Context &context, KeyHandle hKey, const CssmData &data, CssmData &signature, CSSM_ALGORITHMS signOnlyAlgorithm) argument 299 verifySignature(const Context &context, KeyHandle hKey, const CssmData &data, const CssmData &signature, CSSM_ALGORITHMS verifyOnlyAlgorithm) argument 308 generateMac(const Context &context, KeyHandle hKey, const CssmData &data, CssmData &signature) argument 317 verifyMac(const Context &context, KeyHandle hKey, const CssmData &data, const CssmData &signature) argument 330 encrypt(const Context &context, KeyHandle hKey, const CssmData &clear, CssmData &cipher) argument 338 decrypt(const Context &context, KeyHandle hKey, const CssmData &cipher, CssmData &clear) argument 350 generateKey(const Security::Context &context, const AccessCredentials *cred, const AclEntryPrototype *proto, uint32 keyUsage, uint32 keyAttr, KeyHandle &hKey, CssmKey *&key) argument 402 unwrapKey(const Security::Context &context, const AccessCredentials *cred, const AclEntryPrototype *proto, KeyHandle hWrappingKey, const CssmKey *wrappingKey, KeyHandle hPublicKey, const CssmKey *publicKey, const CssmWrappedKey &wrappedKey, uint32 usage, uint32 attrs, CssmData &descriptiveData, KeyHandle &hKey, CssmKey *&key) argument 430 deriveKey(DbHandle db, const Context &context, KeyHandle hBaseKey, const CssmKey *baseKey, uint32 keyUsage, uint32 keyAttr, CssmData ¶m, const AccessCredentials *cred, const AclEntryPrototype *proto, KeyHandle &hKey, CssmKey *&key) argument [all...] |
H A D | transition.cpp | 87 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 97 interface.returnData(*hKey, *hRecord, *outData, *outDataLength, 101 Instead, hKey and hRecord are set to 0. In this case, we don't want to 113 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 122 interface.returnData(*hKey, *hRecord, *outData, *outDataLength, 131 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 139 interface.returnData(*hKey, hRecord, *outData, *outDataLength, 204 kern_return_t tokend_server_releaseKey(TOKEND_ARGS, KeyHandle hKey) argument 207 CSSM_HANDLE keyHandle = TokendHandleObject::findTDHandle(hKey); 212 kern_return_t tokend_server_queryKeySizeInBits(TOKEND_ARGS, KeyHandle hKey, argument 84 tokend_server_findFirst(TOKEND_ARGS, COPY_IN(CssmQuery, query), COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes), SearchHandle *hSearch, RecordHandle *hRecord) argument 111 tokend_server_findNext(TOKEND_ARGS, SearchHandle hSearch, COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes), RecordHandle *hRecord) argument 129 tokend_server_findRecordHandle(TOKEND_ARGS, RecordHandle hRecord, COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes)) argument 221 tokend_server_getOutputSize(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, uint32 inputSize, boolean_t encrypt, uint32 *outputSize) argument 235 tokend_server_generateSignature(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, CSSM_ALGORITHMS signOnlyAlgorithm, DATA_IN(data), DATA_OUT(signature)) argument 248 tokend_server_verifySignature(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, CSSM_ALGORITHMS verifyOnlyAlgorithm, DATA_IN(data), DATA_IN(signature)) argument 260 tokend_server_generateMac(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(data), DATA_OUT(mac)) argument 272 tokend_server_verifyMac(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(data), DATA_IN(mac)) argument 288 tokend_server_encrypt(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(clear), DATA_OUT(cipher)) argument 300 tokend_server_decrypt(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(cipher), DATA_OUT(clear)) argument 316 tokend_server_generateKey(TOKEND_ARGS, CONTEXT_ARGS, COPY_IN(AccessCredentials, cred), COPY_IN(AclEntryPrototype, owner), uint32 usage, uint32 attrs, KeyHandle *hKey, COPY_OUT(CssmKey, key)) argument 407 tokend_server_deriveKey(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hBaseKey, COPY_IN(CssmKey, baseKey), COPY_IN(AccessCredentials, cred), COPY_IN(AclEntryPrototype, owner), COPY_IN(CssmDeriveData,paramInput), DATA_OUT(paramOutput), CSSM_KEYUSE usage, CSSM_KEYATTR_FLAGS attrs, KeyHandle *hKey, COPY_OUT(CssmKey, key)) argument 616 tokend_server_cspPassThrough(TOKEND_ARGS, uint32 id, CONTEXT_ARGS, KeyHandle hKey, COPY_IN(CssmKey, key), DATA_IN(inData), DATA_OUT(outData)) argument [all...] |
H A D | transit.cpp | 59 void DataRetrieval::returnData(KeyHandle &hKey, RecordHandle &hRecord, argument 81 hKey = (this->keyhandle)?TokendHandleObject::make(this->keyhandle)->ipcHandle():0;
|
H A D | tdclient.h | 77 SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, 81 CssmData *outData, KeyHandle &hKey, 85 CssmData *inOutData, KeyHandle &hKey, 131 KeyHandle &hKey, CssmKey *&key);
|
/macosx-10.9.5/SecurityTokend-55107/security_tokend_client/ |
H A D | SecTokend.h | 119 CSSM_RETURN (*releaseKey)(CSSM_HANDLE hKey); 120 CSSM_RETURN (*getKeySize)(CSSM_HANDLE hKey, CSSM_KEY_SIZE *size); 121 CSSM_RETURN (*getOutputSize)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 124 CSSM_RETURN (*generateSignature)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 126 CSSM_RETURN (*verifySignature)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 128 CSSM_RETURN (*generateMac)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 130 CSSM_RETURN (*verifyMac)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 132 CSSM_RETURN (*encrypt)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 134 CSSM_RETURN (*decrypt)(const CSSM_CONTEXT *context, CSSM_HANDLE hKey, 140 CSSM_HANDLE *hKey, CSSM_KE [all...] |
H A D | tdtransit.cpp | 153 SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, 162 outData != NULL, &dataPtr, &dataLength, &hKey, 182 CssmData *outData, KeyHandle &hKey, 190 outData != NULL, &dataPtr, &dataLength, &hKey, 209 CssmData *outData, KeyHandle &hKey, 216 outData != NULL, &dataPtr, &dataLength, &hKey, 268 void ClientSession::releaseKey(KeyHandle hKey) argument 270 IPC(tokend_client_releaseKey(TOKEND_ARGS, hKey)); 273 void ClientSession::queryKeySizeInBits(KeyHandle hKey, CssmKeySize &result) argument 275 IPC(tokend_client_queryKeySizeInBits(TOKEND_ARGS, hKey, 151 findFirst(const CssmQuery &query, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 180 findNext(SearchHandle hSearch, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 207 findRecordHandle(RecordHandle hRecord, CssmDbRecordAttributeData *inAttributes, size_t inAttributesLength, CssmData *outData, KeyHandle &hKey, CssmDbRecordAttributeData *&outAttributes, mach_msg_type_number_t &outAttributesLength) argument 279 getOutputSize(const Context &context, KeyHandle hKey, uint32 inputSize, bool encrypt, uint32 &result) argument 290 generateSignature(const Context &context, KeyHandle hKey, const CssmData &data, CssmData &signature, CSSM_ALGORITHMS signOnlyAlgorithm) argument 299 verifySignature(const Context &context, KeyHandle hKey, const CssmData &data, const CssmData &signature, CSSM_ALGORITHMS verifyOnlyAlgorithm) argument 308 generateMac(const Context &context, KeyHandle hKey, const CssmData &data, CssmData &signature) argument 317 verifyMac(const Context &context, KeyHandle hKey, const CssmData &data, const CssmData &signature) argument 330 encrypt(const Context &context, KeyHandle hKey, const CssmData &clear, CssmData &cipher) argument 338 decrypt(const Context &context, KeyHandle hKey, const CssmData &cipher, CssmData &clear) argument 350 generateKey(const Security::Context &context, const AccessCredentials *cred, const AclEntryPrototype *proto, uint32 keyUsage, uint32 keyAttr, KeyHandle &hKey, CssmKey *&key) argument 402 unwrapKey(const Security::Context &context, const AccessCredentials *cred, const AclEntryPrototype *proto, KeyHandle hWrappingKey, const CssmKey *wrappingKey, KeyHandle hPublicKey, const CssmKey *publicKey, const CssmWrappedKey &wrappedKey, uint32 usage, uint32 attrs, CssmData &descriptiveData, KeyHandle &hKey, CssmKey *&key) argument 430 deriveKey(DbHandle db, const Context &context, KeyHandle hBaseKey, const CssmKey *baseKey, uint32 keyUsage, uint32 keyAttr, CssmData ¶m, const AccessCredentials *cred, const AclEntryPrototype *proto, KeyHandle &hKey, CssmKey *&key) argument [all...] |
H A D | transition.cpp | 87 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 97 interface.returnData(*hKey, *hRecord, *outData, *outDataLength, 101 Instead, hKey and hRecord are set to 0. In this case, we don't want to 113 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 122 interface.returnData(*hKey, *hRecord, *outData, *outDataLength, 131 boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, 139 interface.returnData(*hKey, hRecord, *outData, *outDataLength, 204 kern_return_t tokend_server_releaseKey(TOKEND_ARGS, KeyHandle hKey) argument 207 CSSM_HANDLE keyHandle = TokendHandleObject::findTDHandle(hKey); 212 kern_return_t tokend_server_queryKeySizeInBits(TOKEND_ARGS, KeyHandle hKey, argument 84 tokend_server_findFirst(TOKEND_ARGS, COPY_IN(CssmQuery, query), COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes), SearchHandle *hSearch, RecordHandle *hRecord) argument 111 tokend_server_findNext(TOKEND_ARGS, SearchHandle hSearch, COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes), RecordHandle *hRecord) argument 129 tokend_server_findRecordHandle(TOKEND_ARGS, RecordHandle hRecord, COPY_IN(CssmDbRecordAttributeData, inAttributes), boolean_t getData, DATA_OUT(outData), KeyHandle *hKey, COPY_OUT(CssmDbRecordAttributeData, outAttributes)) argument 221 tokend_server_getOutputSize(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, uint32 inputSize, boolean_t encrypt, uint32 *outputSize) argument 235 tokend_server_generateSignature(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, CSSM_ALGORITHMS signOnlyAlgorithm, DATA_IN(data), DATA_OUT(signature)) argument 248 tokend_server_verifySignature(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, CSSM_ALGORITHMS verifyOnlyAlgorithm, DATA_IN(data), DATA_IN(signature)) argument 260 tokend_server_generateMac(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(data), DATA_OUT(mac)) argument 272 tokend_server_verifyMac(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(data), DATA_IN(mac)) argument 288 tokend_server_encrypt(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(clear), DATA_OUT(cipher)) argument 300 tokend_server_decrypt(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hKey, DATA_IN(cipher), DATA_OUT(clear)) argument 316 tokend_server_generateKey(TOKEND_ARGS, CONTEXT_ARGS, COPY_IN(AccessCredentials, cred), COPY_IN(AclEntryPrototype, owner), uint32 usage, uint32 attrs, KeyHandle *hKey, COPY_OUT(CssmKey, key)) argument 407 tokend_server_deriveKey(TOKEND_ARGS, CONTEXT_ARGS, KeyHandle hBaseKey, COPY_IN(CssmKey, baseKey), COPY_IN(AccessCredentials, cred), COPY_IN(AclEntryPrototype, owner), COPY_IN(CssmDeriveData,paramInput), DATA_OUT(paramOutput), CSSM_KEYUSE usage, CSSM_KEYATTR_FLAGS attrs, KeyHandle *hKey, COPY_OUT(CssmKey, key)) argument 616 tokend_server_cspPassThrough(TOKEND_ARGS, uint32 id, CONTEXT_ARGS, KeyHandle hKey, COPY_IN(CssmKey, key), DATA_IN(inData), DATA_OUT(outData)) argument [all...] |
H A D | transit.cpp | 59 void DataRetrieval::returnData(KeyHandle &hKey, RecordHandle &hRecord, argument 81 hKey = (this->keyhandle)?TokendHandleObject::make(this->keyhandle)->ipcHandle():0;
|
H A D | tdclient.h | 77 SearchHandle &hSearch, CssmData *outData, KeyHandle &hKey, 81 CssmData *outData, KeyHandle &hKey, 85 CssmData *inOutData, KeyHandle &hKey, 131 KeyHandle &hKey, CssmKey *&key);
|
/macosx-10.9.5/WebCore-7537.78.1/platform/win/ |
H A D | SSLKeyGeneratorWin.cpp | 43 HCRYPTKEY hKey = 0; local 54 if (!CryptGenKey(hContext, AT_KEYEXCHANGE, 0, &hKey) || !CryptExportPublicKeyInfo(hContext, AT_KEYEXCHANGE, X509_ASN_ENCODING, 0, &dwPubInfoLength)) 90 if (hKey) 91 CryptDestroyKey(hKey);
|
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/win32/ |
H A D | ntpaths.c | 54 HKEY hKey; local 58 if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, BIND_SUBKEY, 0, KEY_READ, &hKey) 64 if (RegQueryValueEx(hKey, "InstallDir", NULL, NULL, 67 RegCloseKey(hKey);
|
/macosx-10.9.5/ntp-88/lib/isc/win32/ |
H A D | ntpaths.c | 53 HKEY hKey; local 57 if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, BIND_SUBKEY, 0, KEY_READ, &hKey) 63 if (RegQueryValueEx(hKey, "InstallDir", NULL, NULL, 66 RegCloseKey(hKey);
|
/macosx-10.9.5/bind9-45.100/bind9/lib/lwres/win32/ |
H A D | lwconfig.c | 49 HKEY hKey; local 60 if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, TCPIP_SUBKEY, 0, KEY_READ, &hKey) 66 if (RegQueryValueEx(hKey, "SearchList", NULL, NULL, 69 RegCloseKey(hKey);
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | tokenkey.h | 41 TokenKey(TokenDatabase &db, KeyHandle hKey, const CssmKey::Header &hdr);
|
H A D | tokendatabase.cpp | 293 RefPointer<Key> TokenDatabase::makeKey(KeyHandle hKey, const CssmKey *key, argument 298 return new TokenKey(*this, hKey, key->header()); 453 KeyHandle hKey; local 455 access().generateKey(context, cred, owner, usage, modattrs(attrs), hKey, result); 456 newKey = makeKey(hKey, result, 0, owner); 521 KeyHandle hKey; local 525 wrappedKey, usage, modattrs(attrs), descriptiveData, hKey, result); 526 unwrappedKey = makeKey(hKey, result, modattrs(attrs) & LocalKey::managedAttributes, owner); 544 KeyHandle hKey; local 550 hKey, resul 630 KeyHandle hKey = noKey; local 666 KeyHandle hKey = noKey; local 702 KeyHandle hKey = noKey; local [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/libraries/liblutil/ |
H A D | ntservice.c | 58 HKEY hKey; local 89 "REG_SZ", REG_OPTION_NON_VOLATILE, KEY_ALL_ACCESS, NULL, &hKey, 93 RegCloseKey(hKey); 97 if ( RegSetValueEx(hKey, "EventMessageFile", 0, REG_EXPAND_SZ, lpszBinaryPathName, strlen(lpszBinaryPathName) + 1) != ERROR_SUCCESS) 100 RegCloseKey(hKey); 105 if ( RegSetValueEx(hKey, "TypesSupported", 0, REG_DWORD, (LPBYTE) &dwValue, sizeof(DWORD)) != ERROR_SUCCESS) 108 RegCloseKey(hKey); 111 RegCloseKey(hKey);
|
/macosx-10.9.5/cxxfilt-11/cxxfilt/libiberty/ |
H A D | pex-win32.c | 166 HKEY hKey, hTmp; local 167 for (hKey = hStart; *keys; keys++) 170 hTmp = hKey; 171 res = RegOpenKey (hTmp, *keys, &hKey); 179 return hKey; 186 HKEY hKey, hTmp; local 193 hKey = openkey (HKEY_LOCAL_MACHINE, mingw_keys); 196 if (!hKey) 201 if (RegQueryInfoKey (hKey, NULL, NULL, NULL, NULL, &maxlen, NULL, NULL, 204 RegCloseKey (hKey); [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/win32/BINDInstall/ |
H A D | BINDInstallDlg.cpp | 263 HKEY hKey; local 268 if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, BIND_SUBKEY, 0, KEY_READ, &hKey) 273 if (RegQueryValueEx(hKey, "InstallDir", NULL, NULL, (LPBYTE)buf, 278 RegCloseKey(hKey); 532 HKEY hKey; local 537 &hKey) == ERROR_SUCCESS) { 539 RegSetValueEx(hKey, "InstallDir", 0, REG_SZ, 542 RegCloseKey(hKey); 548 &hKey) == ERROR_SUCCESS) { 551 RegSetValueEx(hKey, "DisplayNam 722 HKEY hKey; local 967 HKEY hKey; local 997 HKEY hKey = NULL; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_sd_cspdl/lib/ |
H A D | SDKey.h | 51 SDKey(SDDLSession &session, CssmKey &ioKey, SecurityServer::KeyHandle hKey, CSSM_DB_HANDLE inDBHandle,
|
/macosx-10.9.5/bind9-45.100/bind9/bin/pkcs11/include/ |
H A D | pkcs11f.h | 378 CK_OBJECT_HANDLE hKey /* handle of encryption key */ 428 CK_OBJECT_HANDLE hKey /* handle of decryption key */ 517 CK_OBJECT_HANDLE hKey /* secret key to digest */ 546 CK_OBJECT_HANDLE hKey /* handle of signature key */ 598 CK_OBJECT_HANDLE hKey /* handle of the signature key */ 628 CK_OBJECT_HANDLE hKey /* verification key */ 680 CK_OBJECT_HANDLE hKey /* verification key */ 811 CK_OBJECT_HANDLE hKey, /* key to be wrapped */
|
/macosx-10.9.5/vim-53/src/ |
H A D | if_ole.cpp | 155 HKEY hKey; local 161 KEY_ALL_ACCESS, NULL, &hKey, NULL)) 166 RegCloseKey(hKey); 681 HKEY hKey; local 698 &hKey, NULL); 704 RegSetValueEx(hKey, NULL, 0, REG_SZ, (BYTE *)value, 707 RegCloseKey(hKey);
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSWindows/ControlPanel/ |
H A D | ControlPanelExe.cpp | 81 HKEY hKey; local 93 err = RegOpenKeyEx( hKeyRoot, lpSubKey, 0, KEY_READ, &hKey ); 110 err = RegEnumKeyEx(hKey, 0, szName, &dwSize, NULL, NULL, NULL, &ftWrite); 125 err = RegEnumKeyEx( hKey, 0, szName, &dwSize, NULL, NULL, NULL, &ftWrite ); 134 RegCloseKey( hKey );
|
/macosx-10.9.5/SecurityTokend-55107/mig/ |
H A D | tokend.defs | 72 in getData: boolean_t; out data: Data; out hKey: KeyHandle; 78 in getData: boolean_t; out data: Data; out hKey: KeyHandle; 84 in getData: boolean_t; out data: Data; out hKey: KeyHandle; 128 out hKey: KeyHandle; out key: CssmKeyBlob; out keyBase: CssmKeyPtr); 143 out hKey: KeyHandle; out key: CssmKeyBlob; out keyBase: CssmKeyPtr); 148 out hKey: KeyHandle; OUT_BLOB(key, CssmKey)); 183 routine cspPassThrough(TOKEND_PORTS; in id: uint32; IN_CONTEXT; in hKey: KeyHandle; IN_BLOB(key, CssmKey);
|