Lines Matching defs:modulus_len

51 	uint32_t modulus_len = sizeof (modulus);
68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
74 k.modulus_bits = CRYPTO_BYTES2BITS(modulus_len);
100 uint32_t modulus_len = sizeof (modulus);
108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
164 k.modulus_bits = CRYPTO_BYTES2BITS(modulus_len);
248 uint32_t modulus_len = sizeof (modulus);
253 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
263 *pulEncryptedLen = modulus_len;
273 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) {
274 *pulEncryptedLen = modulus_len;
280 if (ulDataLen > (CK_ULONG)modulus_len) {
281 *pulEncryptedLen = modulus_len;
288 if (*pulEncryptedLen < (CK_ULONG)modulus_len) {
289 *pulEncryptedLen = modulus_len;
300 modulus_len);
306 (void) memset(plain_data, 0x0, modulus_len - ulDataLen);
307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData,
311 rv = soft_rsa_encrypt(key, plain_data, modulus_len, cipher_data, 1);
313 (void) memcpy(pEncrypted, cipher_data, modulus_len);
314 *pulEncryptedLen = modulus_len;
338 uint32_t modulus_len = sizeof (modulus);
342 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
347 if (ulEncryptedLen != (CK_ULONG)modulus_len) {
357 *pulDataLen = modulus_len;
363 if (*pulDataLen < (CK_ULONG)modulus_len) {
364 *pulDataLen = modulus_len;
370 rv = soft_rsa_decrypt(key, pEncrypted, modulus_len, plain_data);
376 size_t plain_len = modulus_len;
384 num_padding = modulus_len - plain_len;
394 (void) memcpy(pData, plain_data, modulus_len);
395 *pulDataLen = modulus_len;
532 uint32_t modulus_len = sizeof (modulus);
536 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
543 *pulSignedLen = modulus_len;
556 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) {
557 *pulSignedLen = modulus_len;
566 if (ulDataLen > (CK_ULONG)modulus_len) {
567 *pulSignedLen = modulus_len;
575 if (*pulSignedLen < (CK_ULONG)modulus_len) {
576 *pulSignedLen = modulus_len;
594 modulus_len);
604 (void) memset(plain_data, 0x0, modulus_len - ulDataLen);
605 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData,
614 rv = soft_rsa_decrypt(key, plain_data, modulus_len, signed_data);
617 (void) memcpy(pSigned, signed_data, modulus_len);
618 *pulSignedLen = modulus_len;
649 uint32_t modulus_len = sizeof (modulus);
652 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
662 if (ulSignatureLen != (CK_ULONG)modulus_len) {
671 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
687 size_t data_len = modulus_len;
698 &plain_data[modulus_len - data_len],
827 uint32_t modulus_len;
863 modulus_len = (uint32_t)(*((CK_ULONG *)(template.pValue)));
865 modulus_len = *((CK_ULONG *)(template.pValue));
877 k.modulus_bits = modulus_len; /* save modulus len in bits */
878 modulus_len = CRYPTO_BITS2BYTES(modulus_len); /* convert to bytes */
985 uint32_t modulus_len = sizeof (modulus);
989 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
1004 *pulSignedLen = modulus_len;
1010 if (*pulSignedLen < (CK_ULONG)modulus_len) {
1011 *pulSignedLen = modulus_len;
1184 uint32_t modulus_len = sizeof (modulus);
1187 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
1192 if (ulSignatureLen != (CK_ULONG)modulus_len) {
1201 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
1211 size_t data_len = modulus_len;
1236 &plain_data[modulus_len - data_len], data_len);
1248 *pulDataLen = modulus_len;
1254 if (*pulDataLen < (CK_ULONG)modulus_len) {
1255 *pulDataLen = modulus_len;
1260 (void) memcpy(pData, plain_data, modulus_len);
1261 *pulDataLen = modulus_len;