Searched defs:length_only (Results 1 - 13 of 13) sorted by relevance

/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddecr_mgr.c161 CK_BBOOL length_only,
174 if ((length_only == FALSE) && (! in_data || ! out_data)) {
182 return (rsa_pkcs_decrypt(sess, length_only,
160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dencr_mgr.c160 CK_BBOOL length_only,
173 if ((length_only == FALSE) && (! in_data || ! out_data)) {
181 return (rsa_pkcs_encrypt(sess, length_only,
159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Ddig_mgr.c373 CK_BBOOL length_only,
388 if ((length_only == FALSE) && (! in_data || ! out_data)) {
397 if (!length_only && *out_data_len < SHA1_DIGEST_LENGTH)
399 return (sha1_hash(sess, length_only, ctx,
403 if (!length_only && *out_data_len < MD5_DIGEST_LENGTH)
405 return (md5_hash(sess, length_only, ctx,
372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dmech_md5.c298 CK_BBOOL length_only,
310 if (length_only == TRUE) {
322 CK_BBOOL length_only,
357 if (length_only == TRUE) {
297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
H A Dmech_sha.c31 CK_BBOOL length_only,
42 if (length_only == TRUE) {
57 CK_BBOOL length_only,
90 if (length_only == TRUE) {
30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
H A Dsign_mgr.c251 CK_BBOOL length_only,
271 if ((length_only == FALSE) && (! in_data || ! out_data)) {
279 return (rsa_pkcs_sign(sess, length_only, ctx,
284 return (rsa_hash_pkcs_sign(sess, length_only, ctx,
290 return (md5_hmac_sign(sess, length_only, ctx,
295 return (sha1_hmac_sign(sess, length_only, ctx,
333 CK_BBOOL length_only,
350 return (rsa_hash_pkcs_sign_final(sess, length_only,
359 CK_BBOOL length_only,
379 if ((length_only
250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
[all...]
H A Dverify_mgr.c336 CK_BBOOL length_only,
362 return (rsa_pkcs_verify_recover(sess, length_only,
335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
H A Dasn1.c296 ber_encode_INTEGER(CK_BBOOL length_only, argument
325 if (length_only == TRUE) {
446 ber_encode_OCTET_STRING(CK_BBOOL length_only, argument
472 if (length_only == TRUE) {
598 ber_encode_SEQUENCE(CK_BBOOL length_only, argument
618 if (length_only == TRUE) {
751 ber_encode_PrivateKeyInfo(CK_BBOOL length_only, argument
788 if (length_only == TRUE) {
883 ber_encode_RSAPrivateKey(CK_BBOOL length_only, argument
935 if (length_only
[all...]
H A Dkey_mgr.c233 CK_BBOOL length_only,
300 rc = rsa_priv_wrap_get_data(key2_obj->template, length_only,
309 length_only, &data, &data_len);
336 rc = encr_mgr_encrypt(sess, length_only,
232 key_mgr_wrap_key(SESSION * sess, CK_BBOOL length_only, CK_MECHANISM * mech, CK_OBJECT_HANDLE h_wrapping_key, CK_OBJECT_HANDLE h_key, CK_BYTE * wrapped_key, CK_ULONG * wrapped_key_len) argument
H A Dmech_rsa.c176 CK_BBOOL length_only,
201 if (length_only == TRUE) {
219 CK_BBOOL length_only,
246 if (length_only == TRUE) {
263 CK_BBOOL length_only,
290 if (length_only == TRUE) {
346 CK_BBOOL length_only,
376 if (length_only == TRUE) {
389 CK_BBOOL length_only,
436 rc = digest_mgr_digest(sess, length_only,
175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
[all...]
H A Dsess_mgr.c765 CK_BBOOL length_only,
789 if (length_only == FALSE) {
830 if (length_only == FALSE) {
871 if (length_only == FALSE) {
911 if (length_only == FALSE) {
951 if (length_only == FALSE) {
764 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument
H A Dkey.c1431 CK_BBOOL length_only,
1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
1637 CK_BBOOL length_only,
1655 if (length_only == FALSE) {
1430 rsa_priv_wrap_get_data(TEMPLATE *tmpl, CK_BBOOL length_only, CK_BYTE **data, CK_ULONG *data_len) argument
1636 generic_secret_wrap_get_data(TEMPLATE * tmpl, CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len) argument
H A Dnew_host.c680 CK_BBOOL length_only = FALSE; local
695 length_only = TRUE;
703 rc = session_mgr_get_op_state(sess, length_only,
1232 CK_BBOOL length_only = FALSE; local
1257 length_only = TRUE;
1259 rc = encr_mgr_encrypt(sess, length_only,
1264 if (rc != CKR_BUFFER_TOO_SMALL && (rc != CKR_OK || length_only != TRUE))
1279 CK_BBOOL length_only = FALSE;
1305 length_only = TRUE;
1307 rc = encr_mgr_encrypt_update(sess, length_only,
1415 CK_BBOOL length_only = FALSE; local
1505 CK_BBOOL length_only = FALSE; local
1624 CK_BBOOL length_only = FALSE; local
1713 CK_BBOOL length_only = FALSE; local
1796 CK_BBOOL length_only = FALSE; local
1884 CK_BBOOL length_only = FALSE; local
2132 CK_BBOOL length_only = FALSE; local
2226 CK_BBOOL length_only = FALSE; local
[all...]

Completed in 61 milliseconds