Searched defs:ulDataLen (Results 1 - 25 of 32) sorted by relevance

12

/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaDigest.c66 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
81 pData, ulDataLen, pDigest, pulDigestLen);
H A DmetaSign.c76 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
93 pData, ulDataLen, pSignature, pulSignatureLen);
200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
216 pData, ulDataLen, pSignature, pulSignatureLen);
75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DmetaVerify.c75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
93 pData, ulDataLen, pSignature, &ulSignatureLen);
H A Dpkcs11Digest.c94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen,
120 ulDataLen, pDigest, pulDigestLen);
H A Dpkcs11Sign.c97 CK_ULONG ulDataLen,
106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen,
123 ulDataLen, pSignature, pulSignatureLen);
275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen,
298 ulDataLen, pSignature, pulSignatureLen);
95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Verify.c95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen,
120 ulDataLen, pSignature, ulSignatureLen);
H A DmetaCrypt.c76 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
93 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen);
75 meta_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
H A Dpkcs11Crypt.c98 CK_ULONG ulDataLen,
107 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen,
124 ulDataLen, pEncryptedData, pulEncryptedDataLen);
96 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDigest.c104 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
163 rv = soft_digest(session_p, pData, ulDataLen, pDigest, pulDigestLen);
H A DsoftSign.c104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
152 rv = soft_sign(session_p, pData, ulDataLen, pSignature,
362 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature,
361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DsoftVerify.c104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
152 rv = soft_verify(session_p, pData, ulDataLen, pSignature,
H A DsoftDigestUtil.c152 * ulDataLen: length of the input data
169 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
226 * the pData is NULL, and the ulDataLen is zero.
238 pData, (uint_t)ulDataLen);
241 pData, ulDataLen);
262 pData, (uint32_t)ulDataLen);
265 pData, ulDataLen);
287 pData, ulDataLen);
324 * ulDataLen: length of the input data
335 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument
[all...]
H A DsoftEncrypt.c104 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
169 rv = soft_encrypt(session_p, pData, ulDataLen, pEncryptedData,
H A DsoftSignUtil.c119 * ulDataLen: length of the input data
130 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
157 ulDataLen, hmac, pulSignatureLen, B_TRUE);
161 ulDataLen, pSignature, pulSignatureLen, B_TRUE);
177 ulDataLen, signature, pulSignatureLen, B_TRUE,
182 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE);
193 return (soft_rsa_sign_common(session_p, pData, ulDataLen,
202 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen,
207 return (soft_dsa_sign(session_p, pData, ulDataLen,
212 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen,
129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
416 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
[all...]
H A DsoftVerifyUtil.c120 * ulDataLen: length of the input data
131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
161 ulDataLen, hmac, &len, B_FALSE);
187 ulDataLen, signature, &len, B_FALSE, B_FALSE);
204 return (soft_rsa_verify_common(session_p, pData, ulDataLen,
214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
218 return (soft_dsa_verify(session_p, pData, ulDataLen,
224 ulDataLen, pSignature, ulSignatureLen, B_FALSE));
228 return (soft_ecc_verify(session_p, pData, ulDataLen,
234 ulDataLen, pSignatur
130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
[all...]
H A DsoftBlowfishCrypt.c123 * ulDataLen: length of the input data
142 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
163 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) {
168 out_len = ulDataLen;
193 total_len = soft_blowfish_ctx->remain_len + ulDataLen;
209 ulDataLen);
210 soft_blowfish_ctx->remain_len += ulDataLen;
286 (ulDataLen - remain), remain);
141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
H A DsoftAESCrypt.c136 * ulDataLen: length of the input data
155 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
183 if ((ulDataLen % AES_BLOCK_LEN) != 0) {
203 (ulDataLen / AES_BLOCK_LEN + 1);
209 out_len = ulDataLen;
241 total_len = soft_aes_ctx->remain_len + ulDataLen;
259 soft_aes_ctx->remain_len, pData, ulDataLen);
260 soft_aes_ctx->remain_len += ulDataLen;
338 (ulDataLen - remain), remain);
373 (ulDataLen
154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
[all...]
H A DsoftDESCrypt.c158 * ulDataLen: length of the input data
177 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
204 if ((ulDataLen % DES_BLOCK_LEN) != 0) {
224 (ulDataLen / DES_BLOCK_LEN + 1);
230 out_len = ulDataLen;
262 total_len = soft_des_ctx->remain_len + ulDataLen;
279 soft_des_ctx->remain_len, pData, ulDataLen);
280 soft_des_ctx->remain_len += ulDataLen;
364 (ulDataLen - remain), remain);
400 (ulDataLen
176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
914 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument
[all...]
H A DsoftDSA.c220 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
276 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
297 if (ulDataLen != DSA_SUBPRIME_BYTES) {
307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned);
325 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
339 if (ulDataLen != DSA_SUBPRIME_BYTES) {
365 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
219 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument
275 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument
324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
364 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument
H A DsoftEC.c425 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
436 rv = soft_digest(session_p, pData, ulDataLen, hash,
464 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
482 if (ulDataLen > EC_MAX_DIGEST_LEN) {
503 digest_item.len = ulDataLen;
530 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
552 if (ulDataLen > EC_MAX_DIGEST_LEN) {
575 digest_item.len = ulDataLen;
595 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
605 rv = soft_digest(session_p, pData, ulDataLen, has
424 soft_ecc_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument
463 soft_ecc_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument
529 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
594 soft_ecc_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEncrypt.c167 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
236 if (ulDataLen < *pulEncryptedDataLen && inplace) {
237 encrypt.ce_encrlen = ulDataLen;
244 encrypt.ce_datalen = ulDataLen;
H A DkernelSign.c175 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
223 if ((ulDataLen < SLOT_THRESHOLD(session_p)) ||
224 (ulDataLen > SLOT_HMAC_MAX_INDATA_LEN(session_p))) {
230 pData, ulDataLen,
242 sign.cs_datalen = ulDataLen;
606 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
641 sign_recover.sr_datalen = ulDataLen;
605 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DkernelSoftCommon.c47 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen,
82 rv = soft_digest(session_p, pData, ulDataLen,
86 rv = soft_digest_update(session_p, pData, ulDataLen);
148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument
158 pData, ulDataLen, opflag & OP_SIGN));
165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen,
191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
209 ulDataLen, hmac, &len, B_FALSE);
46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, int opflag) argument
H A DkernelDigest.c141 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
211 if ((ulDataLen < SLOT_THRESHOLD(session_p)) ||
212 (ulDataLen > SLOT_HASH_MAX_INDATA_LEN(session_p))) {
218 pData, ulDataLen, pDigest, pulDigestLen,
238 digest.cd_datalen = ulDataLen;
H A DkernelVerify.c179 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
222 if ((ulDataLen < SLOT_THRESHOLD(session_p)) ||
223 (ulDataLen > SLOT_HMAC_MAX_INDATA_LEN(session_p))) {
229 pData, ulDataLen,
240 verify.cv_datalen = ulDataLen;

Completed in 508 milliseconds

12