/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softBlowfishCrypt.c | 122 * pData: pointer to the input data to be encrypted 141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 184 in_buf = pData; 208 soft_blowfish_ctx->remain_len, pData, 249 pData, out_len - soft_blowfish_ctx->remain_len); 257 in_buf = pData; 285 (void) memcpy(soft_blowfish_ctx->data, pData + 318 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, 349 if (pData == NULL) { 361 out_buf = pData; 317 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softVerifyUtil.c | 119 * pData: pointer to the input data 130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, argument 160 rv = soft_hmac_sign_verify_common(session_p, pData, 186 rv = soft_des_sign_verify_common(session_p, pData, 204 return (soft_rsa_verify_common(session_p, pData, ulDataLen, 213 return (soft_rsa_digest_verify_common(session_p, pData, 218 return (soft_dsa_verify(session_p, pData, ulDataLen, 223 return (soft_dsa_digest_verify_common(session_p, pData, 228 return (soft_ecc_verify(session_p, pData, ulDataLen, 233 return (soft_ecc_digest_verify_common(session_p, pData, 439 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softSignUtil.c | 118 * pData: pointer to the input data to be signed 129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, argument 156 rv = soft_hmac_sign_verify_common(session_p, pData, 160 rv = soft_hmac_sign_verify_common(session_p, pData, 176 rv = soft_des_sign_verify_common(session_p, pData, 181 rv = soft_des_sign_verify_common(session_p, pData, 193 return (soft_rsa_sign_common(session_p, pData, ulDataLen, 202 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen, 207 return (soft_dsa_sign(session_p, pData, ulDataLen, 212 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLe 416 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | softDigestUtil.c | 151 * pData: pointer to the input data to be digested 168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 226 * the pData is NULL, and the ulDataLen is zero. 231 if (pData != NULL) { 238 pData, (uint_t)ulDataLen); 241 pData, ulDataLen); 254 if (pData != NULL) { 262 pData, (uint32_t)ulDataLen); 265 pData, ulDataLen); 281 if (pData ! 335 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument [all...] |
H A D | softAESCrypt.c | 135 * pData: pointer to the input data to be encrypted 154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 232 in_buf = pData; 259 soft_aes_ctx->remain_len, pData, ulDataLen); 298 pData, out_len - soft_aes_ctx->remain_len); 305 in_buf = pData; 337 (void) memcpy(soft_aes_ctx->data, pData + 372 (void) memcpy(soft_aes_ctx->data, pData + 422 (char *)pData, ulDataLen, &out); 474 * pData 492 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softDESCrypt.c | 157 * pData: pointer to the input data to be encrypted 176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 253 in_buf = pData; 273 if (pData != NULL) { 279 soft_des_ctx->remain_len, pData, ulDataLen); 318 pData, out_len - soft_des_ctx->remain_len); 325 in_buf = pData; 363 (void) memcpy(soft_des_ctx->data, pData + 399 (void) memcpy(soft_des_ctx->data, pData + 473 * pData 491 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument 914 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument [all...] |
H A D | softSign.c | 104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 120 if ((pData == NULL) || (pulSignatureLen == NULL)) { 152 rv = soft_sign(session_p, pData, ulDataLen, pSignature, 361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument 377 if ((pData == NULL) || (pulSignatureLen == NULL)) { 394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature,
|
H A D | softVerify.c | 104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 120 if (pData == NULL) { 152 rv = soft_verify(session_p, pData, ulDataLen, pSignature, 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 365 ulSignatureLen, pData, pulDataLen); 368 (pData == NULL && rv == CKR_OK)) { 332 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softRSA.c | 240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data, 307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, 331 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, 352 if (pData == NULL) { 391 (void) memcpy(pData, &plain_data[num_padding], plain_len); 394 (void) memcpy(pData, plain_data, modulus_len); 523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 593 rv = pkcs1_encode(PKCS1_SIGN, pData, ulDataLen, plain_data, 605 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, 330 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument 640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 971 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1087 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1175 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softDSA.c | 219 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); 275 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, argument 307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned); 324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, argument 350 rv = local_dsa_verify(key, pData, pSignature); 364 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument 378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
|
/illumos-gate/usr/src/uts/common/io/bnxe/ |
H A D | bnxe_fcoe.c | 65 void * pData, 68 struct fcoe_kcqe * kcqe = (struct fcoe_kcqe *)pData; 92 void * pData, 95 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen)) 127 void * pData, 130 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData; 204 void * pData, 207 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen)) 251 void * pData, 254 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData; 64 BnxeFcoeCqeIndicate(um_device_t * pUM, void * pData, u32_t dataLen) argument 91 BnxeFcoeInitCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 126 BnxeFcoeInitWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 203 BnxeFcoeOffloadConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 250 BnxeFcoeOffloadConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 360 BnxeFcoeEnableConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 407 BnxeFcoeEnableConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 481 BnxeFcoeDisableConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 528 BnxeFcoeDisableConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 602 BnxeFcoeDestroyConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 666 BnxeFcoeDestroyConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 740 BnxeFcoeDestroyCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 775 BnxeFcoeDestroyWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 830 BnxeFcoeStatCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 865 BnxeFcoeStatWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 922 BnxeFcoeCompRequestCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument 1006 BnxeFcoePrvCtl(dev_info_t * pDev, int cmd, void * pData, int dataLen) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSign.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 86 if (pData == NULL || pulSignatureLen == NULL) { 93 pData, ulDataLen, pSignature, pulSignatureLen); 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument 209 if (pData == NULL || pulSignatureLen == NULL) { 216 pData, ulDataLen, pSignature, pulSignatureLen); 75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Sign.c | 96 CK_BYTE_PTR pData, 106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, 122 rv = FUNCLIST(sessp->se_slotid)->C_Sign(sessp->se_handle, pData, 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument 282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, 297 rv = FUNCLIST(sessp->se_slotid)->C_SignRecover(sessp->se_handle, pData, 95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Verify.c | 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, 119 rv = FUNCLIST(sessp->se_slotid)->C_Verify(sessp->se_handle, pData, 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 282 ulSignatureLen, pData, pulDataLen)); 298 pSignature, ulSignatureLen, pData, pulDataLen); 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | metaVerify.c | 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 86 if (pData == NULL || pSignature == NULL) { 93 pData, ulDataLen, pSignature, &ulSignatureLen); 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 221 pSignature, ulSignatureLen, pData, pulDataLen); 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | metaDigest.c | 66 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 73 if (pData == NULL || pulDigestLen == NULL) 81 pData, ulDataLen, pDigest, pulDigestLen);
|
H A D | pkcs11Digest.c | 94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen, 119 rv = FUNCLIST(sessp->se_slotid)->C_Digest(sessp->se_handle, pData,
|
H A D | pkcs11Crypt.c | 97 CK_BYTE_PTR pData, 107 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen, 123 rv = FUNCLIST(sessp->se_slotid)->C_Encrypt(sessp->se_handle, pData, 282 CK_BYTE_PTR pData, 291 ulEncryptedDataLen, pData, pulDataLen)); 307 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 96 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument 279 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | metaCrypt.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 86 if (pData == NULL || pulEncryptedDataLen == NULL) { 93 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen); 203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 75 meta_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument 201 meta_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, argument 82 rv = soft_digest(session_p, pData, ulDataLen, 86 rv = soft_digest_update(session_p, pData, ulDataLen); 148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument 158 pData, ulDataLen, opflag & OP_SIGN)); 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 208 rv = soft_hmac_sign_verify_common(session_p, pData,
|
H A D | kernelDecrypt.c | 189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 240 decrypt.cd_databuf = (char *)pData; 244 ((inplace && (pData != NULL)) || (pData == pEncryptedData)) && 271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 286 * No need to check pData because application might 294 rv = kernel_decrypt(session_p, pEncryptedData, ulEncryptedData, pData, 298 (rv == CKR_OK && pData == NULL)) { 188 kernel_decrypt(kernel_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument 270 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/illumos-gate/usr/src/boot/sys/boot/arm/at91/libat91/ |
H A D | emac.c | 238 char *pData; local 257 pData = (char *)(p_rxBD[i].address & 0xFFFFFFFC); 262 p_ARP = (arp_header_t*)pData; 279 pData[i] = pData[i+6]; 280 pData[i+6] = localMACAddr[i]; 282 pData[i+22] = localMACAddr[i]; 283 pData[i+32] = pData[i+6]; 288 pData[ [all...] |
/illumos-gate/usr/src/lib/libsqlite/src/ |
H A D | hash.h | 85 void *sqliteHashInsert(Hash*, const void *pKey, int nKey, void *pData); 97 ** SomeStructure *pData = sqliteHashData(p); 98 ** // do something with pData
|
H A D | btree_rb.c | 53 * ROLLBACK_INSERT -> Need to insert (pKey, pData) into table iTab. 64 void *pData; member in struct:BtRollbackOp 127 void *pData; member in struct:BtRbNode 742 * and the data is given by (pData,nData). The cursor is used only to 755 void * pData; local 769 pData = sqliteMallocRaw(nData); 771 memcpy(pData, pDataInput, nData); 793 pNode->pData = pData; 846 pOp->pData [all...] |
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | memcache.c | 110 typedef int (*PutDataPtr)(void **ppTableData, void *key, void *pData); 113 typedef int (*MiscFuncPtr)(void **ppTableData, void *key, void *pData); 114 typedef void (*ClrTableNodePtr)(void **ppTableData, void *pData); 118 void *pData; member in struct:HashTableNode_struct 224 static int htable_put(HashTable *pTable, void *key, void *pData); 226 static int htable_misc(HashTable *pTable, void *key, void *pData); 228 static int htable_removeall(HashTable *pTable, void *pData); 236 static int msgid_putdata(void **ppTableData, void *key, void *pData); 239 static int msgid_clear_ld_items(void **ppTableData, void *key, void *pData); 240 static void msgid_clearnode(void **ppTableData, void *pData); [all...] |