Searched refs:pData (Results 1 - 25 of 60) sorted by relevance

123

/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftBlowfishCrypt.c122 * pData: pointer to the input data to be encrypted
141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
184 in_buf = pData;
208 soft_blowfish_ctx->remain_len, pData,
249 pData, out_len - soft_blowfish_ctx->remain_len);
257 in_buf = pData;
285 (void) memcpy(soft_blowfish_ctx->data, pData +
318 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen,
349 if (pData == NULL) {
361 out_buf = pData;
317 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftVerifyUtil.c119 * pData: pointer to the input data
130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, argument
160 rv = soft_hmac_sign_verify_common(session_p, pData,
186 rv = soft_des_sign_verify_common(session_p, pData,
204 return (soft_rsa_verify_common(session_p, pData, ulDataLen,
213 return (soft_rsa_digest_verify_common(session_p, pData,
218 return (soft_dsa_verify(session_p, pData, ulDataLen,
223 return (soft_dsa_digest_verify_common(session_p, pData,
228 return (soft_ecc_verify(session_p, pData, ulDataLen,
233 return (soft_ecc_digest_verify_common(session_p, pData,
439 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A DsoftSignUtil.c118 * pData: pointer to the input data to be signed
129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, argument
156 rv = soft_hmac_sign_verify_common(session_p, pData,
160 rv = soft_hmac_sign_verify_common(session_p, pData,
176 rv = soft_des_sign_verify_common(session_p, pData,
181 rv = soft_des_sign_verify_common(session_p, pData,
193 return (soft_rsa_sign_common(session_p, pData, ulDataLen,
202 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen,
207 return (soft_dsa_sign(session_p, pData, ulDataLen,
212 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLe
416 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
[all...]
H A DsoftDigestUtil.c151 * pData: pointer to the input data to be digested
168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
226 * the pData is NULL, and the ulDataLen is zero.
231 if (pData != NULL) {
238 pData, (uint_t)ulDataLen);
241 pData, ulDataLen);
254 if (pData != NULL) {
262 pData, (uint32_t)ulDataLen);
265 pData, ulDataLen);
281 if (pData !
335 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument
[all...]
H A DsoftAESCrypt.c135 * pData: pointer to the input data to be encrypted
154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
232 in_buf = pData;
259 soft_aes_ctx->remain_len, pData, ulDataLen);
298 pData, out_len - soft_aes_ctx->remain_len);
305 in_buf = pData;
337 (void) memcpy(soft_aes_ctx->data, pData +
372 (void) memcpy(soft_aes_ctx->data, pData +
422 (char *)pData, ulDataLen, &out);
474 * pData
492 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftDESCrypt.c157 * pData: pointer to the input data to be encrypted
176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
253 in_buf = pData;
273 if (pData != NULL) {
279 soft_des_ctx->remain_len, pData, ulDataLen);
318 pData, out_len - soft_des_ctx->remain_len);
325 in_buf = pData;
363 (void) memcpy(soft_des_ctx->data, pData +
399 (void) memcpy(soft_des_ctx->data, pData +
473 * pData
491 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
914 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument
[all...]
H A DsoftSign.c104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
120 if ((pData == NULL) || (pulSignatureLen == NULL)) {
152 rv = soft_sign(session_p, pData, ulDataLen, pSignature,
361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument
377 if ((pData == NULL) || (pulSignatureLen == NULL)) {
394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature,
H A DsoftVerify.c104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
120 if (pData == NULL) {
152 rv = soft_verify(session_p, pData, ulDataLen, pSignature,
333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
365 ulSignatureLen, pData, pulDataLen);
368 (pData == NULL && rv == CKR_OK)) {
332 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DsoftRSA.c240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data,
307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData,
331 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData,
352 if (pData == NULL) {
391 (void) memcpy(pData, &plain_data[num_padding], plain_len);
394 (void) memcpy(pData, plain_data, modulus_len);
523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
593 rv = pkcs1_encode(PKCS1_SIGN, pData, ulDataLen, plain_data,
605 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData,
330 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument
640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
971 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
1087 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
1175 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A DsoftDSA.c219 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
275 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, argument
307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned);
324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, argument
350 rv = local_dsa_verify(key, pData, pSignature);
364 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, argument
378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
/illumos-gate/usr/src/uts/common/io/bnxe/
H A Dbnxe_fcoe.c65 void * pData,
68 struct fcoe_kcqe * kcqe = (struct fcoe_kcqe *)pData;
92 void * pData,
95 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen))
127 void * pData,
130 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData;
204 void * pData,
207 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen))
251 void * pData,
254 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData;
64 BnxeFcoeCqeIndicate(um_device_t * pUM, void * pData, u32_t dataLen) argument
91 BnxeFcoeInitCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
126 BnxeFcoeInitWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
203 BnxeFcoeOffloadConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
250 BnxeFcoeOffloadConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
360 BnxeFcoeEnableConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
407 BnxeFcoeEnableConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
481 BnxeFcoeDisableConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
528 BnxeFcoeDisableConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
602 BnxeFcoeDestroyConnCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
666 BnxeFcoeDestroyConnWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
740 BnxeFcoeDestroyCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
775 BnxeFcoeDestroyWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
830 BnxeFcoeStatCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
865 BnxeFcoeStatWqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
922 BnxeFcoeCompRequestCqeWork(um_device_t * pUM, void * pData, u32_t dataLen) argument
1006 BnxeFcoePrvCtl(dev_info_t * pDev, int cmd, void * pData, int dataLen) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaSign.c76 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
86 if (pData == NULL || pulSignatureLen == NULL) {
93 pData, ulDataLen, pSignature, pulSignatureLen);
199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument
209 if (pData == NULL || pulSignatureLen == NULL) {
216 pData, ulDataLen, pSignature, pulSignatureLen);
75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Sign.c96 CK_BYTE_PTR pData,
106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen,
122 rv = FUNCLIST(sessp->se_slotid)->C_Sign(sessp->se_handle, pData,
274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, argument
282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen,
297 rv = FUNCLIST(sessp->se_slotid)->C_SignRecover(sessp->se_handle, pData,
95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Verify.c95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen,
119 rv = FUNCLIST(sessp->se_slotid)->C_Verify(sessp->se_handle, pData,
274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
282 ulSignatureLen, pData, pulDataLen));
298 pSignature, ulSignatureLen, pData, pulDataLen);
273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DmetaVerify.c75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
86 if (pData == NULL || pSignature == NULL) {
93 pData, ulDataLen, pSignature, &ulSignatureLen);
205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
221 pSignature, ulSignatureLen, pData, pulDataLen);
204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DmetaDigest.c66 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
73 if (pData == NULL || pulDigestLen == NULL)
81 pData, ulDataLen, pDigest, pulDigestLen);
H A Dpkcs11Digest.c94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen,
119 rv = FUNCLIST(sessp->se_slotid)->C_Digest(sessp->se_handle, pData,
H A Dpkcs11Crypt.c97 CK_BYTE_PTR pData,
107 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen,
123 rv = FUNCLIST(sessp->se_slotid)->C_Encrypt(sessp->se_handle, pData,
282 CK_BYTE_PTR pData,
291 ulEncryptedDataLen, pData, pulDataLen));
307 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
96 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
279 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DmetaCrypt.c76 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
86 if (pData == NULL || pulEncryptedDataLen == NULL) {
93 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen);
203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
75 meta_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
201 meta_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, argument
82 rv = soft_digest(session_p, pData, ulDataLen,
86 rv = soft_digest_update(session_p, pData, ulDataLen);
148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument
158 pData, ulDataLen, opflag & OP_SIGN));
165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen,
191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
208 rv = soft_hmac_sign_verify_common(session_p, pData,
H A DkernelDecrypt.c189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
240 decrypt.cd_databuf = (char *)pData;
244 ((inplace && (pData != NULL)) || (pData == pEncryptedData)) &&
271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
286 * No need to check pData because application might
294 rv = kernel_decrypt(session_p, pEncryptedData, ulEncryptedData, pData,
298 (rv == CKR_OK && pData == NULL)) {
188 kernel_decrypt(kernel_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
270 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/illumos-gate/usr/src/boot/sys/boot/arm/at91/libat91/
H A Demac.c238 char *pData; local
257 pData = (char *)(p_rxBD[i].address & 0xFFFFFFFC);
262 p_ARP = (arp_header_t*)pData;
279 pData[i] = pData[i+6];
280 pData[i+6] = localMACAddr[i];
282 pData[i+22] = localMACAddr[i];
283 pData[i+32] = pData[i+6];
288 pData[
[all...]
/illumos-gate/usr/src/lib/libsqlite/src/
H A Dhash.h85 void *sqliteHashInsert(Hash*, const void *pKey, int nKey, void *pData);
97 ** SomeStructure *pData = sqliteHashData(p);
98 ** // do something with pData
H A Dbtree_rb.c53 * ROLLBACK_INSERT -> Need to insert (pKey, pData) into table iTab.
64 void *pData; member in struct:BtRollbackOp
127 void *pData; member in struct:BtRbNode
742 * and the data is given by (pData,nData). The cursor is used only to
755 void * pData; local
769 pData = sqliteMallocRaw(nData);
771 memcpy(pData, pDataInput, nData);
793 pNode->pData = pData;
846 pOp->pData
[all...]
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dmemcache.c110 typedef int (*PutDataPtr)(void **ppTableData, void *key, void *pData);
113 typedef int (*MiscFuncPtr)(void **ppTableData, void *key, void *pData);
114 typedef void (*ClrTableNodePtr)(void **ppTableData, void *pData);
118 void *pData; member in struct:HashTableNode_struct
224 static int htable_put(HashTable *pTable, void *key, void *pData);
226 static int htable_misc(HashTable *pTable, void *key, void *pData);
228 static int htable_removeall(HashTable *pTable, void *pData);
236 static int msgid_putdata(void **ppTableData, void *key, void *pData);
239 static int msgid_clear_ld_items(void **ppTableData, void *key, void *pData);
240 static void msgid_clearnode(void **ppTableData, void *pData);
[all...]

Completed in 117 milliseconds

123