/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDESCrypt.c | 159 * pEncrypted: pointer to the output data after encryption 177 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 237 if (pEncrypted == NULL) { 254 out_buf = pEncrypted; 301 if (pEncrypted == NULL) { 317 (void) memmove(pEncrypted + soft_des_ctx->remain_len, 319 (void) memcpy(pEncrypted, soft_des_ctx->data, 323 in_buf = pEncrypted; 327 out_buf = pEncrypted; 471 * pEncrypted 176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 491 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument 921 CK_BYTE *pEncrypted = NULL; local 1077 CK_BYTE *pEncrypted = NULL; local [all...] |
H A D | softBlowfishCrypt.c | 124 * pEncrypted: pointer to the output data after encryption 142 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 173 if (pEncrypted == NULL) { 185 out_buf = pEncrypted; 202 if (pEncrypted != NULL) { 231 if (pEncrypted == NULL) { 247 (void) memmove(pEncrypted + 250 (void) memcpy(pEncrypted, soft_blowfish_ctx->data, 255 in_buf = pEncrypted; 259 out_buf = pEncrypted; 141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 317 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softAESCrypt.c | 137 * pEncrypted: pointer to the output data after encryption 155 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 216 if (pEncrypted == NULL) { 233 out_buf = pEncrypted; 253 if (pEncrypted != NULL) { 281 if (pEncrypted == NULL) { 297 (void) memmove(pEncrypted + soft_aes_ctx->remain_len, 299 (void) memcpy(pEncrypted, soft_aes_ctx->data, 303 in_buf = pEncrypted; 307 out_buf = pEncrypted; 154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 492 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softDecryptUtil.c | 337 * pEncrypted: pointer to the encrypted data as input 352 soft_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument 375 return (soft_des_decrypt_common(session_p, pEncrypted, 390 return (soft_aes_decrypt_common(session_p, pEncrypted, 400 return (soft_blowfish_decrypt_common(session_p, pEncrypted, 411 return (soft_arcfour_crypt(&(session_p->decrypt), pEncrypted, 417 return (soft_rsa_decrypt_common(session_p, pEncrypted,
|
H A D | softEncryptUtil.c | 358 * pEncrypted: pointer to the output data after encryption 372 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 395 ulDataLen, pEncrypted, pulEncryptedLen, update)); 410 ulDataLen, pEncrypted, pulEncryptedLen, update)); 420 ulDataLen, pEncrypted, pulEncryptedLen, update)); 430 ulDataLen, pEncrypted, pulEncryptedLen)); 436 ulDataLen, pEncrypted, pulEncryptedLen, mechanism)); 371 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
|
H A D | softRSA.c | 241 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 258 if (pEncrypted == NULL) { 313 (void) memcpy(pEncrypted, cipher_data, modulus_len); 330 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument 370 rv = soft_rsa_decrypt(key, pEncrypted, modulus_len, plain_data); 240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
|