/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDualCrypt.c | 36 C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 47 rv = C_EncryptUpdate(hSession, pPart, ulPartLen, 60 return (C_DigestUpdate(hSession, pPart, ulPartLen)); 66 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 76 pPart, pulPartLen); 85 if (pPart == NULL) 88 return (C_DigestUpdate(hSession, pPart, *pulPartLen)); 93 C_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 104 rv = C_EncryptUpdate(hSession, pPart, ulPartLen, 117 return (C_SignUpdate(hSession, pPart, ulPartLe 65 C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument 122 C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument [all...] |
H A D | softDigestUtil.c | 349 * pPart: pointer to the input data to be digested 361 soft_digest_update(soft_session_t *session_p, CK_BYTE_PTR pPart, argument 371 pPart, (uint_t)ulPartLen); 374 pPart, ulPartLen); 382 pPart, (uint32_t)ulPartLen); 385 pPart, ulPartLen); 393 pPart, ulPartLen);
|
H A D | softMAC.h | 107 #define SOFT_MAC_UPDATE(HASH, mac_ctx, pPart, PartLen) \ 108 HASH##Update(&((mac_ctx)->hc_icontext), pPart, PartLen);
|
H A D | softVerifyUtil.c | 247 * pPart: pointer to the input data 256 soft_verify_update(soft_session_t *session_p, CK_BYTE_PTR pPart, argument 276 return (soft_hmac_sign_verify_update(session_p, pPart, 282 return (soft_des_mac_sign_verify_update(session_p, pPart, 299 return (soft_digest_update(session_p, pPart, ulPartLen));
|
H A D | softSignUtil.c | 236 * pPart: pointer to the input data to be signed 245 soft_sign_update(soft_session_t *session_p, CK_BYTE_PTR pPart, argument 265 return (soft_hmac_sign_verify_update(session_p, pPart, 271 return (soft_des_mac_sign_verify_update(session_p, pPart, 288 return (soft_digest_update(session_p, pPart, ulPartLen));
|
H A D | softDigest.c | 203 C_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 222 if (pPart == NULL) { 249 rv = soft_digest_update(session_p, pPart, ulPartLen);
|
H A D | softEncrypt.c | 192 C_EncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 215 if (pPart == NULL) { 248 rv = soft_encrypt_update(session_p, pPart, ulPartLen,
|
H A D | softSign.c | 175 C_SignUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 196 if (pPart == NULL) { 218 rv = soft_sign_update(session_p, pPart, ulPartLen);
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaDualCrypt.c | 58 meta_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 73 CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 84 meta_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 99 CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 71 meta_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument 97 meta_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument
|
H A D | pkcs11DualCrypt.c | 42 C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 51 return (fast_funcs->C_DigestEncryptUpdate(hSession, pPart, 68 C_DigestEncryptUpdate(sessp->se_handle, pPart, ulPartLen, 89 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 97 pEncryptedPart, ulEncryptedPartLen, pPart, 115 ulEncryptedPartLen, pPart, pulPartLen); 133 C_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 142 return (fast_funcs->C_SignEncryptUpdate(hSession, pPart, 159 C_SignEncryptUpdate(sessp->se_handle, pPart, ulPartLen, 179 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PT 88 C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument 178 C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument [all...] |
H A D | metaDigest.c | 94 meta_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 101 if (pPart == NULL) 109 pPart, ulPartLen, NULL, NULL);
|
H A D | pkcs11Digest.c | 136 C_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 144 return (fast_funcs->C_DigestUpdate(hSession, pPart, 161 pPart, ulPartLen);
|
H A D | pkcs11Crypt.c | 140 CK_BYTE_PTR pPart, 150 return (fast_funcs->C_EncryptUpdate(hSession, pPart, ulPartLen, 167 pPart, ulPartLen, pEncryptedPart, pulEncryptedPartLen); 325 CK_BYTE_PTR pPart, 334 ulEncryptedPartLen, pPart, pulPartLen)); 350 pEncryptedPart, ulEncryptedPartLen, pPart, pulPartLen); 139 C_EncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen) argument 322 C_DecryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument
|
H A D | metaCrypt.c | 107 CK_BYTE_PTR pPart, CK_ULONG ulPartLen, 117 if (pPart == NULL || pulEncryptedPartLen == NULL) { 124 pPart, ulPartLen, pEncryptedPart, pulEncryptedPartLen); 234 CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 250 pEncryptedPart, ulEncryptedPartLen, pPart, pulPartLen); 106 meta_EncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen) argument 232 meta_DecryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument
|
H A D | metaSign.c | 107 CK_BYTE_PTR pPart, CK_ULONG ulPartLen) 116 if (pPart == NULL) { 123 pPart, ulPartLen, NULL, NULL); 106 meta_SignUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen) argument
|
H A D | metaVerify.c | 106 meta_VerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 116 if (pPart == NULL) { 123 pPart, ulPartLen, NULL, NULL);
|
H A D | pkcs11Sign.c | 139 C_SignUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen) argument 146 return (fast_funcs->C_SignUpdate(hSession, pPart, ulPartLen)); 161 rv = FUNCLIST(sessp->se_slotid)->C_SignUpdate(sessp->se_handle, pPart,
|
H A D | pkcs11Verify.c | 136 C_VerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 144 return (fast_funcs->C_VerifyUpdate(hSession, pPart, 161 pPart, ulPartLen);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDualCrypt.c | 34 C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 47 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 57 C_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 70 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) 46 C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument 69 C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument
|
H A D | kernelEmulate.c | 135 #define DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag) \ 137 rv = do_soft_digest(get_spp(opp), NULL, pPart, \ 140 rv = do_soft_hmac_update(get_spp(opp), pPart, \ 151 emulate_update(kernel_session_t *session_p, CK_BYTE_PTR pPart, argument 176 DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag); 220 DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag); 227 bcopy(pPart, bufp->buf + bufp->indata_len, ulPartLen);
|
H A D | kernelDigest.c | 295 C_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 316 if (pPart == NULL) { 345 rv = emulate_update(session_p, pPart, ulPartLen, OP_DIGEST); 353 digest_update.du_databuf = (char *)pPart; 405 CK_BYTE_PTR pPart; local 496 pPart = (CK_BYTE_PTR) OBJ_SEC_VALUE(key_p); 497 if (pPart == NULL) { 507 rv = emulate_update(session_p, pPart, 515 digest_update.du_databuf = (char *)pPart;
|
H A D | kernelEmulate.h | 68 CK_RV emulate_update(kernel_session_t *session_p, CK_BYTE_PTR pPart,
|
H A D | kernelDecrypt.c | 326 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, 352 * No need to check if pPart is NULL because application 380 decrypt_update.du_databuf = (char *)pPart; 386 ((inplace && (pPart != NULL)) || (pPart == pEncryptedPart)) && 325 C_DecryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) argument
|
H A D | kernelEncrypt.c | 294 C_EncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, argument 314 if (pPart == NULL) { 349 encrypt_update.eu_databuf = (char *)pPart; 356 (pPart == pEncryptedPart)) &&
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 402 CK_BYTE_PTR pPart, /* the plaintext data */ 454 CK_BYTE_PTR pPart, /* gets plaintext */ 504 CK_BYTE_PTR pPart, /* data to be digested */ 573 CK_BYTE_PTR pPart, /* the data to sign */ 655 CK_BYTE_PTR pPart, /* signed data */ 708 CK_BYTE_PTR pPart, /* the plaintext data */ 724 CK_BYTE_PTR pPart, /* gets plaintext */ 736 CK_BYTE_PTR pPart, /* the plaintext data */ 752 CK_BYTE_PTR pPart, /* gets plaintext */
|