/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 119 * ulDataLen: length of the input data 130 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 157 ulDataLen, hmac, pulSignatureLen, B_TRUE); 161 ulDataLen, pSignature, pulSignatureLen, B_TRUE); 177 ulDataLen, signature, pulSignatureLen, B_TRUE, 182 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); 193 return (soft_rsa_sign_common(session_p, pData, ulDataLen, 202 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen, 207 return (soft_dsa_sign(session_p, pData, ulDataLen, 212 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen, 129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 416 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | softVerifyUtil.c | 120 * ulDataLen: length of the input data 131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 161 ulDataLen, hmac, &len, B_FALSE); 187 ulDataLen, signature, &len, B_FALSE, B_FALSE); 204 return (soft_rsa_verify_common(session_p, pData, ulDataLen, 214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 218 return (soft_dsa_verify(session_p, pData, ulDataLen, 224 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 228 return (soft_ecc_verify(session_p, pData, ulDataLen, 234 ulDataLen, pSignatur 130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument [all...] |
H A D | softDESCrypt.c | 158 * ulDataLen: length of the input data 177 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 204 if ((ulDataLen % DES_BLOCK_LEN) != 0) { 224 (ulDataLen / DES_BLOCK_LEN + 1); 230 out_len = ulDataLen; 262 total_len = soft_des_ctx->remain_len + ulDataLen; 279 soft_des_ctx->remain_len, pData, ulDataLen); 280 soft_des_ctx->remain_len += ulDataLen; 364 (ulDataLen - remain), remain); 400 (ulDataLen 176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 914 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument [all...] |
H A D | softDigestUtil.c | 152 * ulDataLen: length of the input data 169 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) 226 * the pData is NULL, and the ulDataLen is zero. 238 pData, (uint_t)ulDataLen); 241 pData, ulDataLen); 262 pData, (uint32_t)ulDataLen); 265 pData, ulDataLen); 287 pData, ulDataLen); 324 * ulDataLen: length of the input data 335 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument [all...] |
H A D | softRSA.c | 241 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 273 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { 280 if (ulDataLen > (CK_ULONG)modulus_len) { 299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data, 306 (void) memset(plain_data, 0x0, modulus_len - ulDataLen); 307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, 308 ulDataLen); 524 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 556 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { 566 if (ulDataLen > (CK_ULON 240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument 523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism) argument 640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 971 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1087 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument [all...] |
H A D | softBlowfishCrypt.c | 123 * ulDataLen: length of the input data 142 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 163 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) { 168 out_len = ulDataLen; 193 total_len = soft_blowfish_ctx->remain_len + ulDataLen; 209 ulDataLen); 210 soft_blowfish_ctx->remain_len += ulDataLen; 286 (ulDataLen - remain), remain); 141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
|
H A D | softAESCrypt.c | 136 * ulDataLen: length of the input data 155 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 183 if ((ulDataLen % AES_BLOCK_LEN) != 0) { 203 (ulDataLen / AES_BLOCK_LEN + 1); 209 out_len = ulDataLen; 241 total_len = soft_aes_ctx->remain_len + ulDataLen; 259 soft_aes_ctx->remain_len, pData, ulDataLen); 260 soft_aes_ctx->remain_len += ulDataLen; 338 (ulDataLen - remain), remain); 373 (ulDataLen 154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument [all...] |
H A D | softDSA.c | 220 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); 276 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 297 if (ulDataLen != DSA_SUBPRIME_BYTES) { 307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned); 325 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 339 if (ulDataLen != DSA_SUBPRIME_BYTES) { 365 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); 219 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument 275 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument 324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 364 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument
|
H A D | softEncryptUtil.c | 357 * ulDataLen: length of the input data 372 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 385 if (ulDataLen == 0) { 395 ulDataLen, pEncrypted, pulEncryptedLen, update)); 401 if (ulDataLen == 0) { 410 ulDataLen, pEncrypted, pulEncryptedLen, update)); 414 if (ulDataLen == 0) { 420 ulDataLen, pEncrypted, pulEncryptedLen, update)); 424 if (ulDataLen == 0) { 430 ulDataLen, pEncrypte 371 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 462 soft_encrypt(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument [all...] |
H A D | softSign.c | 104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 152 rv = soft_sign(session_p, pData, ulDataLen, pSignature, 362 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, 361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | softEC.c | 425 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 436 rv = soft_digest(session_p, pData, ulDataLen, hash, 464 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 482 if (ulDataLen > EC_MAX_DIGEST_LEN) { 503 digest_item.len = ulDataLen; 530 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 552 if (ulDataLen > EC_MAX_DIGEST_LEN) { 575 digest_item.len = ulDataLen; 595 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 605 rv = soft_digest(session_p, pData, ulDataLen, has 424 soft_ecc_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument 463 soft_ecc_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument 529 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 594 soft_ecc_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument [all...] |
H A D | softCrypt.h | 88 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen,
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Sign.c | 97 CK_ULONG ulDataLen, 106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, 123 ulDataLen, pSignature, pulSignatureLen); 275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, 298 ulDataLen, pSignature, pulSignatureLen); 95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Digest.c | 94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen, 120 ulDataLen, pDigest, pulDigestLen);
|
H A D | metaSign.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 93 pData, ulDataLen, pSignature, pulSignatureLen); 200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 216 pData, ulDataLen, pSignature, pulSignatureLen); 75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Verify.c | 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, 120 ulDataLen, pSignature, ulSignatureLen);
|
H A D | metaDigest.c | 66 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 81 pData, ulDataLen, pDigest, pulDigestLen);
|
H A D | metaVerify.c | 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 93 pData, ulDataLen, pSignature, &ulSignatureLen);
|
H A D | pkcs11Crypt.c | 98 CK_ULONG ulDataLen, 107 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen, 124 ulDataLen, pEncryptedData, pulEncryptedDataLen); 96 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
|
H A D | metaCrypt.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 93 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen); 75 meta_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 47 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, 82 rv = soft_digest(session_p, pData, ulDataLen, 86 rv = soft_digest_update(session_p, pData, ulDataLen); 148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument 158 pData, ulDataLen, opflag & OP_SIGN)); 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 209 ulDataLen, hmac, &len, B_FALSE); 46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, int opflag) argument
|
H A D | kernelEncrypt.c | 167 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 236 if (ulDataLen < *pulEncryptedDataLen && inplace) { 237 encrypt.ce_encrlen = ulDataLen; 244 encrypt.ce_datalen = ulDataLen;
|
H A D | kernelDigest.c | 141 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 211 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || 212 (ulDataLen > SLOT_HASH_MAX_INDATA_LEN(session_p))) { 218 pData, ulDataLen, pDigest, pulDigestLen, 238 digest.cd_datalen = ulDataLen;
|
H A D | kernelSign.c | 175 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 223 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || 224 (ulDataLen > SLOT_HMAC_MAX_INDATA_LEN(session_p))) { 230 pData, ulDataLen, 242 sign.cs_datalen = ulDataLen; 606 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 641 sign_recover.sr_datalen = ulDataLen; 605 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 389 CK_ULONG ulDataLen, /* bytes of plaintext */ 491 CK_ULONG ulDataLen, /* bytes of data to digest */ 559 CK_ULONG ulDataLen, /* count of bytes to sign */ 610 CK_ULONG ulDataLen, /* count of bytes to sign */ 641 CK_ULONG ulDataLen, /* length of signed data */
|