/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDESCrypt.c | 151 * pEncrypted: pointer to the output data after encryption 169 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 230 if (pEncrypted == NULL) { 247 out_buf = pEncrypted; 294 if (pEncrypted == NULL) { 310 (void) memmove(pEncrypted + soft_des_ctx->remain_len, 312 (void) memcpy(pEncrypted, soft_des_ctx->data, 316 in_buf = pEncrypted; 320 out_buf = pEncrypted; 413 * pEncrypted 168 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 433 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument 844 CK_BYTE *pEncrypted = NULL; local 1001 CK_BYTE *pEncrypted = NULL; local [all...] |
H A D | softBlowfishCrypt.c | 116 * pEncrypted: pointer to the output data after encryption 134 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 166 if (pEncrypted == NULL) { 178 out_buf = pEncrypted; 195 if (pEncrypted != NULL) { 224 if (pEncrypted == NULL) { 240 (void) memmove(pEncrypted + 243 (void) memcpy(pEncrypted, soft_blowfish_ctx->data, 248 in_buf = pEncrypted; 252 out_buf = pEncrypted; 133 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 311 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softCrypt.h | 91 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 95 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, 115 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 119 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, 133 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 137 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
|
H A D | softRawDataCrypt.c | 140 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen) \ 165 if (pEncrypted == NULL) { \ 177 out_buf = pEncrypted; \ 270 CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, \ 279 CK_BYTE *out_buf = pEncrypted; \ 304 if (pEncrypted != NULL) { \ 334 if (pEncrypted == NULL) { \ 351 (void) memmove(pEncrypted + \ 354 (void) memcpy(pEncrypted, soft_alg_ctx->data, \ 359 in_buf = pEncrypted; \ [all...] |
H A D | softAESCrypt.c | 157 * pEncrypted: pointer to the output data after encryption 175 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 236 if (pEncrypted == NULL) { 253 out_buf = pEncrypted; 273 if (pEncrypted != NULL) { 301 if (pEncrypted == NULL) { 317 (void) memmove(pEncrypted + soft_aes_ctx->remain_len, 319 (void) memcpy(pEncrypted, soft_aes_ctx->data, 323 in_buf = pEncrypted; 327 out_buf = pEncrypted; 174 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 546 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softRSA.h | 62 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 66 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
|
H A D | softDecryptUtil.c | 448 * pEncrypted: pointer to the encrypted data as input 463 soft_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument 486 return (soft_des_decrypt_common(session_p, pEncrypted, 501 return (soft_aes_decrypt_common(session_p, pEncrypted, 511 return (soft_blowfish_decrypt_common(session_p, pEncrypted, 522 return (soft_arcfour_crypt(&(session_p->decrypt), pEncrypted, 528 return (soft_rsa_decrypt_common(session_p, pEncrypted,
|
H A D | softEncryptUtil.c | 470 * pEncrypted: pointer to the output data after encryption 484 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 507 ulDataLen, pEncrypted, pulEncryptedLen, update)); 522 ulDataLen, pEncrypted, pulEncryptedLen, update)); 532 ulDataLen, pEncrypted, pulEncryptedLen, update)); 542 ulDataLen, pEncrypted, pulEncryptedLen)); 548 ulDataLen, pEncrypted, pulEncryptedLen, mechanism)); 483 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
|
H A D | softRSA.c | 239 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 256 if (pEncrypted == NULL) { 311 (void) memcpy(pEncrypted, cipher_data, modulus_len); 327 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument 367 rv = soft_rsa_decrypt(key, pEncrypted, modulus_len, plain_data); 238 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAESCrypt.c | 177 * pEncrypted: pointer to the output data after encryption 195 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 256 if (pEncrypted == NULL) { 273 out_buf = pEncrypted; 293 if (pEncrypted != NULL) { 321 if (pEncrypted == NULL) { 337 (void) memmove(pEncrypted + kms_aes_ctx->remain_len, 339 (void) memcpy(pEncrypted, kms_aes_ctx->data, 343 in_buf = pEncrypted; 347 out_buf = pEncrypted; 194 kms_aes_encrypt_common(kms_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 476 kms_aes_decrypt_common(kms_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |