Searched refs:pEncrypted (Results 1 - 10 of 10) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDESCrypt.c151 * pEncrypted: pointer to the output data after encryption
169 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
230 if (pEncrypted == NULL) {
247 out_buf = pEncrypted;
294 if (pEncrypted == NULL) {
310 (void) memmove(pEncrypted + soft_des_ctx->remain_len,
312 (void) memcpy(pEncrypted, soft_des_ctx->data,
316 in_buf = pEncrypted;
320 out_buf = pEncrypted;
413 * pEncrypted
168 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
433 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
844 CK_BYTE *pEncrypted = NULL; local
1001 CK_BYTE *pEncrypted = NULL; local
[all...]
H A DsoftBlowfishCrypt.c116 * pEncrypted: pointer to the output data after encryption
134 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
166 if (pEncrypted == NULL) {
178 out_buf = pEncrypted;
195 if (pEncrypted != NULL) {
224 if (pEncrypted == NULL) {
240 (void) memmove(pEncrypted +
243 (void) memcpy(pEncrypted, soft_blowfish_ctx->data,
248 in_buf = pEncrypted;
252 out_buf = pEncrypted;
133 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
311 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftCrypt.h91 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
95 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
115 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
119 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
133 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
137 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
H A DsoftRawDataCrypt.c140 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen) \
165 if (pEncrypted == NULL) { \
177 out_buf = pEncrypted; \
270 CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, \
279 CK_BYTE *out_buf = pEncrypted; \
304 if (pEncrypted != NULL) { \
334 if (pEncrypted == NULL) { \
351 (void) memmove(pEncrypted + \
354 (void) memcpy(pEncrypted, soft_alg_ctx->data, \
359 in_buf = pEncrypted; \
[all...]
H A DsoftAESCrypt.c157 * pEncrypted: pointer to the output data after encryption
175 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
236 if (pEncrypted == NULL) {
253 out_buf = pEncrypted;
273 if (pEncrypted != NULL) {
301 if (pEncrypted == NULL) {
317 (void) memmove(pEncrypted + soft_aes_ctx->remain_len,
319 (void) memcpy(pEncrypted, soft_aes_ctx->data,
323 in_buf = pEncrypted;
327 out_buf = pEncrypted;
174 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
546 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftRSA.h62 CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
66 CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen,
H A DsoftDecryptUtil.c448 * pEncrypted: pointer to the encrypted data as input
463 soft_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument
486 return (soft_des_decrypt_common(session_p, pEncrypted,
501 return (soft_aes_decrypt_common(session_p, pEncrypted,
511 return (soft_blowfish_decrypt_common(session_p, pEncrypted,
522 return (soft_arcfour_crypt(&(session_p->decrypt), pEncrypted,
528 return (soft_rsa_decrypt_common(session_p, pEncrypted,
H A DsoftEncryptUtil.c470 * pEncrypted: pointer to the output data after encryption
484 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
507 ulDataLen, pEncrypted, pulEncryptedLen, update));
522 ulDataLen, pEncrypted, pulEncryptedLen, update));
532 ulDataLen, pEncrypted, pulEncryptedLen, update));
542 ulDataLen, pEncrypted, pulEncryptedLen));
548 ulDataLen, pEncrypted, pulEncryptedLen, mechanism));
483 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
H A DsoftRSA.c239 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
256 if (pEncrypted == NULL) {
311 (void) memcpy(pEncrypted, cipher_data, modulus_len);
327 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, argument
367 rv = soft_rsa_decrypt(key, pEncrypted, modulus_len, plain_data);
238 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsAESCrypt.c177 * pEncrypted: pointer to the output data after encryption
195 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
256 if (pEncrypted == NULL) {
273 out_buf = pEncrypted;
293 if (pEncrypted != NULL) {
321 if (pEncrypted == NULL) {
337 (void) memmove(pEncrypted + kms_aes_ctx->remain_len,
339 (void) memcpy(pEncrypted, kms_aes_ctx->data,
343 in_buf = pEncrypted;
347 out_buf = pEncrypted;
194 kms_aes_encrypt_common(kms_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
476 kms_aes_decrypt_common(kms_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]

Completed in 49 milliseconds