Searched refs:padded_len (Results 1 - 6 of 6) sorted by relevance
/osnet-11/usr/src/lib/libsoftcrypto/common/ |
H A D | crypt.c | 472 size_t padded_len; local 490 padded_len = in_len + extra; 491 padded = malloc(padded_len); 494 (void) pkcs7_encode(in, in_len, padded, padded_len, 502 padded_len = *out_len; 503 padded = malloc(padded_len); 506 bzero(padded, padded_len); /* out could be NULL */ 527 CRYPTO_SET_RAW_DATA(idata, padded, padded_len); 532 CRYPTO_SET_RAW_DATA(odata, padded, padded_len); 587 if (pkcs7_decode(padded, &padded_len) ! [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAESCrypt.c | 56 kms_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, argument 63 pad_value = pData[padded_len - 1]; 70 for (i = padded_len - pad_value; i < padded_len; i++) 74 *pulDataLen = padded_len - pad_value;
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softCrypt.h | 156 CK_RV soft_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len,
|
H A D | softDecryptUtil.c | 44 soft_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, argument 50 if ((rv = pkcs7_decode(pData, (&padded_len))) != CKR_OK) 52 if ((rv = pkcs7_decode(pData, (size_t *)(&padded_len))) != CKR_OK) 56 *pulDataLen = padded_len;
|
H A D | softKeysUtil.c | 1442 CK_ULONG padded_len = 0; local 1507 padded_len = plain_len; 1541 if ((padded_len % wkey_blksz) != 0) { 1542 padded_len += (wkey_blksz - (plain_len % wkey_blksz)); 1543 if ((padded_data = padded_alloc = malloc(padded_len)) 1548 (void) memset(padded_data, 0x0, padded_len); 1560 rv = soft_encrypt(session_p, padded_data, padded_len, 1566 (void) memset(padded_alloc, 0x0, padded_len);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | loadsave.c | 751 UINT32 padded_len; local 787 padded_len = RSA_BLOCK_SIZE * blocks; 789 cleartxt = (CK_BYTE *)malloc(padded_len); 790 ciphertxt = (CK_BYTE *)malloc(padded_len); 796 ciphertxt_len = padded_len; 806 cleartxt_len, padded_len);
|
Completed in 25 milliseconds