Searched refs:ulDataLen (Results 1 - 25 of 45) sorted by relevance

12

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDSA.h57 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
61 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
65 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
69 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
H A DsoftEC.h55 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
59 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
63 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
68 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
H A DsoftRSA.h61 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
74 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
79 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
84 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
89 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
H A DsoftVerifyUtil.c121 * ulDataLen: length of the input data
132 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
139 if (ulDataLen == 0) {
170 ulDataLen, hmac, &len, B_FALSE);
196 ulDataLen, signature, &len, B_FALSE, B_FALSE);
213 return (soft_rsa_verify_common(session_p, pData, ulDataLen,
224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
228 return (soft_dsa_verify(session_p, pData, ulDataLen,
234 ulDataLen, pSignature, ulSignatureLen, B_FALSE));
238 return (soft_ecc_verify(session_p, pData, ulDataLen,
131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
[all...]
H A DsoftSignUtil.c120 * ulDataLen: length of the input data
131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
160 ulDataLen, hmac, pulSignatureLen, B_TRUE);
164 ulDataLen, pSignature, pulSignatureLen, B_TRUE);
180 ulDataLen, signature, pulSignatureLen, B_TRUE,
185 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE);
196 return (soft_rsa_sign_common(session_p, pData, ulDataLen,
206 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen,
211 return (soft_dsa_sign(session_p, pData, ulDataLen,
216 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen,
130 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
426 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
[all...]
H A DsoftCrypt.h90 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
114 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
132 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
145 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
H A DsoftDESCrypt.c150 * ulDataLen: length of the input data
169 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
197 if ((ulDataLen % DES_BLOCK_LEN) != 0) {
217 (ulDataLen / DES_BLOCK_LEN + 1);
223 out_len = ulDataLen;
255 total_len = soft_des_ctx->remain_len + ulDataLen;
272 soft_des_ctx->remain_len, pData, ulDataLen);
273 soft_des_ctx->remain_len += ulDataLen;
344 (ulDataLen - remain), remain);
355 ulDataLen
168 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
837 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument
[all...]
H A DsoftDigestUtil.c152 * ulDataLen: length of the input data
169 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
230 * the pData is NULL, and the ulDataLen is zero.
242 pData, (uint_t)ulDataLen);
245 pData, ulDataLen);
266 pData, (uint32_t)ulDataLen);
269 pData, ulDataLen);
292 pData, ulDataLen);
329 * ulDataLen: length of the input data
340 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument
[all...]
H A DsoftRSA.c239 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
271 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) {
278 if (ulDataLen > (CK_ULONG)modulus_len) {
297 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data,
304 (void) memset(plain_data, 0x0, modulus_len - ulDataLen);
305 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData,
306 ulDataLen);
524 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
556 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) {
566 if (ulDataLen > (CK_ULON
238 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument
523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism) argument
641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
974 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
1096 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument
[all...]
H A DsoftAESCrypt.c156 * ulDataLen: length of the input data
175 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
203 if ((ulDataLen % AES_BLOCK_LEN) != 0) {
223 (ulDataLen / AES_BLOCK_LEN + 1);
229 out_len = ulDataLen;
261 total_len = soft_aes_ctx->remain_len + ulDataLen;
279 soft_aes_ctx->remain_len, pData, ulDataLen);
280 soft_aes_ctx->remain_len += ulDataLen;
395 (ulDataLen - remain), remain);
432 (ulDataLen
174 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
[all...]
H A DsoftDSA.c225 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
254 if ((ulDataLen != qlen) ||
255 ((ulDataLen != MIN_DSA_SUBPRIME_BYTES) &&
256 (ulDataLen != MID_DSA_SUBPRIME_BYTES) &&
257 (ulDataLen != MAX_DSA_SUBPRIME_BYTES))) {
273 rv = local_dsa_sign(key, q, qlen, pData, ulDataLen, pSigned);
298 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned,
336 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
368 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
382 if ((ulDataLen !
224 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument
297 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument
367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
412 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument
[all...]
H A DsoftBlowfishCrypt.c115 * ulDataLen: length of the input data
134 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen,
156 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) {
161 out_len = ulDataLen;
186 total_len = soft_blowfish_ctx->remain_len + ulDataLen;
202 ulDataLen);
203 soft_blowfish_ctx->remain_len += ulDataLen;
279 (ulDataLen - remain), remain);
133 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
H A DsoftEncryptUtil.c469 * ulDataLen: length of the input data
484 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
497 if (ulDataLen == 0) {
507 ulDataLen, pEncrypted, pulEncryptedLen, update));
513 if (ulDataLen == 0) {
522 ulDataLen, pEncrypted, pulEncryptedLen, update));
526 if (ulDataLen == 0) {
532 ulDataLen, pEncrypted, pulEncryptedLen, update));
536 if (ulDataLen == 0) {
542 ulDataLen, pEncrypte
483 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
574 soft_encrypt(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument
[all...]
H A DsoftRawDataCrypt.c140 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen) \
152 if (ulDataLen == 0) { \
157 SOFT_##mode##_DATASZ_CHECK(ulDataLen, blocksz, B_TRUE) \
159 out_len = ulDataLen; \
270 CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, \
280 CK_ULONG out_len = ulDataLen; \
285 if (ulDataLen == 0) { \
295 total_len = soft_alg_ctx->remain_len + ulDataLen; \
311 ulDataLen); \
312 soft_alg_ctx->remain_len += ulDataLen; \
[all...]
H A DsoftSign.c103 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
151 rv = soft_sign(session_p, pData, ulDataLen, pSignature,
361 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
393 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature,
360 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsSign.c40 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
86 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
85 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DkmsDigest.c39 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
H A DkmsVerify.c40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
H A DkmsAESCrypt.c176 * ulDataLen: length of the input data
195 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted,
223 if ((ulDataLen % AES_BLOCK_LEN) != 0) {
243 (ulDataLen / AES_BLOCK_LEN + 1);
249 out_len = ulDataLen;
281 total_len = kms_aes_ctx->remain_len + ulDataLen;
299 kms_aes_ctx->remain_len, pData, ulDataLen);
300 kms_aes_ctx->remain_len += ulDataLen;
382 (ulDataLen - remain), remain);
393 ulDataLen
194 kms_aes_encrypt_common(kms_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Sign.c97 CK_ULONG ulDataLen,
106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen,
123 ulDataLen, pSignature, pulSignatureLen);
275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen,
298 ulDataLen, pSignature, pulSignatureLen);
95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Digest.c94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen,
120 ulDataLen, pDigest, pulDigestLen);
H A DmetaSign.c76 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
93 pData, ulDataLen, pSignature, pulSignatureLen);
200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
216 pData, ulDataLen, pSignature, pulSignatureLen);
75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Verify.c95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen,
120 ulDataLen, pSignature, ulSignatureLen);
H A DmetaDigest.c63 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
78 pData, ulDataLen, pDigest, pulDigestLen);
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c47 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen,
82 rv = soft_digest(session_p, pData, ulDataLen,
86 rv = soft_digest_update(session_p, pData, ulDataLen);
148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument
158 pData, ulDataLen, opflag & OP_SIGN));
165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen,
191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
209 ulDataLen, hmac, &len, B_FALSE);
46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, int opflag) argument

Completed in 63 milliseconds

12