/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDSA.h | 57 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 61 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 65 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 69 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
|
H A D | softEC.h | 55 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 59 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 63 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 68 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
|
H A D | softRSA.h | 61 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 74 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 79 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 84 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 89 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
|
H A D | softVerifyUtil.c | 121 * ulDataLen: length of the input data 132 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 139 if (ulDataLen == 0) { 170 ulDataLen, hmac, &len, B_FALSE); 196 ulDataLen, signature, &len, B_FALSE, B_FALSE); 213 return (soft_rsa_verify_common(session_p, pData, ulDataLen, 224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 228 return (soft_dsa_verify(session_p, pData, ulDataLen, 234 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 238 return (soft_ecc_verify(session_p, pData, ulDataLen, 131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument [all...] |
H A D | softSignUtil.c | 120 * ulDataLen: length of the input data 131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 160 ulDataLen, hmac, pulSignatureLen, B_TRUE); 164 ulDataLen, pSignature, pulSignatureLen, B_TRUE); 180 ulDataLen, signature, pulSignatureLen, B_TRUE, 185 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); 196 return (soft_rsa_sign_common(session_p, pData, ulDataLen, 206 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen, 211 return (soft_dsa_sign(session_p, pData, ulDataLen, 216 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen, 130 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 426 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | softCrypt.h | 90 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 114 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 132 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 145 CK_BYTE_PTR pData, CK_ULONG ulDataLen,
|
H A D | softDESCrypt.c | 150 * ulDataLen: length of the input data 169 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 197 if ((ulDataLen % DES_BLOCK_LEN) != 0) { 217 (ulDataLen / DES_BLOCK_LEN + 1); 223 out_len = ulDataLen; 255 total_len = soft_des_ctx->remain_len + ulDataLen; 272 soft_des_ctx->remain_len, pData, ulDataLen); 273 soft_des_ctx->remain_len += ulDataLen; 344 (ulDataLen - remain), remain); 355 ulDataLen 168 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 837 soft_des_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t sign_op, boolean_t Final) argument [all...] |
H A D | softDigestUtil.c | 152 * ulDataLen: length of the input data 169 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) 230 * the pData is NULL, and the ulDataLen is zero. 242 pData, (uint_t)ulDataLen); 245 pData, ulDataLen); 266 pData, (uint32_t)ulDataLen); 269 pData, ulDataLen); 292 pData, ulDataLen); 329 * ulDataLen: length of the input data 340 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) argument [all...] |
H A D | softRSA.c | 239 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 271 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { 278 if (ulDataLen > (CK_ULONG)modulus_len) { 297 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data, 304 (void) memset(plain_data, 0x0, modulus_len - ulDataLen); 305 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, 306 ulDataLen); 524 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 556 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { 566 if (ulDataLen > (CK_ULON 238 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, CK_MECHANISM_TYPE mechanism) argument 523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism) argument 641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 974 soft_rsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument 1096 soft_rsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, CK_MECHANISM_TYPE mechanism, boolean_t Final) argument [all...] |
H A D | softAESCrypt.c | 156 * ulDataLen: length of the input data 175 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 203 if ((ulDataLen % AES_BLOCK_LEN) != 0) { 223 (ulDataLen / AES_BLOCK_LEN + 1); 229 out_len = ulDataLen; 261 total_len = soft_aes_ctx->remain_len + ulDataLen; 279 soft_aes_ctx->remain_len, pData, ulDataLen); 280 soft_aes_ctx->remain_len += ulDataLen; 395 (ulDataLen - remain), remain); 432 (ulDataLen 174 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument [all...] |
H A D | softDSA.c | 225 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 254 if ((ulDataLen != qlen) || 255 ((ulDataLen != MIN_DSA_SUBPRIME_BYTES) && 256 (ulDataLen != MID_DSA_SUBPRIME_BYTES) && 257 (ulDataLen != MAX_DSA_SUBPRIME_BYTES))) { 273 rv = local_dsa_sign(key, q, qlen, pData, ulDataLen, pSigned); 298 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, 336 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); 368 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 382 if ((ulDataLen ! 224 soft_dsa_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen) argument 297 soft_dsa_digest_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG_PTR pulSignedLen, boolean_t Final) argument 367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 412 soft_dsa_digest_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, CK_ULONG ulSignedLen, boolean_t Final) argument [all...] |
H A D | softBlowfishCrypt.c | 115 * ulDataLen: length of the input data 134 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, 156 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) { 161 out_len = ulDataLen; 186 total_len = soft_blowfish_ctx->remain_len + ulDataLen; 202 ulDataLen); 203 soft_blowfish_ctx->remain_len += ulDataLen; 279 (ulDataLen - remain), remain); 133 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument
|
H A D | softEncryptUtil.c | 469 * ulDataLen: length of the input data 484 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 497 if (ulDataLen == 0) { 507 ulDataLen, pEncrypted, pulEncryptedLen, update)); 513 if (ulDataLen == 0) { 522 ulDataLen, pEncrypted, pulEncryptedLen, update)); 526 if (ulDataLen == 0) { 532 ulDataLen, pEncrypted, pulEncryptedLen, update)); 536 if (ulDataLen == 0) { 542 ulDataLen, pEncrypte 483 soft_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument 574 soft_encrypt(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen) argument [all...] |
H A D | softRawDataCrypt.c | 140 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen) \ 152 if (ulDataLen == 0) { \ 157 SOFT_##mode##_DATASZ_CHECK(ulDataLen, blocksz, B_TRUE) \ 159 out_len = ulDataLen; \ 270 CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, \ 280 CK_ULONG out_len = ulDataLen; \ 285 if (ulDataLen == 0) { \ 295 total_len = soft_alg_ctx->remain_len + ulDataLen; \ 311 ulDataLen); \ 312 soft_alg_ctx->remain_len += ulDataLen; \ [all...] |
H A D | softSign.c | 103 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 151 rv = soft_sign(session_p, pData, ulDataLen, pSignature, 361 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 393 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, 360 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsSign.c | 40 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 86 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 85 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | kmsDigest.c | 39 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
|
H A D | kmsVerify.c | 40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument
|
H A D | kmsAESCrypt.c | 176 * ulDataLen: length of the input data 195 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, 223 if ((ulDataLen % AES_BLOCK_LEN) != 0) { 243 (ulDataLen / AES_BLOCK_LEN + 1); 249 out_len = ulDataLen; 281 total_len = kms_aes_ctx->remain_len + ulDataLen; 299 kms_aes_ctx->remain_len, pData, ulDataLen); 300 kms_aes_ctx->remain_len += ulDataLen; 382 (ulDataLen - remain), remain); 393 ulDataLen 194 kms_aes_encrypt_common(kms_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, boolean_t update) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Sign.c | 97 CK_ULONG ulDataLen, 106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, 123 ulDataLen, pSignature, pulSignatureLen); 275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, 298 ulDataLen, pSignature, pulSignatureLen); 95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Digest.c | 94 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Digest(hSession, pData, ulDataLen, 120 ulDataLen, pDigest, pulDigestLen);
|
H A D | metaSign.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, 93 pData, ulDataLen, pSignature, pulSignatureLen); 200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 216 pData, ulDataLen, pSignature, pulSignatureLen); 75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Verify.c | 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, 120 ulDataLen, pSignature, ulSignatureLen);
|
H A D | metaDigest.c | 63 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 78 pData, ulDataLen, pDigest, pulDigestLen);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 47 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, 82 rv = soft_digest(session_p, pData, ulDataLen, 86 rv = soft_digest_update(session_p, pData, ulDataLen); 148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) argument 158 pData, ulDataLen, opflag & OP_SIGN)); 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, argument 209 ulDataLen, hmac, &len, B_FALSE); 46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, int opflag) argument
|