/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | decr_mgr.c | 161 CK_BBOOL length_only, 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { 182 return (rsa_pkcs_decrypt(sess, length_only, 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 160 CK_BBOOL length_only, 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { 181 return (rsa_pkcs_encrypt(sess, length_only, 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | dig_mgr.c | 373 CK_BBOOL length_only, 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { 397 if (!length_only && *out_data_len < SHA1_DIGEST_LENGTH) 399 return (sha1_hash(sess, length_only, ctx, 403 if (!length_only && *out_data_len < MD5_DIGEST_LENGTH) 405 return (md5_hash(sess, length_only, ctx, 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | mech_md5.c | 298 CK_BBOOL length_only, 310 if (length_only == TRUE) { 322 CK_BBOOL length_only, 357 if (length_only == TRUE) { 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | mech_sha.c | 31 CK_BBOOL length_only, 42 if (length_only == TRUE) { 57 CK_BBOOL length_only, 90 if (length_only == TRUE) { 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | sign_mgr.c | 251 CK_BBOOL length_only, 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { 279 return (rsa_pkcs_sign(sess, length_only, ctx, 284 return (rsa_hash_pkcs_sign(sess, length_only, ctx, 290 return (md5_hmac_sign(sess, length_only, ctx, 295 return (sha1_hmac_sign(sess, length_only, ctx, 333 CK_BBOOL length_only, 350 return (rsa_hash_pkcs_sign_final(sess, length_only, 359 CK_BBOOL length_only, 379 if ((length_only 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 336 CK_BBOOL length_only, 362 return (rsa_pkcs_verify_recover(sess, length_only, 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
|
H A D | asn1.c | 296 ber_encode_INTEGER(CK_BBOOL length_only, argument 325 if (length_only == TRUE) { 446 ber_encode_OCTET_STRING(CK_BBOOL length_only, argument 472 if (length_only == TRUE) { 598 ber_encode_SEQUENCE(CK_BBOOL length_only, argument 618 if (length_only == TRUE) { 751 ber_encode_PrivateKeyInfo(CK_BBOOL length_only, argument 788 if (length_only == TRUE) { 883 ber_encode_RSAPrivateKey(CK_BBOOL length_only, argument 935 if (length_only [all...] |
H A D | key_mgr.c | 233 CK_BBOOL length_only, 300 rc = rsa_priv_wrap_get_data(key2_obj->template, length_only, 309 length_only, &data, &data_len); 336 rc = encr_mgr_encrypt(sess, length_only, 232 key_mgr_wrap_key(SESSION * sess, CK_BBOOL length_only, CK_MECHANISM * mech, CK_OBJECT_HANDLE h_wrapping_key, CK_OBJECT_HANDLE h_key, CK_BYTE * wrapped_key, CK_ULONG * wrapped_key_len) argument
|
H A D | mech_rsa.c | 176 CK_BBOOL length_only, 201 if (length_only == TRUE) { 219 CK_BBOOL length_only, 246 if (length_only == TRUE) { 263 CK_BBOOL length_only, 290 if (length_only == TRUE) { 346 CK_BBOOL length_only, 376 if (length_only == TRUE) { 389 CK_BBOOL length_only, 436 rc = digest_mgr_digest(sess, length_only, 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument [all...] |
H A D | sess_mgr.c | 765 CK_BBOOL length_only, 789 if (length_only == FALSE) { 830 if (length_only == FALSE) { 871 if (length_only == FALSE) { 911 if (length_only == FALSE) { 951 if (length_only == FALSE) { 764 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument
|
H A D | key.c | 1431 CK_BBOOL length_only, 1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len, 1637 CK_BBOOL length_only, 1655 if (length_only == FALSE) { 1430 rsa_priv_wrap_get_data(TEMPLATE *tmpl, CK_BBOOL length_only, CK_BYTE **data, CK_ULONG *data_len) argument 1636 generic_secret_wrap_get_data(TEMPLATE * tmpl, CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len) argument
|
H A D | new_host.c | 680 CK_BBOOL length_only = FALSE; local 695 length_only = TRUE; 703 rc = session_mgr_get_op_state(sess, length_only, 1232 CK_BBOOL length_only = FALSE; local 1257 length_only = TRUE; 1259 rc = encr_mgr_encrypt(sess, length_only, 1264 if (rc != CKR_BUFFER_TOO_SMALL && (rc != CKR_OK || length_only != TRUE)) 1279 CK_BBOOL length_only = FALSE; 1305 length_only = TRUE; 1307 rc = encr_mgr_encrypt_update(sess, length_only, 1415 CK_BBOOL length_only = FALSE; local 1505 CK_BBOOL length_only = FALSE; local 1624 CK_BBOOL length_only = FALSE; local 1713 CK_BBOOL length_only = FALSE; local 1796 CK_BBOOL length_only = FALSE; local 1884 CK_BBOOL length_only = FALSE; local 2132 CK_BBOOL length_only = FALSE; local 2226 CK_BBOOL length_only = FALSE; local [all...] |