Searched defs:pulDataLen (Results 1 - 21 of 21) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsVerify.c85 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DkmsDecrypt.c180 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
209 if (pulDataLen == NULL) {
242 ulEncryptedData, pData, pulDataLen, FALSE);
179 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DkmsAESCrypt.c57 CK_ULONG *pulDataLen, int block_size)
74 *pulDataLen = padded_len - pad_value;
459 * pulDataLen: pointer to the length of the output data
478 CK_ULONG_PTR pulDataLen, boolean_t update)
517 *pulDataLen = ulEncryptedLen;
523 if (*pulDataLen < ulEncryptedLen) {
524 *pulDataLen = ulEncryptedLen;
534 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) {
535 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN;
573 *pulDataLen
56 kms_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, CK_ULONG *pulDataLen, int block_size) argument
476 kms_aes_decrypt_common(kms_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaVerify.c205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
214 if (pSignature == NULL || pulDataLen == NULL) {
221 pSignature, ulSignatureLen, pData, pulDataLen);
204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A Dpkcs11Verify.c274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
282 ulSignatureLen, pData, pulDataLen));
298 pSignature, ulSignatureLen, pData, pulDataLen);
273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DmetaCrypt.c203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
212 if (pEncryptedData == NULL || pulDataLen == NULL) {
219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
201 meta_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A Dpkcs11Crypt.c358 CK_ULONG_PTR pulDataLen)
366 ulEncryptedDataLen, pData, pulDataLen));
387 if (pEncryptedData == NULL || pulDataLen == NULL) {
394 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
399 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
354 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerify.c332 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
347 if ((pSignature == NULL) || (pulDataLen == NULL)) {
364 ulSignatureLen, pData, pulDataLen);
331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DsoftDecrypt.c105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
135 if (pulDataLen == NULL) {
172 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen);
175 pData, pulDataLen);
104 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DsoftVerifyUtil.c460 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
471 ulSignatureLen, pData, pulDataLen));
459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DsoftBlowfishCrypt.c312 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen,
345 *pulDataLen = ulEncryptedLen;
350 if (*pulDataLen < ulEncryptedLen) {
351 *pulDataLen = ulEncryptedLen;
376 *pulDataLen = 0;
394 *pulDataLen = out_len;
401 if (*pulDataLen < out_len) {
402 *pulDataLen = out_len;
440 *pulDataLen = out_len;
456 *pulDataLen
311 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftDecryptUtil.c45 CK_ULONG *pulDataLen)
56 *pulDataLen = padded_len;
451 * pulDataLen: pointer to the length of the output data
465 CK_ULONG_PTR pulDataLen, boolean_t Update)
478 *pulDataLen = 0;
487 ulEncryptedLen, pData, pulDataLen, Update));
494 *pulDataLen = 0;
502 ulEncryptedLen, pData, pulDataLen, Update));
507 *pulDataLen = 0;
512 ulEncryptedLen, pData, pulDataLen, Updat
44 soft_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, CK_ULONG *pulDataLen) argument
463 soft_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t Update) argument
556 soft_decrypt(soft_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A DsoftAESCrypt.c529 * pulDataLen: pointer to the length of the output data
548 CK_ULONG_PTR pulDataLen, boolean_t update)
587 *pulDataLen = ulEncryptedLen;
593 if (*pulDataLen < ulEncryptedLen) {
594 *pulDataLen = ulEncryptedLen;
604 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) {
605 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN;
643 *pulDataLen = 0;
674 *pulDataLen = out_len;
681 if (*pulDataLen < out_le
546 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftDESCrypt.c416 * pulDataLen: pointer to the length of the output data
435 CK_ULONG_PTR pulDataLen, boolean_t update)
477 *pulDataLen = ulEncryptedLen;
483 if (*pulDataLen < ulEncryptedLen) {
484 *pulDataLen = ulEncryptedLen;
496 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) {
497 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN;
534 *pulDataLen = 0;
565 *pulDataLen = out_len;
572 if (*pulDataLen < out_le
433 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument
[all...]
H A DsoftRSA.c329 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism)
354 *pulDataLen = modulus_len;
360 if (*pulDataLen < (CK_ULONG)modulus_len) {
361 *pulDataLen = modulus_len;
382 if (ulEncryptedLen - num_padding > *pulDataLen) {
383 *pulDataLen = plain_len;
389 *pulDataLen = plain_len;
392 *pulDataLen = modulus_len;
1191 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
1238 *pulDataLen
327 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument
1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_spnego.c280 * [in/out] pulDataLen - Length of pbTokenData buffer, filled out
289 * supplied buffer. If pbTokenData is NULL, or the value in pulDataLen
291 * fill out pulDataLen with the minimum required buffer size.
296 unsigned char *pbTokenData, unsigned long *pulDataLen)
302 if (smbfs_IsValidSpnegoToken(pSpnegoToken) && NULL != pulDataLen) {
306 pSpnegoToken->ulBinaryDataLen > *pulDataLen) {
307 *pulDataLen = pSpnegoToken->ulBinaryDataLen;
312 *pulDataLen = pSpnegoToken->ulBinaryDataLen;
461 * [in/out] pulDataLen - Length of pbTokenData buffer, filled out
473 * pbTokenData is NULL, or the value in pulDataLen i
295 smbfs_spnegoTokenGetBinary(SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char *pbTokenData, unsigned long *pulDataLen) argument
480 smbfs_spnegoGetMechToken(SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char *pbTokenData, unsigned long *pulDataLen) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDecrypt.c189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
232 if (ulEncryptedData < *pulDataLen && inplace) {
235 decrypt.cd_datalen = *pulDataLen;
259 *pulDataLen = decrypt.cd_datalen;
271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
289 if (pulDataLen == NULL) {
295 pulDataLen);
188 kernel_decrypt(kernel_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
270 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DkernelVerify.c563 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
580 if (pSignature == NULL || pulDataLen == NULL) {
602 verify_recover.vr_datalen = *pulDataLen;
618 *pulDataLen = verify_recover.vr_datalen;
562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c1404 CK_ULONG_PTR pulDataLen)
1420 if (! pEncryptedData || ! pulDataLen) {
1438 pulDataLen);
2121 CK_ULONG_PTR pulDataLen)
2138 if (!pSignature || !pulDataLen) {
2153 pData, pulDataLen);
1400 SC_Decrypt(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A Dapi_interface.c553 CK_ULONG_PTR pulDataLen)
566 ulEncryptedDataLen, pData, pulDataLen);
2205 CK_ULONG_PTR pulDataLen)
2218 ulSignatureLen, pData, pulDataLen);
549 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c4707 CK_ULONG_PTR pulDataLen)
4712 ulEncryptedDataLen, pData, pulDataLen);
4714 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen);
4703 pkinit_C_Decrypt(pkinit_identity_crypto_context id_cryptoctx, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument

Completed in 67 milliseconds