/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsVerify.c | 85 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | kmsDecrypt.c | 180 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 209 if (pulDataLen == NULL) { 242 ulEncryptedData, pData, pulDataLen, FALSE); 179 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | kmsAESCrypt.c | 57 CK_ULONG *pulDataLen, int block_size) 74 *pulDataLen = padded_len - pad_value; 459 * pulDataLen: pointer to the length of the output data 478 CK_ULONG_PTR pulDataLen, boolean_t update) 517 *pulDataLen = ulEncryptedLen; 523 if (*pulDataLen < ulEncryptedLen) { 524 *pulDataLen = ulEncryptedLen; 534 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) { 535 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN; 573 *pulDataLen 56 kms_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, CK_ULONG *pulDataLen, int block_size) argument 476 kms_aes_decrypt_common(kms_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaVerify.c | 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 214 if (pSignature == NULL || pulDataLen == NULL) { 221 pSignature, ulSignatureLen, pData, pulDataLen); 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | pkcs11Verify.c | 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 282 ulSignatureLen, pData, pulDataLen)); 298 pSignature, ulSignatureLen, pData, pulDataLen); 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | metaCrypt.c | 203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 212 if (pEncryptedData == NULL || pulDataLen == NULL) { 219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 201 meta_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | pkcs11Crypt.c | 358 CK_ULONG_PTR pulDataLen) 366 ulEncryptedDataLen, pData, pulDataLen)); 387 if (pEncryptedData == NULL || pulDataLen == NULL) { 394 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 399 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 354 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerify.c | 332 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 347 if ((pSignature == NULL) || (pulDataLen == NULL)) { 364 ulSignatureLen, pData, pulDataLen); 331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softDecrypt.c | 105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 135 if (pulDataLen == NULL) { 172 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); 175 pData, pulDataLen); 104 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softVerifyUtil.c | 460 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 471 ulSignatureLen, pData, pulDataLen)); 459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softBlowfishCrypt.c | 312 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, 345 *pulDataLen = ulEncryptedLen; 350 if (*pulDataLen < ulEncryptedLen) { 351 *pulDataLen = ulEncryptedLen; 376 *pulDataLen = 0; 394 *pulDataLen = out_len; 401 if (*pulDataLen < out_len) { 402 *pulDataLen = out_len; 440 *pulDataLen = out_len; 456 *pulDataLen 311 soft_blowfish_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softDecryptUtil.c | 45 CK_ULONG *pulDataLen) 56 *pulDataLen = padded_len; 451 * pulDataLen: pointer to the length of the output data 465 CK_ULONG_PTR pulDataLen, boolean_t Update) 478 *pulDataLen = 0; 487 ulEncryptedLen, pData, pulDataLen, Update)); 494 *pulDataLen = 0; 502 ulEncryptedLen, pData, pulDataLen, Update)); 507 *pulDataLen = 0; 512 ulEncryptedLen, pData, pulDataLen, Updat 44 soft_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, CK_ULONG *pulDataLen) argument 463 soft_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t Update) argument 556 soft_decrypt(soft_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softAESCrypt.c | 529 * pulDataLen: pointer to the length of the output data 548 CK_ULONG_PTR pulDataLen, boolean_t update) 587 *pulDataLen = ulEncryptedLen; 593 if (*pulDataLen < ulEncryptedLen) { 594 *pulDataLen = ulEncryptedLen; 604 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) { 605 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN; 643 *pulDataLen = 0; 674 *pulDataLen = out_len; 681 if (*pulDataLen < out_le 546 soft_aes_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softDESCrypt.c | 416 * pulDataLen: pointer to the length of the output data 435 CK_ULONG_PTR pulDataLen, boolean_t update) 477 *pulDataLen = ulEncryptedLen; 483 if (*pulDataLen < ulEncryptedLen) { 484 *pulDataLen = ulEncryptedLen; 496 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) { 497 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN; 534 *pulDataLen = 0; 565 *pulDataLen = out_len; 572 if (*pulDataLen < out_le 433 soft_des_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, boolean_t update) argument [all...] |
H A D | softRSA.c | 329 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) 354 *pulDataLen = modulus_len; 360 if (*pulDataLen < (CK_ULONG)modulus_len) { 361 *pulDataLen = modulus_len; 382 if (ulEncryptedLen - num_padding > *pulDataLen) { 383 *pulDataLen = plain_len; 389 *pulDataLen = plain_len; 392 *pulDataLen = modulus_len; 1191 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 1238 *pulDataLen 327 soft_rsa_decrypt_common(soft_session_t *session_p, CK_BYTE_PTR pEncrypted, CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) argument 1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_spnego.c | 280 * [in/out] pulDataLen - Length of pbTokenData buffer, filled out 289 * supplied buffer. If pbTokenData is NULL, or the value in pulDataLen 291 * fill out pulDataLen with the minimum required buffer size. 296 unsigned char *pbTokenData, unsigned long *pulDataLen) 302 if (smbfs_IsValidSpnegoToken(pSpnegoToken) && NULL != pulDataLen) { 306 pSpnegoToken->ulBinaryDataLen > *pulDataLen) { 307 *pulDataLen = pSpnegoToken->ulBinaryDataLen; 312 *pulDataLen = pSpnegoToken->ulBinaryDataLen; 461 * [in/out] pulDataLen - Length of pbTokenData buffer, filled out 473 * pbTokenData is NULL, or the value in pulDataLen i 295 smbfs_spnegoTokenGetBinary(SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char *pbTokenData, unsigned long *pulDataLen) argument 480 smbfs_spnegoGetMechToken(SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char *pbTokenData, unsigned long *pulDataLen) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDecrypt.c | 189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 232 if (ulEncryptedData < *pulDataLen && inplace) { 235 decrypt.cd_datalen = *pulDataLen; 259 *pulDataLen = decrypt.cd_datalen; 271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 289 if (pulDataLen == NULL) { 295 pulDataLen); 188 kernel_decrypt(kernel_session_t *session_p, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument 270 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | kernelVerify.c | 563 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 580 if (pSignature == NULL || pulDataLen == NULL) { 602 verify_recover.vr_datalen = *pulDataLen; 618 *pulDataLen = verify_recover.vr_datalen; 562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1404 CK_ULONG_PTR pulDataLen) 1420 if (! pEncryptedData || ! pulDataLen) { 1438 pulDataLen); 2121 CK_ULONG_PTR pulDataLen) 2138 if (!pSignature || !pulDataLen) { 2153 pData, pulDataLen); 1400 SC_Decrypt(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument 2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | api_interface.c | 553 CK_ULONG_PTR pulDataLen) 566 ulEncryptedDataLen, pData, pulDataLen); 2205 CK_ULONG_PTR pulDataLen) 2218 ulSignatureLen, pData, pulDataLen); 549 C_Decrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument 2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 4707 CK_ULONG_PTR pulDataLen) 4712 ulEncryptedDataLen, pData, pulDataLen); 4714 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen); 4703 pkinit_C_Decrypt(pkinit_identity_crypto_context id_cryptoctx, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|