/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 303 CK_ULONG *out_data_len) 305 if (! sess || ! ctx || ! out_data_len) { 309 *out_data_len = MD5_DIGEST_LENGTH; 327 CK_ULONG * out_data_len) 340 if (! sess || ! ctx || ! out_data_len) { 348 *out_data_len = 0; 356 *out_data_len = hmac_len; 386 hash_len = *out_data_len; 478 *out_data_len = hmac_len; 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | mech_sha.c | 36 CK_ULONG *out_data_len) 38 if (! sess || ! ctx || ! out_data_len) { 41 *out_data_len = SHA1_DIGEST_LENGTH; 62 CK_ULONG * out_data_len) { 74 if (! sess || ! ctx || ! out_data_len) { 82 *out_data_len = 0; 89 *out_data_len = hmac_len; 207 *out_data_len = hmac_len; 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | sign_mgr.c | 256 CK_ULONG * out_data_len) 281 out_data, out_data_len)); 286 out_data, out_data_len)); 292 out_data, out_data_len)); 297 out_data, out_data_len)); 364 CK_ULONG * out_data_len) 389 out_data, out_data_len)); 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | mech_rsa.c | 35 CK_ULONG *out_data_len, 57 CK_ULONG * out_data_len, 76 out_data, out_data_len, key_obj); 87 CK_ULONG * out_data_len, 108 out_data, out_data_len, key_obj); 119 CK_ULONG * out_data_len, 138 out_data_len, key_obj); 149 CK_ULONG out_data_len, 168 out_data_len, key_obj); 181 CK_ULONG *out_data_len) 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument [all...] |
H A D | dig_mgr.c | 378 CK_ULONG *out_data_len) 397 if (!length_only && *out_data_len < SHA1_DIGEST_LENGTH) 400 in_data, in_data_len, out_data, out_data_len)); 403 if (!length_only && *out_data_len < MD5_DIGEST_LENGTH) 406 in_data, in_data_len, out_data, out_data_len)); 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | decr_mgr.c | 166 CK_ULONG *out_data_len) 184 out_data_len)); 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 165 CK_ULONG *out_data_len) 183 out_data_len)); 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | tpm_specific.c | 2472 CK_ULONG * out_data_len) 2523 if (*out_data_len < buf_size + outlen) { 2538 *out_data_len = outlen; 2548 CK_ULONG * out_data_len, 2559 out_data, out_data_len); 2621 CK_ULONG * out_data_len, 2658 if (sig_len > *out_data_len) { 2664 *out_data_len = sig_len; 2677 CK_ULONG *out_data_len) 2759 if (outlen + dataBlobSize > *out_data_len) { 2466 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2543 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2616 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2671 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2782 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2813 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto.h | 128 unsigned char **out_data, unsigned int *out_data_len);
|
H A D | pkinit_crypto_openssl.c | 924 unsigned char **out_data, unsigned int *out_data_len) 939 *out_data_len = i2d_PKCS7(p7, NULL); 940 if (!(*out_data_len)) { 949 if ((p = *out_data = malloc(*out_data_len)) == NULL) 4935 decode_data(unsigned char **out_data, unsigned int *out_data_len, argument 4945 if (out_data == NULL || out_data_len == NULL) 4970 *out_data_len = len; 918 cms_contentinfo_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, unsigned char *data, unsigned int data_len, unsigned char **out_data, unsigned int *out_data_len) argument
|