Home
last modified time | relevance | path

Searched refs:ulDataLen (Results 1 – 25 of 39) sorted by relevance

12

/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSignUtil.c136 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_sign() argument
163 ulDataLen, hmac, pulSignatureLen, B_TRUE); in soft_sign()
167 ulDataLen, pSignature, pulSignatureLen, B_TRUE); in soft_sign()
183 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign()
188 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); in soft_sign()
204 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign()
209 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); in soft_sign()
220 return (soft_rsa_sign_common(session_p, pData, ulDataLen, in soft_sign()
234 return (soft_dsa_sign(session_p, pData, ulDataLen, in soft_sign()
244 return (soft_ecc_sign(session_p, pData, ulDataLen, in soft_sign()
[all …]
H A DsoftVerifyUtil.c137 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_verify() argument
167 ulDataLen, hmac, &len, B_FALSE); in soft_verify()
193 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify()
219 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify()
236 return (soft_rsa_verify_common(session_p, pData, ulDataLen, in soft_verify()
246 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); in soft_verify()
250 return (soft_dsa_verify(session_p, pData, ulDataLen, in soft_verify()
256 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify()
260 return (soft_ecc_verify(session_p, pData, ulDataLen, in soft_verify()
266 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify()
H A DsoftEncryptUtil.c293 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, in soft_encrypt_common() argument
306 if (ulDataLen == 0) { in soft_encrypt_common()
316 ulDataLen, pEncrypted, pulEncryptedLen, update)); in soft_encrypt_common()
327 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common()
330 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common()
335 if (ulDataLen == 0) { in soft_encrypt_common()
341 ulDataLen, pEncrypted, pulEncryptedLen, update)); in soft_encrypt_common()
345 if (ulDataLen == 0) { in soft_encrypt_common()
351 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common()
384 CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, in soft_encrypt() argument
[all …]
H A DsoftDESCrypt.c178 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, in soft_des_encrypt_common() argument
205 if ((ulDataLen % DES_BLOCK_LEN) != 0) { in soft_des_encrypt_common()
225 (ulDataLen / DES_BLOCK_LEN + 1); in soft_des_encrypt_common()
231 out_len = ulDataLen; in soft_des_encrypt_common()
281 soft_des_ctx->remain_len += ulDataLen; in soft_des_encrypt_common()
365 (ulDataLen - remain), remain); in soft_des_encrypt_common()
401 (ulDataLen - remain), remain); in soft_des_encrypt_common()
412 ulDataLen - out_len); in soft_des_encrypt_common()
414 (ulDataLen - out_len), in soft_des_encrypt_common()
415 DES_BLOCK_LEN, ulDataLen - out_len); in soft_des_encrypt_common()
[all …]
H A DsoftRSA.c280 if (ulDataLen > (CK_ULONG)modulus_len) { in soft_rsa_encrypt_common()
308 ulDataLen); in soft_rsa_encrypt_common()
524 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_rsa_sign_common() argument
566 if (ulDataLen > (CK_ULONG)modulus_len) { in soft_rsa_sign_common()
606 ulDataLen); in soft_rsa_sign_common()
657 if (ulDataLen == 0) { in soft_rsa_verify_common()
694 if ((CK_ULONG)data_len != ulDataLen) { in soft_rsa_verify_common()
699 ulDataLen) != 0) { in soft_rsa_verify_common()
714 ulDataLen) != 0) { in soft_rsa_verify_common()
972 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_rsa_digest_sign_common() argument
[all …]
H A DsoftDigestUtil.c177 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) in soft_digest_common() argument
254 pData, (uint_t)ulDataLen); in soft_digest_common()
257 pData, ulDataLen); in soft_digest_common()
278 pData, (uint32_t)ulDataLen); in soft_digest_common()
281 pData, ulDataLen); in soft_digest_common()
305 pData, ulDataLen); in soft_digest_common()
353 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in soft_digest() argument
357 return (soft_digest_common(session_p, pData, ulDataLen, in soft_digest()
H A DsoftBlowfishCrypt.c143 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, in soft_blowfish_encrypt_common() argument
164 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) { in soft_blowfish_encrypt_common()
169 out_len = ulDataLen; in soft_blowfish_encrypt_common()
194 total_len = soft_blowfish_ctx->remain_len + ulDataLen; in soft_blowfish_encrypt_common()
210 ulDataLen); in soft_blowfish_encrypt_common()
211 soft_blowfish_ctx->remain_len += ulDataLen; in soft_blowfish_encrypt_common()
287 (ulDataLen - remain), remain); in soft_blowfish_encrypt_common()
H A DsoftAESCrypt.c246 .ulDataSize = pp->ulDataLen, in soft_aes_init_ctx()
325 CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, in soft_aes_encrypt() argument
347 if ((pData == NULL || ulDataLen == 0) && in soft_aes_encrypt()
352 remainder = ulDataLen % AES_BLOCK_LEN; in soft_aes_encrypt()
377 length_needed = ulDataLen + aes_ctx->ac_mac_len; in soft_aes_encrypt()
380 length_needed = ulDataLen + aes_ctx->ac_tag_len; in soft_aes_encrypt()
391 length_needed = ulDataLen; in soft_aes_encrypt()
410 if (ulDataLen > 0) { in soft_aes_encrypt()
821 IMPLY(pData == NULL, ulDataLen == 0); in soft_aes_encrypt_update()
839 out_len = ulDataLen; in soft_aes_encrypt_update()
[all …]
H A DsoftDSA.c220 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_digest_sign_common() argument
247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_dsa_digest_sign_common()
276 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_sign() argument
297 if (ulDataLen != DSA_SUBPRIME_BYTES) { in soft_dsa_sign()
307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned); in soft_dsa_sign()
325 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_dsa_verify() argument
339 if (ulDataLen != DSA_SUBPRIME_BYTES) { in soft_dsa_verify()
365 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_digest_verify_common() argument
378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_dsa_digest_verify_common()
H A DsoftEC.c425 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_digest_sign_common() argument
436 rv = soft_digest(session_p, pData, ulDataLen, hash, in soft_ecc_digest_sign_common()
464 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_sign() argument
482 if (ulDataLen > EC_MAX_DIGEST_LEN) { in soft_ecc_sign()
503 digest_item.len = ulDataLen; in soft_ecc_sign()
530 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_ecc_verify() argument
552 if (ulDataLen > EC_MAX_DIGEST_LEN) { in soft_ecc_verify()
575 digest_item.len = ulDataLen; in soft_ecc_verify()
595 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_digest_verify_common() argument
605 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_ecc_digest_verify_common()
H A DsoftSign.c104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Sign() argument
152 rv = soft_sign(session_p, pData, ulDataLen, pSignature, in C_Sign()
362 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument
394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, in C_SignRecover()
H A DsoftEncrypt.c106 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Encrypt() argument
127 if (pData == NULL && ulDataLen != 0) { in C_Encrypt()
170 rv = soft_encrypt(session_p, pData, ulDataLen, pEncryptedData, in C_Encrypt()
H A DsoftDigest.c105 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument
124 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) { in C_Digest()
164 rv = soft_digest(session_p, pData, ulDataLen, pDigest, pulDigestLen); in C_Digest()
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c46 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, in do_soft_digest() argument
81 rv = soft_digest(session_p, pData, ulDataLen, in do_soft_digest()
85 rv = soft_digest_update(session_p, pData, ulDataLen); in do_soft_digest()
147 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) in do_soft_hmac_update() argument
157 pData, ulDataLen, opflag & OP_SIGN)); in do_soft_hmac_update()
164 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_sign() argument
176 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, in do_soft_hmac_sign()
190 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_verify() argument
208 ulDataLen, hmac, &len, B_FALSE); in do_soft_hmac_verify()
H A DkernelSign.c175 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Sign() argument
223 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || in C_Sign()
224 (ulDataLen > SLOT_HMAC_MAX_INDATA_LEN(session_p))) { in C_Sign()
230 pData, ulDataLen, in C_Sign()
242 sign.cs_datalen = ulDataLen; in C_Sign()
606 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument
641 sign_recover.sr_datalen = ulDataLen; in C_SignRecover()
H A DkernelEncrypt.c190 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Encrypt() argument
224 if (pData == NULL && ulDataLen != 0) { in C_Encrypt()
263 if (ulDataLen < *pulEncryptedDataLen && inplace) { in C_Encrypt()
264 encrypt.ce_encrlen = ulDataLen; in C_Encrypt()
271 encrypt.ce_datalen = ulDataLen; in C_Encrypt()
H A DkernelDigest.c142 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument
162 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) { in C_Digest()
212 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || in C_Digest()
213 (ulDataLen > SLOT_HASH_MAX_INDATA_LEN(session_p))) { in C_Digest()
219 pData, ulDataLen, pDigest, pulDigestLen, in C_Digest()
239 digest.cd_datalen = ulDataLen; in C_Digest()
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11Sign.c95 CK_ULONG ulDataLen, in C_Sign() argument
104 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, in C_Sign()
121 ulDataLen, pSignature, pulSignatureLen); in C_Sign()
273 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument
280 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, in C_SignRecover()
296 ulDataLen, pSignature, pulSignatureLen); in C_SignRecover()
H A DmetaSign.c74 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Sign() argument
91 pData, ulDataLen, pSignature, pulSignatureLen); in meta_Sign()
198 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in meta_SignRecover() argument
214 pData, ulDataLen, pSignature, pulSignatureLen); in meta_SignRecover()
H A DmetaDigest.c65 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Digest() argument
72 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) in meta_Digest()
80 pData, ulDataLen, pDigest, pulDigestLen); in meta_Digest()
H A Dpkcs11Digest.c92 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument
101 return (fast_funcs->C_Digest(hSession, pData, ulDataLen, in C_Digest()
118 ulDataLen, pDigest, pulDigestLen); in C_Digest()
H A Dpkcs11Verify.c93 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Verify() argument
101 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, in C_Verify()
118 ulDataLen, pSignature, ulSignatureLen); in C_Verify()
H A DmetaCrypt.c75 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Encrypt() argument
96 if (pData == NULL && ulDataLen != 0) { in meta_Encrypt()
103 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen); in meta_Encrypt()
H A Dpkcs11Crypt.c96 CK_ULONG ulDataLen, in C_Encrypt() argument
105 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen, in C_Encrypt()
122 ulDataLen, pEncryptedData, pulEncryptedDataLen); in C_Encrypt()
/illumos-gate/usr/src/lib/pkcs11/include/
H A Dpkcs11f.h399 CK_ULONG ulDataLen, /* bytes of plaintext */
505 CK_ULONG ulDataLen, /* bytes of data to digest */
578 CK_ULONG ulDataLen, /* count of bytes to sign */
633 CK_ULONG ulDataLen, /* count of bytes to sign */
666 CK_ULONG ulDataLen, /* length of signed data */

12