| /illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
| H A D | softSignUtil.c | 137 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_sign() argument 164 ulDataLen, hmac, pulSignatureLen, B_TRUE); in soft_sign() 168 ulDataLen, pSignature, pulSignatureLen, B_TRUE); in soft_sign() 184 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign() 189 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); in soft_sign() 206 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign() 211 ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE); in soft_sign() 222 return (soft_rsa_sign_common(session_p, pData, ulDataLen, in soft_sign() 231 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen, in soft_sign() 236 return (soft_dsa_sign(session_p, pData, ulDataLen, in soft_sign() [all …]
|
| H A D | softVerifyUtil.c | 138 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_verify() argument 168 ulDataLen, hmac, &len, B_FALSE); in soft_verify() 194 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify() 221 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify() 238 return (soft_rsa_verify_common(session_p, pData, ulDataLen, in soft_verify() 248 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); in soft_verify() 252 return (soft_dsa_verify(session_p, pData, ulDataLen, in soft_verify() 258 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify() 262 return (soft_ecc_verify(session_p, pData, ulDataLen, in soft_verify() 268 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify()
|
| H A D | softEncryptUtil.c | 294 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, in soft_encrypt_common() argument 307 if (ulDataLen == 0) { in soft_encrypt_common() 317 ulDataLen, pEncrypted, pulEncryptedLen, update)); in soft_encrypt_common() 329 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common() 332 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common() 337 if (ulDataLen == 0) { in soft_encrypt_common() 343 ulDataLen, pEncrypted, pulEncryptedLen, update)); in soft_encrypt_common() 347 if (ulDataLen == 0) { in soft_encrypt_common() 353 ulDataLen, pEncrypted, pulEncryptedLen)); in soft_encrypt_common() 359 ulDataLen, pEncrypted, pulEncryptedLen, mechanism)); in soft_encrypt_common() [all …]
|
| H A D | softDESCrypt.c | 178 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, in soft_des_encrypt_common() argument 205 if ((ulDataLen % DES_BLOCK_LEN) != 0) { in soft_des_encrypt_common() 225 (ulDataLen / DES_BLOCK_LEN + 1); in soft_des_encrypt_common() 231 out_len = ulDataLen; in soft_des_encrypt_common() 263 total_len = soft_des_ctx->remain_len + ulDataLen; in soft_des_encrypt_common() 280 soft_des_ctx->remain_len, pData, ulDataLen); in soft_des_encrypt_common() 281 soft_des_ctx->remain_len += ulDataLen; in soft_des_encrypt_common() 365 (ulDataLen - remain), remain); in soft_des_encrypt_common() 401 (ulDataLen - remain), remain); in soft_des_encrypt_common() 412 ulDataLen - out_len); in soft_des_encrypt_common() [all …]
|
| H A D | softRSA.c | 241 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, in soft_rsa_encrypt_common() argument 273 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { in soft_rsa_encrypt_common() 280 if (ulDataLen > (CK_ULONG)modulus_len) { in soft_rsa_encrypt_common() 299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data, in soft_rsa_encrypt_common() 306 (void) memset(plain_data, 0x0, modulus_len - ulDataLen); in soft_rsa_encrypt_common() 307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, in soft_rsa_encrypt_common() 308 ulDataLen); in soft_rsa_encrypt_common() 524 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_rsa_sign_common() argument 556 if (ulDataLen > ((CK_ULONG)modulus_len - MIN_PKCS1_PADLEN)) { in soft_rsa_sign_common() 566 if (ulDataLen > (CK_ULONG)modulus_len) { in soft_rsa_sign_common() [all …]
|
| H A D | softDigestUtil.c | 177 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen) in soft_digest_common() argument 254 pData, (uint_t)ulDataLen); in soft_digest_common() 257 pData, ulDataLen); in soft_digest_common() 278 pData, (uint32_t)ulDataLen); in soft_digest_common() 281 pData, ulDataLen); in soft_digest_common() 305 pData, ulDataLen); in soft_digest_common() 353 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in soft_digest() argument 357 return (soft_digest_common(session_p, pData, ulDataLen, in soft_digest()
|
| H A D | softBlowfishCrypt.c | 143 CK_ULONG ulDataLen, CK_BYTE_PTR pEncrypted, CK_ULONG_PTR pulEncryptedLen, in soft_blowfish_encrypt_common() argument 164 if ((ulDataLen % BLOWFISH_BLOCK_LEN) != 0) { in soft_blowfish_encrypt_common() 169 out_len = ulDataLen; in soft_blowfish_encrypt_common() 194 total_len = soft_blowfish_ctx->remain_len + ulDataLen; in soft_blowfish_encrypt_common() 210 ulDataLen); in soft_blowfish_encrypt_common() 211 soft_blowfish_ctx->remain_len += ulDataLen; in soft_blowfish_encrypt_common() 287 (ulDataLen - remain), remain); in soft_blowfish_encrypt_common()
|
| H A D | softAESCrypt.c | 277 .ulDataSize = pp->ulDataLen, in soft_aes_init_ctx() 356 CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, in soft_aes_encrypt() argument 378 if ((pData == NULL || ulDataLen == 0) && in soft_aes_encrypt() 383 remainder = ulDataLen % AES_BLOCK_LEN; in soft_aes_encrypt() 409 length_needed = ulDataLen + aes_ctx->ac_mac_len; in soft_aes_encrypt() 412 length_needed = ulDataLen + aes_ctx->ac_tag_len; in soft_aes_encrypt() 423 length_needed = ulDataLen + AES_BLOCK_LEN - remainder; in soft_aes_encrypt() 426 length_needed = ulDataLen; in soft_aes_encrypt() 445 if (ulDataLen > 0) { in soft_aes_encrypt() 446 rv = soft_aes_encrypt_update(session_p, pData, ulDataLen, in soft_aes_encrypt() [all …]
|
| H A D | softDSA.c | 220 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_digest_sign_common() argument 247 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_dsa_digest_sign_common() 276 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_sign() argument 297 if (ulDataLen != DSA_SUBPRIME_BYTES) { in soft_dsa_sign() 307 rv = local_dsa_sign(key, pData, ulDataLen, pSigned); in soft_dsa_sign() 325 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_dsa_verify() argument 339 if (ulDataLen != DSA_SUBPRIME_BYTES) { in soft_dsa_verify() 365 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_dsa_digest_verify_common() argument 378 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_dsa_digest_verify_common()
|
| H A D | softEC.c | 425 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_digest_sign_common() argument 436 rv = soft_digest(session_p, pData, ulDataLen, hash, in soft_ecc_digest_sign_common() 462 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_sign() argument 480 if (ulDataLen > EC_MAX_DIGEST_LEN) { in soft_ecc_sign() 501 digest_item.len = ulDataLen; in soft_ecc_sign() 528 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, in soft_ecc_verify() argument 550 if (ulDataLen > EC_MAX_DIGEST_LEN) { in soft_ecc_verify() 573 digest_item.len = ulDataLen; in soft_ecc_verify() 593 CK_ULONG ulDataLen, CK_BYTE_PTR pSigned, in soft_ecc_digest_verify_common() argument 603 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); in soft_ecc_digest_verify_common()
|
| H A D | softSign.c | 104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Sign() argument 153 rv = soft_sign(session_p, pData, ulDataLen, pSignature, in C_Sign() 363 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument 395 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, in C_SignRecover()
|
| H A D | softEncrypt.c | 106 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Encrypt() argument 127 if (pData == NULL && ulDataLen != 0) { in C_Encrypt() 170 rv = soft_encrypt(session_p, pData, ulDataLen, pEncryptedData, in C_Encrypt()
|
| H A D | softDigest.c | 105 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument 124 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) { in C_Digest() 164 rv = soft_digest(session_p, pData, ulDataLen, pDigest, pulDigestLen); in C_Digest()
|
| /illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
| H A D | kernelSoftCommon.c | 46 CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen, in do_soft_digest() argument 81 rv = soft_digest(session_p, pData, ulDataLen, in do_soft_digest() 85 rv = soft_digest_update(session_p, pData, ulDataLen); in do_soft_digest() 147 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) in do_soft_hmac_update() argument 157 pData, ulDataLen, opflag & OP_SIGN)); in do_soft_hmac_update() 164 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_sign() argument 176 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, in do_soft_hmac_sign() 190 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_verify() argument 208 ulDataLen, hmac, &len, B_FALSE); in do_soft_hmac_verify()
|
| H A D | kernelSign.c | 175 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Sign() argument 223 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || in C_Sign() 224 (ulDataLen > SLOT_HMAC_MAX_INDATA_LEN(session_p))) { in C_Sign() 230 pData, ulDataLen, in C_Sign() 242 sign.cs_datalen = ulDataLen; in C_Sign() 606 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument 641 sign_recover.sr_datalen = ulDataLen; in C_SignRecover()
|
| H A D | kernelEncrypt.c | 190 C_Encrypt(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Encrypt() argument 224 if (pData == NULL && ulDataLen != 0) { in C_Encrypt() 263 if (ulDataLen < *pulEncryptedDataLen && inplace) { in C_Encrypt() 264 encrypt.ce_encrlen = ulDataLen; in C_Encrypt() 271 encrypt.ce_datalen = ulDataLen; in C_Encrypt()
|
| H A D | kernelDigest.c | 142 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument 162 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) { in C_Digest() 212 if ((ulDataLen < SLOT_THRESHOLD(session_p)) || in C_Digest() 213 (ulDataLen > SLOT_HASH_MAX_INDATA_LEN(session_p))) { in C_Digest() 219 pData, ulDataLen, pDigest, pulDigestLen, in C_Digest() 239 digest.cd_datalen = ulDataLen; in C_Digest()
|
| /illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
| H A D | pkcs11Sign.c | 95 CK_ULONG ulDataLen, in C_Sign() argument 104 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, in C_Sign() 121 ulDataLen, pSignature, pulSignatureLen); in C_Sign() 273 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in C_SignRecover() argument 280 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, in C_SignRecover() 296 ulDataLen, pSignature, pulSignatureLen); in C_SignRecover()
|
| H A D | metaSign.c | 74 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Sign() argument 91 pData, ulDataLen, pSignature, pulSignatureLen); in meta_Sign() 198 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) in meta_SignRecover() argument 214 pData, ulDataLen, pSignature, pulSignatureLen); in meta_SignRecover()
|
| H A D | metaDigest.c | 65 meta_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Digest() argument 72 if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) in meta_Digest() 80 pData, ulDataLen, pDigest, pulDigestLen); in meta_Digest()
|
| H A D | pkcs11Digest.c | 92 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Digest() argument 101 return (fast_funcs->C_Digest(hSession, pData, ulDataLen, in C_Digest() 118 ulDataLen, pDigest, pulDigestLen); in C_Digest()
|
| H A D | pkcs11Verify.c | 93 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Verify() argument 101 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, in C_Verify() 118 ulDataLen, pSignature, ulSignatureLen); in C_Verify()
|
| H A D | metaCrypt.c | 75 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Encrypt() argument 96 if (pData == NULL && ulDataLen != 0) { in meta_Encrypt() 103 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen); in meta_Encrypt()
|
| H A D | pkcs11Crypt.c | 96 CK_ULONG ulDataLen, in C_Encrypt() argument 105 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen, in C_Encrypt() 122 ulDataLen, pEncryptedData, pulEncryptedDataLen); in C_Encrypt()
|
| /illumos-gate/usr/src/lib/pkcs11/include/ |
| H A D | pkcs11f.h | 399 CK_ULONG ulDataLen, /* bytes of plaintext */ 505 CK_ULONG ulDataLen, /* bytes of data to digest */ 578 CK_ULONG ulDataLen, /* count of bytes to sign */ 633 CK_ULONG ulDataLen, /* count of bytes to sign */ 666 CK_ULONG ulDataLen, /* length of signed data */
|