/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 251 CK_BBOOL length_only, in sign_mgr_sign() argument 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign() 279 return (rsa_pkcs_sign(sess, length_only, ctx, in sign_mgr_sign() 284 return (rsa_hash_pkcs_sign(sess, length_only, ctx, in sign_mgr_sign() 290 return (md5_hmac_sign(sess, length_only, ctx, in sign_mgr_sign() 295 return (sha1_hmac_sign(sess, length_only, ctx, in sign_mgr_sign() 333 CK_BBOOL length_only, in sign_mgr_sign_final() argument 350 return (rsa_hash_pkcs_sign_final(sess, length_only, in sign_mgr_sign_final() 359 CK_BBOOL length_only, in sign_mgr_sign_recover() argument 379 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign_recover() [all …]
|
H A D | new_host.c | 680 CK_BBOOL length_only = FALSE; in SC_GetOperationState() local 695 length_only = TRUE; in SC_GetOperationState() 703 rc = session_mgr_get_op_state(sess, length_only, in SC_GetOperationState() 1232 CK_BBOOL length_only = FALSE; in SC_Encrypt() local 1257 length_only = TRUE; in SC_Encrypt() 1259 rc = encr_mgr_encrypt(sess, length_only, in SC_Encrypt() 1264 if (rc != CKR_BUFFER_TOO_SMALL && (rc != CKR_OK || length_only != TRUE)) in SC_Encrypt() 1279 CK_BBOOL length_only = FALSE; 1305 length_only = TRUE; 1307 rc = encr_mgr_encrypt_update(sess, length_only, [all …]
|
H A D | dig_mgr.c | 373 CK_BBOOL length_only, in digest_mgr_digest() argument 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { in digest_mgr_digest() 397 if (!length_only && *out_data_len < SHA1_DIGEST_LENGTH) in digest_mgr_digest() 399 return (sha1_hash(sess, length_only, ctx, in digest_mgr_digest() 403 if (!length_only && *out_data_len < MD5_DIGEST_LENGTH) in digest_mgr_digest() 405 return (md5_hash(sess, length_only, ctx, in digest_mgr_digest()
|
H A D | mech_rsa.c | 176 CK_BBOOL length_only, in rsa_pkcs_encrypt() argument 201 if (length_only == TRUE) { in rsa_pkcs_encrypt() 219 CK_BBOOL length_only, in rsa_pkcs_decrypt() argument 246 if (length_only == TRUE) { in rsa_pkcs_decrypt() 263 CK_BBOOL length_only, in rsa_pkcs_sign() argument 290 if (length_only == TRUE) { in rsa_pkcs_sign() 346 CK_BBOOL length_only, in rsa_pkcs_verify_recover() argument 376 if (length_only == TRUE) { in rsa_pkcs_verify_recover() 389 CK_BBOOL length_only, in rsa_hash_pkcs_sign() argument 436 rc = digest_mgr_digest(sess, length_only, &digest_ctx, in_data, in rsa_hash_pkcs_sign() [all …]
|
H A D | decr_mgr.c | 161 CK_BBOOL length_only, in decr_mgr_decrypt() argument 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { in decr_mgr_decrypt() 182 return (rsa_pkcs_decrypt(sess, length_only, in decr_mgr_decrypt()
|
H A D | encr_mgr.c | 160 CK_BBOOL length_only, in encr_mgr_encrypt() argument 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { in encr_mgr_encrypt() 181 return (rsa_pkcs_encrypt(sess, length_only, in encr_mgr_encrypt()
|
H A D | mech_md5.c | 298 CK_BBOOL length_only, in md5_hash() argument 310 if (length_only == TRUE) { in md5_hash() 322 CK_BBOOL length_only, in md5_hmac_sign() argument 357 if (length_only == TRUE) { in md5_hmac_sign()
|
H A D | mech_sha.c | 31 CK_BBOOL length_only, in sha1_hash() argument 42 if (length_only == TRUE) { in sha1_hash() 57 CK_BBOOL length_only, in sha1_hmac_sign() argument 90 if (length_only == TRUE) { in sha1_hmac_sign()
|
H A D | asn1.c | 296 ber_encode_INTEGER(CK_BBOOL length_only, in ber_encode_INTEGER() argument 325 if (length_only == TRUE) { in ber_encode_INTEGER() 446 ber_encode_OCTET_STRING(CK_BBOOL length_only, in ber_encode_OCTET_STRING() argument 472 if (length_only == TRUE) { in ber_encode_OCTET_STRING() 598 ber_encode_SEQUENCE(CK_BBOOL length_only, in ber_encode_SEQUENCE() argument 618 if (length_only == TRUE) { in ber_encode_SEQUENCE() 751 ber_encode_PrivateKeyInfo(CK_BBOOL length_only, in ber_encode_PrivateKeyInfo() argument 788 if (length_only == TRUE) { in ber_encode_PrivateKeyInfo() 883 ber_encode_RSAPrivateKey(CK_BBOOL length_only, in ber_encode_RSAPrivateKey() argument 935 if (length_only == TRUE) { in ber_encode_RSAPrivateKey()
|
H A D | key_mgr.c | 233 CK_BBOOL length_only, in key_mgr_wrap_key() argument 300 rc = rsa_priv_wrap_get_data(key2_obj->template, length_only, in key_mgr_wrap_key() 309 length_only, &data, &data_len); in key_mgr_wrap_key() 336 rc = encr_mgr_encrypt(sess, length_only, in key_mgr_wrap_key()
|
H A D | sess_mgr.c | 765 CK_BBOOL length_only, in session_mgr_get_op_state() argument 789 if (length_only == FALSE) { in session_mgr_get_op_state() 830 if (length_only == FALSE) { in session_mgr_get_op_state() 871 if (length_only == FALSE) { in session_mgr_get_op_state() 911 if (length_only == FALSE) { in session_mgr_get_op_state() 951 if (length_only == FALSE) { in session_mgr_get_op_state()
|
H A D | verify_mgr.c | 336 CK_BBOOL length_only, in verify_mgr_verify_recover() argument 362 return (rsa_pkcs_verify_recover(sess, length_only, in verify_mgr_verify_recover()
|
H A D | key.c | 1431 CK_BBOOL length_only, in rsa_priv_wrap_get_data() argument 1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len, in rsa_priv_wrap_get_data() 1637 CK_BBOOL length_only, in generic_secret_wrap_get_data() argument 1655 if (length_only == FALSE) { in generic_secret_wrap_get_data()
|