/titanic_41/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEmulate.c | 135 #define DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag) \ argument 138 ulPartLen, NULL, NULL, opflag); \ 141 ulPartLen, opflag); \ 152 CK_ULONG ulPartLen, int opflag) in emulate_update() argument 176 DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag); in emulate_update() 187 if (bufp->indata_len + ulPartLen > maxlen) { in emulate_update() 189 } else if (ulPartLen > (bufp->buf_len - bufp->indata_len)) { in emulate_update() 190 int siz = ulPartLen < bufp->buf_len ? in emulate_update() 191 bufp->buf_len * 2 : bufp->buf_len + ulPartLen; in emulate_update() 220 DO_SOFT_UPDATE(opp, pPart, ulPartLen, opflag); in emulate_update() [all …]
|
H A D | kernelDigest.c | 296 CK_ULONG ulPartLen) in C_DigestUpdate() argument 345 rv = emulate_update(session_p, pPart, ulPartLen, OP_DIGEST); in C_DigestUpdate() 352 digest_update.du_datalen = ulPartLen; in C_DigestUpdate() 406 CK_ULONG ulPartLen; in C_DigestKey() local 490 ulPartLen = OBJ_SEC_VALUE_LEN(key_p); in C_DigestKey() 491 if (ulPartLen == 0) { in C_DigestKey() 508 ulPartLen, OP_DIGEST); in C_DigestKey() 514 digest_update.du_datalen = ulPartLen; in C_DigestKey()
|
H A D | kernelDualCrypt.c | 35 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_DigestEncryptUpdate() argument 58 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_SignEncryptUpdate() argument
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDualCrypt.c | 37 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_DigestEncryptUpdate() argument 47 rv = C_EncryptUpdate(hSession, pPart, ulPartLen, in C_DigestEncryptUpdate() 60 return (C_DigestUpdate(hSession, pPart, ulPartLen)); in C_DigestEncryptUpdate() 94 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_SignEncryptUpdate() argument 104 rv = C_EncryptUpdate(hSession, pPart, ulPartLen, in C_SignEncryptUpdate() 117 return (C_SignUpdate(hSession, pPart, ulPartLen)); in C_SignEncryptUpdate()
|
H A D | softDigestUtil.c | 362 CK_ULONG ulPartLen) in soft_digest_update() argument 371 pPart, (uint_t)ulPartLen); in soft_digest_update() 374 pPart, ulPartLen); in soft_digest_update() 382 pPart, (uint32_t)ulPartLen); in soft_digest_update() 385 pPart, ulPartLen); in soft_digest_update() 393 pPart, ulPartLen); in soft_digest_update()
|
H A D | softVerifyUtil.c | 257 CK_ULONG ulPartLen) in soft_verify_update() argument 277 ulPartLen, B_FALSE)); in soft_verify_update() 283 ulPartLen)); in soft_verify_update() 299 return (soft_digest_update(session_p, pPart, ulPartLen)); in soft_verify_update()
|
H A D | softSignUtil.c | 246 CK_ULONG ulPartLen) in soft_sign_update() argument 266 ulPartLen, B_TRUE)); in soft_sign_update() 272 ulPartLen)); in soft_sign_update() 288 return (soft_digest_update(session_p, pPart, ulPartLen)); in soft_sign_update()
|
H A D | softVerify.c | 164 CK_ULONG ulPartLen) in C_VerifyUpdate() argument 179 if (ulPartLen == 0) { in C_VerifyUpdate() 206 rv = soft_verify_update(session_p, pPart, ulPartLen); in C_VerifyUpdate()
|
H A D | softSign.c | 176 CK_ULONG ulPartLen) in C_SignUpdate() argument 191 if (ulPartLen == 0) { in C_SignUpdate() 218 rv = soft_sign_update(session_p, pPart, ulPartLen); in C_SignUpdate()
|
H A D | softDESCrypt.c | 1063 CK_ULONG ulPartLen) in soft_des_mac_sign_verify_update() argument 1086 total_len = soft_des_ctx_encrypt->remain_len + ulPartLen; in soft_des_mac_sign_verify_update() 1089 rv = soft_encrypt_update(session_p, pPart, ulPartLen, NULL, in soft_des_mac_sign_verify_update() 1092 remainder = ulPartLen % DES_BLOCK_LEN; in soft_des_mac_sign_verify_update() 1095 ulEncryptedLen = ulPartLen + (DES_BLOCK_LEN - remainder); in soft_des_mac_sign_verify_update() 1099 rv = soft_encrypt_update(session_p, pPart, ulPartLen, in soft_des_mac_sign_verify_update()
|
H A D | softEncrypt.c | 193 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_EncryptUpdate() argument 248 rv = soft_encrypt_update(session_p, pPart, ulPartLen, in C_EncryptUpdate()
|
H A D | softDigest.c | 204 CK_ULONG ulPartLen) in C_DigestUpdate() argument 249 rv = soft_digest_update(session_p, pPart, ulPartLen); in C_DigestUpdate()
|
/titanic_41/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11DualCrypt.c | 43 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_DigestEncryptUpdate() argument 52 ulPartLen, pEncryptedPart, pulEncryptedPartLen)); in C_DigestEncryptUpdate() 68 C_DigestEncryptUpdate(sessp->se_handle, pPart, ulPartLen, in C_DigestEncryptUpdate() 134 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in C_SignEncryptUpdate() argument 143 ulPartLen, pEncryptedPart, pulEncryptedPartLen)); in C_SignEncryptUpdate() 159 C_SignEncryptUpdate(sessp->se_handle, pPart, ulPartLen, in C_SignEncryptUpdate()
|
H A D | metaDualCrypt.c | 59 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in meta_DigestEncryptUpdate() argument 85 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, in meta_SignEncryptUpdate() argument
|
H A D | pkcs11Digest.c | 137 CK_ULONG ulPartLen) in C_DigestUpdate() argument 145 ulPartLen)); in C_DigestUpdate() 161 pPart, ulPartLen); in C_DigestUpdate()
|
H A D | pkcs11Sign.c | 139 C_SignUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen) in C_SignUpdate() argument 146 return (fast_funcs->C_SignUpdate(hSession, pPart, ulPartLen)); in C_SignUpdate() 162 ulPartLen); in C_SignUpdate()
|
H A D | pkcs11Verify.c | 137 CK_ULONG ulPartLen) in C_VerifyUpdate() argument 145 ulPartLen)); in C_VerifyUpdate() 161 pPart, ulPartLen); in C_VerifyUpdate()
|
H A D | metaDigest.c | 95 CK_ULONG ulPartLen) in meta_DigestUpdate() argument 109 pPart, ulPartLen, NULL, NULL); in meta_DigestUpdate()
|
H A D | pkcs11Crypt.c | 141 CK_ULONG ulPartLen, in C_EncryptUpdate() argument 150 return (fast_funcs->C_EncryptUpdate(hSession, pPart, ulPartLen, in C_EncryptUpdate() 167 pPart, ulPartLen, pEncryptedPart, pulEncryptedPartLen); in C_EncryptUpdate()
|
H A D | metaSign.c | 107 CK_BYTE_PTR pPart, CK_ULONG ulPartLen) in meta_SignUpdate() argument 123 pPart, ulPartLen, NULL, NULL); in meta_SignUpdate()
|
H A D | metaVerify.c | 107 CK_ULONG ulPartLen) in meta_VerifyUpdate() argument 123 pPart, ulPartLen, NULL, NULL); in meta_VerifyUpdate()
|
H A D | metaGlobal.h | 756 CK_BYTE_PTR pPart, CK_ULONG ulPartLen, 774 CK_ULONG ulPartLen); 784 CK_BYTE_PTR pPart, CK_ULONG ulPartLen); 796 CK_ULONG ulPartLen); 804 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, 810 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart,
|
H A D | metaCrypt.c | 107 CK_BYTE_PTR pPart, CK_ULONG ulPartLen, in meta_EncryptUpdate() argument 124 pPart, ulPartLen, pEncryptedPart, pulEncryptedPartLen); in meta_EncryptUpdate()
|
/titanic_41/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 403 CK_ULONG ulPartLen, /* plaintext data len */ 505 CK_ULONG ulPartLen /* bytes of data to be digested */ 574 CK_ULONG ulPartLen /* count of bytes to sign */ 656 CK_ULONG ulPartLen /* length of signed data */ 709 CK_ULONG ulPartLen, /* plaintext length */ 737 CK_ULONG ulPartLen, /* plaintext length */
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | api_interface.c | 802 CK_ULONG ulPartLen, in C_DigestEncryptUpdate() argument 820 ulPartLen, pEncryptedPart, pulEncryptedPartLen); in C_DigestEncryptUpdate() 900 CK_ULONG ulPartLen) in C_DigestUpdate() argument 911 rv = FuncList.ST_DigestUpdate(rSession, pPart, ulPartLen); in C_DigestUpdate() 996 CK_ULONG ulPartLen, in C_EncryptUpdate() argument 1013 rv = FuncList.ST_EncryptUpdate(rSession, pPart, ulPartLen, in C_EncryptUpdate() 1941 CK_ULONG ulPartLen, in C_SignEncryptUpdate() argument 1958 ulPartLen, pEncryptedPart, pulEncryptedPartLen); in C_SignEncryptUpdate() 2069 CK_ULONG ulPartLen) in C_SignUpdate() argument 2081 rv = FuncList.ST_SignUpdate(rSession, pPart, ulPartLen); in C_SignUpdate() [all …]
|