/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSign.c | 77 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 93 pData, ulDataLen, pSignature, pulSignatureLen); 136 meta_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 153 NULL, 0, pSignature, pulSignatureLen); 200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 216 pData, ulDataLen, pSignature, pulSignatureLen); 75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | metaVerify.c | 76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 86 if (pData == NULL || pSignature == NULL) { 93 pData, ulDataLen, pSignature, &ulSignatureLen); 136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 150 if (pSignature == NULL && ulSignatureLen != 0) { 157 pSignature, ulSignatureLen, NULL, NULL); 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 214 if (pSignature == NULL || pulDataLen == NULL) { 221 pSignature, ulSignatureLen, pData, pulDataLen); 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | pkcs11Sign.c | 98 CK_BYTE_PTR pSignature, 107 pSignature, pulSignatureLen)); 123 ulDataLen, pSignature, pulSignatureLen); 178 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 186 return (fast_funcs->C_SignFinal(hSession, pSignature, 203 pSignature, pulSignatureLen); 275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 283 pSignature, pulSignatureLen)); 298 ulDataLen, pSignature, pulSignatureLen); 95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Verify.c | 96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 104 pSignature, ulSignatureLen)); 120 ulDataLen, pSignature, ulSignatureLen); 176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 184 return (fast_funcs->C_VerifyFinal(hSession, pSignature, 200 pSignature, ulSignatureLen); 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 281 return (fast_funcs->C_VerifyRecover(hSession, pSignature, 298 pSignature, ulSignatureLen, pData, pulDataLen); 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSign.c | 105 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 152 rv = soft_sign(session_p, pData, ulDataLen, pSignature, 156 (pSignature == NULL && rv == CKR_OK)) { 234 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 270 rv = soft_sign_final(session_p, pSignature, pulSignatureLen); 273 (pSignature == NULL && rv == CKR_OK)) { 362 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, 398 (pSignature == NULL && rv == CKR_OK)) { 104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | softVerify.c | 105 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 152 rv = soft_verify(session_p, pData, ulDataLen, pSignature, 222 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 253 rv = soft_verify_final(session_p, pSignature, ulSignatureLen); 332 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 348 if ((pSignature == NULL) || (pulDataLen == NULL)) { 364 rv = soft_verify_recover(session_p, pSignature, 104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softSignUtil.c | 120 * pSignature: pointer to the signature after signing 130 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 154 if (pSignature != NULL) { 159 /* Pass original pSignature, let callee to handle it. */ 161 ulDataLen, pSignature, pulSignatureLen, B_TRUE); 164 if ((rv == CKR_OK) && (pSignature != NULL)) 165 (void) memcpy(pSignature, hmac, *pulSignatureLen); 174 if (pSignature != NULL) { 185 if ((rv == CKR_OK) && (pSignature != NULL)) 186 (void) memcpy(pSignature, signatur 129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 311 soft_sign_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 416 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | softVerifyUtil.c | 121 * pSignature: pointer to the signature 131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 168 if (memcmp(hmac, pSignature, len) != 0) { 194 if (memcmp(signature, pSignature, len) != 0) { 205 pSignature, ulSignatureLen, mechanism)); 214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 219 pSignature, ulSignatureLen)); 224 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 229 pSignature, ulSignatureLen)); 234 ulDataLen, pSignature, ulSignatureLe 130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 322 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 439 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softDSA.c | 325 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 350 rv = local_dsa_verify(key, pData, pSignature); 324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softEC.c | 530 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 571 signature_item.data = pSignature; 529 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softRSA.c | 641 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 671 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1); 1175 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, argument 1201 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1); 640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSign.c | 176 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 231 pSignature, pulSignatureLen, OP_SINGLE); 245 sign.cs_signbuf = (char *)pSignature; 262 (rv == CKR_OK && pSignature == NULL)) { 374 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 415 NULL, 0, pSignature, pulSignatureLen, OP_FINAL); 431 pSignature, pulSignatureLen, OP_SINGLE); 448 pSignature, pulSignatureLen); 457 sign_final.sf_signbuf = (char *)pSignature; 474 (rv == CKR_OK && pSignature 175 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 605 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | kernelSoftCommon.c | 166 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag) 178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); 180 if ((rv == CKR_OK) && (pSignature != NULL)) { 181 (void) memcpy(pSignature, hmac, *pulSignatureLen); 192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) 216 if (memcmp(hmac, pSignature, len) != 0) { 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag) argument 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
|
H A D | kernelVerify.c | 180 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 230 pSignature, ulSignatureLen, OP_SINGLE); 243 verify.cv_signbuf = (char *)pSignature; 357 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 393 NULL, 0, pSignature, ulSignatureLen, 420 pSignature, ulSignatureLen); 429 verify_final.vf_signbuf = (char *)pSignature; 563 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 581 if (pSignature == NULL || pulDataLen == NULL) { 602 verify_recover.vr_signbuf = (char *)pSignature; 179 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1709 CK_BYTE_PTR pSignature, 1737 if (! pSignature) 1742 pSignature, pulSignatureLen); 1792 CK_BYTE_PTR pSignature, 1821 if (! pSignature) 1825 &sess->sign_ctx, pSignature, pulSignatureLen); 1880 CK_BYTE_PTR pSignature, 1908 if (! pSignature) 1913 pSignature, pulSignatureLen); 1968 CK_BYTE_PTR pSignature, 1706 SC_Sign(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1791 SC_SignFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1877 SC_SignRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1965 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2044 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2125 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | api_interface.c | 1917 CK_BYTE_PTR pSignature, 1931 pSignature, pulSignatureLen); 1967 CK_BYTE_PTR pSignature, 1983 rv = FuncList.ST_SignFinal(rSession, pSignature, 2020 CK_BYTE_PTR pSignature, 2034 ulDataLen, pSignature, pulSignatureLen); 2124 CK_BYTE_PTR pSignature, 2138 pSignature, ulSignatureLen); 2147 CK_BYTE_PTR pSignature, 2156 if (! pSignature) { 1914 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1966 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 2017 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 2121 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2146 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2199 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |