/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsSign.c | 41 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 62 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 86 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 40 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 85 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | kmsVerify.c | 41 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 62 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSign.c | 77 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 93 pData, ulDataLen, pSignature, pulSignatureLen); 136 meta_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 153 NULL, 0, pSignature, pulSignatureLen); 200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 216 pData, ulDataLen, pSignature, pulSignatureLen); 75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | metaVerify.c | 76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 86 if (pData == NULL || pSignature == NULL) { 93 pData, ulDataLen, pSignature, &ulSignatureLen); 136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 150 if (pSignature == NULL && ulSignatureLen != 0) { 157 pSignature, ulSignatureLen, NULL, NULL); 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 214 if (pSignature == NULL || pulDataLen == NULL) { 221 pSignature, ulSignatureLen, pData, pulDataLen); 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | pkcs11Sign.c | 98 CK_BYTE_PTR pSignature, 107 pSignature, pulSignatureLen)); 123 ulDataLen, pSignature, pulSignatureLen); 178 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 186 return (fast_funcs->C_SignFinal(hSession, pSignature, 203 pSignature, pulSignatureLen); 275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 283 pSignature, pulSignatureLen)); 298 ulDataLen, pSignature, pulSignatureLen); 95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | pkcs11Verify.c | 96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 104 pSignature, ulSignatureLen)); 120 ulDataLen, pSignature, ulSignatureLen); 176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 184 return (fast_funcs->C_VerifyFinal(hSession, pSignature, 200 pSignature, ulSignatureLen); 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 281 return (fast_funcs->C_VerifyRecover(hSession, pSignature, 298 pSignature, ulSignatureLen, pData, pulDataLen); 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSign.c | 104 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 151 rv = soft_sign(session_p, pData, ulDataLen, pSignature, 155 (pSignature == NULL && rv == CKR_OK)) { 233 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 269 rv = soft_sign_final(session_p, pSignature, pulSignatureLen); 272 (pSignature == NULL && rv == CKR_OK)) { 361 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 393 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, 397 (pSignature == NULL && rv == CKR_OK)) { 103 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 360 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
|
H A D | softVerify.c | 104 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 151 rv = soft_verify(session_p, pData, ulDataLen, pSignature, 221 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 252 rv = soft_verify_final(session_p, pSignature, ulSignatureLen); 331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 347 if ((pSignature == NULL) || (pulDataLen == NULL)) { 363 rv = soft_verify_recover(session_p, pSignature, 103 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softSignUtil.c | 121 * pSignature: pointer to the signature after signing 131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 157 if (pSignature != NULL) { 162 /* Pass original pSignature, let callee to handle it. */ 164 ulDataLen, pSignature, pulSignatureLen, B_TRUE); 167 if ((rv == CKR_OK) && (pSignature != NULL)) 168 (void) memcpy(pSignature, hmac, *pulSignatureLen); 177 if (pSignature != NULL) { 188 if ((rv == CKR_OK) && (pSignature != NULL)) 189 (void) memcpy(pSignature, signatur 130 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 318 soft_sign_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 426 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | softVerifyUtil.c | 122 * pSignature: pointer to the signature 132 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 177 if (memcmp(hmac, pSignature, len) != 0) { 203 if (memcmp(signature, pSignature, len) != 0) { 214 pSignature, ulSignatureLen, mechanism)); 224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 229 pSignature, ulSignatureLen)); 234 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 239 pSignature, ulSignatureLen)); 244 ulDataLen, pSignature, ulSignatureLe 131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 335 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softDSA.c | 368 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 397 rv = local_dsa_verify(key, pData, pSignature); 367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softEC.c | 540 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 581 signature_item.data = pSignature; 539 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softRSA.c | 642 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, 672 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1); 1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, argument 1216 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1); 641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSign.c | 175 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) 230 pSignature, pulSignatureLen, OP_SINGLE); 244 sign.cs_signbuf = (char *)pSignature; 261 (rv == CKR_OK && pSignature == NULL)) { 373 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 414 NULL, 0, pSignature, pulSignatureLen, OP_FINAL); 430 pSignature, pulSignatureLen, OP_SINGLE); 447 pSignature, pulSignatureLen); 456 sign_final.sf_signbuf = (char *)pSignature; 473 (rv == CKR_OK && pSignature 174 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 604 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument [all...] |
H A D | kernelSoftCommon.c | 166 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag) 178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); 180 if ((rv == CKR_OK) && (pSignature != NULL)) { 181 (void) memcpy(pSignature, hmac, *pulSignatureLen); 192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) 216 if (memcmp(hmac, pSignature, len) != 0) { 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag) argument 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
|
H A D | kernelVerify.c | 179 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 229 pSignature, ulSignatureLen, OP_SINGLE); 242 verify.cv_signbuf = (char *)pSignature; 356 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 392 NULL, 0, pSignature, ulSignatureLen, 419 pSignature, ulSignatureLen); 428 verify_final.vf_signbuf = (char *)pSignature; 562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument 580 if (pSignature == NULL || pulDataLen == NULL) { 601 verify_recover.vr_signbuf = (char *)pSignature; 178 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1701 CK_BYTE_PTR pSignature, 1729 if (! pSignature) 1734 pSignature, pulSignatureLen); 1784 CK_BYTE_PTR pSignature, 1813 if (! pSignature) 1817 &sess->sign_ctx, pSignature, pulSignatureLen); 1872 CK_BYTE_PTR pSignature, 1900 if (! pSignature) 1905 pSignature, pulSignatureLen); 1960 CK_BYTE_PTR pSignature, 1698 SC_Sign(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1783 SC_SignFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1869 SC_SignRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1957 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2036 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | api_interface.c | 1919 CK_BYTE_PTR pSignature, 1933 pSignature, pulSignatureLen); 1969 CK_BYTE_PTR pSignature, 1985 rv = FuncList.ST_SignFinal(rSession, pSignature, 2022 CK_BYTE_PTR pSignature, 2036 ulDataLen, pSignature, pulSignatureLen); 2126 CK_BYTE_PTR pSignature, 2140 pSignature, ulSignatureLen); 2149 CK_BYTE_PTR pSignature, 2158 if (! pSignature) { 1916 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 1968 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 2019 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument 2123 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2148 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |