/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 490 CK_ULONG sig_len) 521 if ((len != hmac_len) || (len != sig_len)) { 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 220 CK_ULONG sig_len) 247 if ((len != hmac_len) || (len != sig_len)) { 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | sign_mgr.c | 336 CK_ULONG * sig_len) 351 ctx, signature, sig_len)); 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
|
H A D | verify_mgr.c | 236 CK_ULONG sig_len) 259 signature, sig_len)); 264 signature, sig_len)); 270 signature, sig_len)); 275 signature, sig_len)); 313 CK_ULONG sig_len) 328 signature, sig_len)); 339 CK_ULONG sig_len, 363 ctx, signature, sig_len, out_data, out_len)); 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
|
H A D | mech_rsa.c | 312 CK_ULONG sig_len) 333 if (sig_len != modulus_bytes) { 339 sig_len, key_obj); 349 CK_ULONG sig_len, 373 if (sig_len != modulus_bytes) { 394 CK_ULONG * sig_len) 464 ber_data_len, signature, sig_len); 524 CK_ULONG sig_len) 593 ber_data_len, signature, sig_len); 649 CK_ULONG * sig_len) 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | tpm_specific.c | 2505 CK_ULONG sig_len, 2534 result = Tspi_Hash_VerifySignature(hHash, hKey, sig_len, sig); 2562 UINT32 sig_len; local 2587 if ((result = Tspi_Hash_Sign(hHash, hKey, &sig_len, &sig))) { 2593 if (sig_len > *out_data_len) { 2598 (void) memcpy(out_data, sig, sig_len); 2599 *out_data_len = sig_len; 2500 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 86 * sig_len size of the signature location 96 u_char *signature, const int sig_len) 123 if (signature == NULL || sig_len < MD5_LEN) 156 * sig_len length in bytes of signature. 165 const u_char *signature, const int sig_len) 190 if (signature == NULL || key == NULL || sig_len != MD5_LEN) 94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
|
H A D | dst_api.c | 235 * sig_len Length of the signature field in bytes. 245 u_char *signature, const int sig_len) 255 signature, sig_len)); 279 * sig_len Length of the signature in bytes. 288 const u_char *signature, const int sig_len) 298 signature, sig_len)); 243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
|
/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 491 * sig_len - actual length used; 0 on failure. 498 uchar_t *sig, size_t *sig_len) 536 signature.Length = *sig_len; 560 *sig_len = 0; 563 *sig_len = signature.Length; 573 * sig_len 581 const uchar_t *signature, size_t sig_len, 595 insig.Length = sig_len; 496 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument 580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
|
H A D | elfsignlib.c | 105 int sig_len, 129 dn_len + sig_len + oid_len)); 138 dn_len + sig_len + oid_len; 146 fsgp->filesig_v1_sigsize = sig_len; 156 fsgp->filesig_v3_sigsize = sig_len; 168 (void) memcpy(fsdatap, (char *)sig, sig_len); 169 fsdatap += sig_len; 846 int sig_len, 851 sig, sig_len, oid, oid_len)); 859 size_t *sig_len) 100 filesig_insert_dso(struct filesignatures *fssp, filesig_vers_t version, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument 841 elfsign_insert_dso(ELFsign_t ess, struct filesignatures *fssp, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument 856 elfsign_extract_sig(ELFsign_t ess, struct filesignatures *fssp, uchar_t *sig, size_t *sig_len) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/elfsign/ |
H A D | elfsign.c | 500 size_t sig_len = SIG_MAX_LENGTH; local 598 hash, hash_len, sig, &sig_len)) { 607 const int sigstr_len = sizeof (char) * sig_len * 2 + 1; 610 tohexstr(sig, sig_len, sigstr, sigstr_len); 616 dn, dn_len, sig, sig_len, NULL, 0); 648 bzero(sig, sig_len);
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 868 unsigned int sig_len = 0; local 1065 digestInfo_len, &sig, &sig_len); 1072 &sig, &sig_len); 1075 print_buffer(sig, sig_len); 1084 (int)sig_len)) { 4641 unsigned int *sig_len) 4643 if (create_signature(sig, sig_len, data, data_len, 4658 unsigned int *sig_len) 4722 *sig_len = len; 4735 unsigned int *sig_len) 4636 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4653 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4730 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4795 create_signature(unsigned char **sig, unsigned int *sig_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey) argument [all...] |