Searched defs:sig_len (Results 1 - 12 of 12) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c490 CK_ULONG sig_len)
521 if ((len != hmac_len) || (len != sig_len)) {
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
H A Dmech_sha.c220 CK_ULONG sig_len)
247 if ((len != hmac_len) || (len != sig_len)) {
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
H A Dsign_mgr.c336 CK_ULONG * sig_len)
351 ctx, signature, sig_len));
332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
H A Dverify_mgr.c236 CK_ULONG sig_len)
259 signature, sig_len));
264 signature, sig_len));
270 signature, sig_len));
275 signature, sig_len));
313 CK_ULONG sig_len)
328 signature, sig_len));
339 CK_ULONG sig_len,
363 ctx, signature, sig_len, out_data, out_len));
231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
H A Dmech_rsa.c312 CK_ULONG sig_len)
333 if (sig_len != modulus_bytes) {
339 sig_len, key_obj);
349 CK_ULONG sig_len,
373 if (sig_len != modulus_bytes) {
394 CK_ULONG * sig_len)
464 ber_data_len, signature, sig_len);
524 CK_ULONG sig_len)
593 ber_data_len, signature, sig_len);
649 CK_ULONG * sig_len)
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
H A Dtpm_specific.c2570 CK_ULONG sig_len,
2599 result = Tspi_Hash_VerifySignature(hHash, hKey, sig_len, sig);
2627 UINT32 sig_len; local
2652 if ((result = Tspi_Hash_Sign(hHash, hKey, &sig_len, &sig))) {
2658 if (sig_len > *out_data_len) {
2663 (void) memcpy(out_data, sig, sig_len);
2664 *out_data_len = sig_len;
2565 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c86 * sig_len size of the signature location
96 u_char *signature, const int sig_len)
123 if (signature == NULL || sig_len < MD5_LEN)
156 * sig_len length in bytes of signature.
165 const u_char *signature, const int sig_len)
190 if (signature == NULL || key == NULL || sig_len != MD5_LEN)
94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
H A Ddst_api.c235 * sig_len Length of the signature field in bytes.
245 u_char *signature, const int sig_len)
255 signature, sig_len));
279 * sig_len Length of the signature in bytes.
288 const u_char *signature, const int sig_len)
298 signature, sig_len));
243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
/osnet-11/usr/src/lib/libsoftcrypto/common/
H A Dcrypt.c765 ucrypto_sign_final(crypto_ctx_t *context, uchar_t *sig_str, size_t *sig_len) argument
767 return (ucrypto_common_final(context, sig_str, sig_len,
774 uchar_t *sig_str, size_t *sig_len)
777 data_str, data_len, sig_str, sig_len, UCRYPTO_SIGN));
797 ucrypto_verify_final(crypto_ctx_t *context, uchar_t *sig_str, size_t *sig_len) argument
799 return (ucrypto_common_final(context, sig_str, sig_len,
806 uchar_t *sig_str, size_t *sig_len)
809 data_str, data_len, sig_str, sig_len, UCRYPTO_VERIFY));
772 ucrypto_sign(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
804 ucrypto_verify(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
/osnet-11/usr/src/lib/libelfsign/common/
H A Delfcertlib.c472 * sig_len - actual length used; 0 on failure.
479 uchar_t *sig, size_t *sig_len)
517 signature.Length = *sig_len;
541 *sig_len = 0;
544 *sig_len = signature.Length;
554 * sig_len
562 const uchar_t *signature, size_t sig_len,
576 insig.Length = sig_len;
477 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument
561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
H A Delfsignlib.c105 int sig_len,
129 dn_len + sig_len + oid_len));
138 dn_len + sig_len + oid_len;
146 fsgp->filesig_v1_sigsize = sig_len;
156 fsgp->filesig_v3_sigsize = sig_len;
168 (void) memcpy(fsdatap, (char *)sig, sig_len);
169 fsdatap += sig_len;
845 int sig_len,
850 sig, sig_len, oid, oid_len));
858 size_t *sig_len)
100 filesig_insert_dso(struct filesignatures *fssp, filesig_vers_t version, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument
840 elfsign_insert_dso(ELFsign_t ess, struct filesignatures *fssp, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument
855 elfsign_extract_sig(ELFsign_t ess, struct filesignatures *fssp, uchar_t *sig, size_t *sig_len) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c1000 unsigned int sig_len = 0; local
1197 digestInfo_len, &sig, &sig_len);
1204 &sig, &sig_len);
1207 print_buffer(sig, sig_len);
1216 (int)sig_len)) {
4823 unsigned int *sig_len)
4825 if (create_signature(sig, sig_len, data, data_len,
4840 unsigned int *sig_len)
4904 *sig_len = len;
4917 unsigned int *sig_len)
4818 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4835 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4912 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4976 create_signature(unsigned char **sig, unsigned int *sig_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey) argument
[all...]

Completed in 69 milliseconds