/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 490 CK_ULONG sig_len) 521 if ((len != hmac_len) || (len != sig_len)) { 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 220 CK_ULONG sig_len) 247 if ((len != hmac_len) || (len != sig_len)) { 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | sign_mgr.c | 336 CK_ULONG * sig_len) 351 ctx, signature, sig_len)); 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
|
H A D | verify_mgr.c | 236 CK_ULONG sig_len) 259 signature, sig_len)); 264 signature, sig_len)); 270 signature, sig_len)); 275 signature, sig_len)); 313 CK_ULONG sig_len) 328 signature, sig_len)); 339 CK_ULONG sig_len, 363 ctx, signature, sig_len, out_data, out_len)); 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
|
H A D | mech_rsa.c | 312 CK_ULONG sig_len) 333 if (sig_len != modulus_bytes) { 339 sig_len, key_obj); 349 CK_ULONG sig_len, 373 if (sig_len != modulus_bytes) { 394 CK_ULONG * sig_len) 464 ber_data_len, signature, sig_len); 524 CK_ULONG sig_len) 593 ber_data_len, signature, sig_len); 649 CK_ULONG * sig_len) 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | tpm_specific.c | 2570 CK_ULONG sig_len, 2599 result = Tspi_Hash_VerifySignature(hHash, hKey, sig_len, sig); 2627 UINT32 sig_len; local 2652 if ((result = Tspi_Hash_Sign(hHash, hKey, &sig_len, &sig))) { 2658 if (sig_len > *out_data_len) { 2663 (void) memcpy(out_data, sig, sig_len); 2664 *out_data_len = sig_len; 2565 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 86 * sig_len size of the signature location 96 u_char *signature, const int sig_len) 123 if (signature == NULL || sig_len < MD5_LEN) 156 * sig_len length in bytes of signature. 165 const u_char *signature, const int sig_len) 190 if (signature == NULL || key == NULL || sig_len != MD5_LEN) 94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
|
H A D | dst_api.c | 235 * sig_len Length of the signature field in bytes. 245 u_char *signature, const int sig_len) 255 signature, sig_len)); 279 * sig_len Length of the signature in bytes. 288 const u_char *signature, const int sig_len) 298 signature, sig_len)); 243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
|
/osnet-11/usr/src/lib/libsoftcrypto/common/ |
H A D | crypt.c | 765 ucrypto_sign_final(crypto_ctx_t *context, uchar_t *sig_str, size_t *sig_len) argument 767 return (ucrypto_common_final(context, sig_str, sig_len, 774 uchar_t *sig_str, size_t *sig_len) 777 data_str, data_len, sig_str, sig_len, UCRYPTO_SIGN)); 797 ucrypto_verify_final(crypto_ctx_t *context, uchar_t *sig_str, size_t *sig_len) argument 799 return (ucrypto_common_final(context, sig_str, sig_len, 806 uchar_t *sig_str, size_t *sig_len) 809 data_str, data_len, sig_str, sig_len, UCRYPTO_VERIFY)); 772 ucrypto_sign(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument 804 ucrypto_verify(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
|
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 472 * sig_len - actual length used; 0 on failure. 479 uchar_t *sig, size_t *sig_len) 517 signature.Length = *sig_len; 541 *sig_len = 0; 544 *sig_len = signature.Length; 554 * sig_len 562 const uchar_t *signature, size_t sig_len, 576 insig.Length = sig_len; 477 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument 561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
|
H A D | elfsignlib.c | 105 int sig_len, 129 dn_len + sig_len + oid_len)); 138 dn_len + sig_len + oid_len; 146 fsgp->filesig_v1_sigsize = sig_len; 156 fsgp->filesig_v3_sigsize = sig_len; 168 (void) memcpy(fsdatap, (char *)sig, sig_len); 169 fsdatap += sig_len; 845 int sig_len, 850 sig, sig_len, oid, oid_len)); 858 size_t *sig_len) 100 filesig_insert_dso(struct filesignatures *fssp, filesig_vers_t version, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument 840 elfsign_insert_dso(ELFsign_t ess, struct filesignatures *fssp, const char *dn, int dn_len, const uchar_t *sig, int sig_len, const char *oid, int oid_len) argument 855 elfsign_extract_sig(ELFsign_t ess, struct filesignatures *fssp, uchar_t *sig, size_t *sig_len) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 1000 unsigned int sig_len = 0; local 1197 digestInfo_len, &sig, &sig_len); 1204 &sig, &sig_len); 1207 print_buffer(sig, sig_len); 1216 (int)sig_len)) { 4823 unsigned int *sig_len) 4825 if (create_signature(sig, sig_len, data, data_len, 4840 unsigned int *sig_len) 4904 *sig_len = len; 4917 unsigned int *sig_len) 4818 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4835 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4912 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4976 create_signature(unsigned char **sig, unsigned int *sig_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey) argument [all...] |