/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaVerify.c | 76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 93 pData, ulDataLen, pSignature, &ulSignatureLen); 137 CK_ULONG ulSignatureLen) 150 if (pSignature == NULL && ulSignatureLen != 0) { 157 pSignature, ulSignatureLen, NULL, NULL); 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 221 pSignature, ulSignatureLen, pData, pulDataLen); 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | pkcs11Verify.c | 96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 104 pSignature, ulSignatureLen)); 120 ulDataLen, pSignature, ulSignatureLen); 177 CK_ULONG ulSignatureLen) 185 ulSignatureLen)); 200 pSignature, ulSignatureLen); 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 282 ulSignatureLen, pData, pulDataLen)); 298 pSignature, ulSignatureLen, pData, pulDataLen); 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerify.c | 105 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 153 ulSignatureLen); 223 CK_ULONG ulSignatureLen) 253 rv = soft_verify_final(session_p, pSignature, ulSignatureLen); 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 365 ulSignatureLen, pData, pulDataLen); 104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 222 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 332 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softVerifyUtil.c | 122 * ulSignatureLen: length of the signature 132 CK_ULONG ulSignatureLen) 164 if (len != ulSignatureLen) { 190 if (len != ulSignatureLen) { 205 pSignature, ulSignatureLen, mechanism)); 214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 219 pSignature, ulSignatureLen)); 224 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 229 pSignature, ulSignatureLen)); 234 ulDataLen, pSignature, ulSignatureLen, B_FALS 130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 322 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 439 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softDSA.c | 326 CK_ULONG ulSignatureLen) 345 if (ulSignatureLen != DSA_SIGNATURE_LENGTH) { 324 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softEC.c | 531 CK_ULONG ulSignatureLen) 547 if (ulSignatureLen > EC_MAX_SIG_LEN) { 572 signature_item.len = ulSignatureLen; 529 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softRSA.c | 642 CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) 662 if (ulSignatureLen != (CK_ULONG)modulus_len) { 713 plain_data + ulSignatureLen - ulDataLen, 1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 1192 if (ulSignatureLen != (CK_ULONG)modulus_len) { 640 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 1175 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) 212 if (len != ulSignatureLen) { 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
|
H A D | kernelVerify.c | 180 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 230 pSignature, ulSignatureLen, OP_SINGLE); 242 verify.cv_signlen = ulSignatureLen; 358 CK_ULONG ulSignatureLen) 393 NULL, 0, pSignature, ulSignatureLen, 420 pSignature, ulSignatureLen); 428 verify_final.vf_signlen = ulSignatureLen; 564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 601 verify_recover.vr_signlen = ulSignatureLen; 179 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 357 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 563 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1969 CK_ULONG ulSignatureLen) 1996 pSignature, ulSignatureLen); 2046 CK_ULONG ulSignatureLen) 2074 pSignature, ulSignatureLen); 2127 CK_ULONG ulSignatureLen, 2160 &sess->verify_ctx, pSignature, ulSignatureLen, 1965 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2044 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2125 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | api_interface.c | 2125 CK_ULONG ulSignatureLen) 2138 pSignature, ulSignatureLen); 2148 CK_ULONG ulSignatureLen) 2165 ulSignatureLen); 2201 CK_ULONG ulSignatureLen, 2216 ulSignatureLen, pData, pulDataLen); 2121 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2146 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2199 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|