Searched refs:pSignature (Results 1 - 25 of 25) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSignUtil.c121 * pSignature: pointer to the signature after signing
131 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
157 if (pSignature != NULL) {
162 /* Pass original pSignature, let callee to handle it. */
164 ulDataLen, pSignature, pulSignatureLen, B_TRUE);
167 if ((rv == CKR_OK) && (pSignature != NULL))
168 (void) memcpy(pSignature, hmac, *pulSignatureLen);
177 if (pSignature != NULL) {
188 if ((rv == CKR_OK) && (pSignature != NULL))
189 (void) memcpy(pSignature, signatur
130 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
318 soft_sign_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
426 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
[all...]
H A DsoftVerifyUtil.c122 * pSignature: pointer to the signature
132 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
177 if (memcmp(hmac, pSignature, len) != 0) {
203 if (memcmp(signature, pSignature, len) != 0) {
214 pSignature, ulSignatureLen, mechanism));
224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
229 pSignature, ulSignatureLen));
234 ulDataLen, pSignature, ulSignatureLen, B_FALSE));
239 pSignature, ulSignatureLen));
244 ulDataLen, pSignature, ulSignatureLe
131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
335 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A DsoftSign.c104 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
151 rv = soft_sign(session_p, pData, ulDataLen, pSignature,
155 (pSignature == NULL && rv == CKR_OK)) {
233 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
269 rv = soft_sign_final(session_p, pSignature, pulSignatureLen);
272 (pSignature == NULL && rv == CKR_OK)) {
361 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
393 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature,
397 (pSignature == NULL && rv == CKR_OK)) {
103 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
360 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DsoftVerify.c104 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
151 rv = soft_verify(session_p, pData, ulDataLen, pSignature,
221 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
252 rv = soft_verify_final(session_p, pSignature, ulSignatureLen);
331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
347 if ((pSignature == NULL) || (pulDataLen == NULL)) {
363 rv = soft_verify_recover(session_p, pSignature,
103 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A DsoftRSA.h80 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen,
94 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen,
H A DsoftDSA.h62 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen);
H A DsoftEC.h60 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen);
H A DsoftRSA.c642 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
672 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, argument
1216 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
H A DsoftDSA.c368 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
397 rv = local_dsa_verify(key, pData, pSignature);
367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A DsoftEC.c540 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
581 signature_item.data = pSignature;
539 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsSign.c41 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
62 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
86 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
40 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
85 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DkmsVerify.c41 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
62 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaVerify.c76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
86 if (pData == NULL || pSignature == NULL) {
93 pData, ulDataLen, pSignature, &ulSignatureLen);
136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
150 if (pSignature == NULL && ulSignatureLen != 0) {
157 pSignature, ulSignatureLen, NULL, NULL);
204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
214 if (pSignature == NULL || pulDataLen == NULL) {
221 pSignature, ulSignatureLen, pData, pulDataLen);
75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A Dpkcs11Sign.c98 CK_BYTE_PTR pSignature,
107 pSignature, pulSignatureLen));
123 ulDataLen, pSignature, pulSignatureLen);
178 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
186 return (fast_funcs->C_SignFinal(hSession, pSignature,
203 pSignature, pulSignatureLen);
275 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
283 pSignature, pulSignatureLen));
298 ulDataLen, pSignature, pulSignatureLen);
95 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A Dpkcs11Verify.c96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
104 pSignature, ulSignatureLen));
120 ulDataLen, pSignature, ulSignatureLen);
176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
184 return (fast_funcs->C_VerifyFinal(hSession, pSignature,
200 pSignature, ulSignatureLen);
273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
281 return (fast_funcs->C_VerifyRecover(hSession, pSignature,
298 pSignature, ulSignatureLen, pData, pulDataLen);
95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A DmetaSign.c77 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
93 pData, ulDataLen, pSignature, pulSignatureLen);
136 meta_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
153 NULL, 0, pSignature, pulSignatureLen);
200 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
216 pData, ulDataLen, pSignature, pulSignatureLen);
75 meta_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
H A DmetaGlobal.h786 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen);
789 CK_RV meta_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature,
794 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen);
798 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen);
801 CK_RV meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature,
805 CK_RV meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature,
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.h57 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag);
59 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag);
H A DkernelSoftCommon.c166 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag)
178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE);
180 if ((rv == CKR_OK) && (pSignature != NULL)) {
181 (void) memcpy(pSignature, hmac, *pulSignatureLen);
192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag)
216 if (memcmp(hmac, pSignature, len) != 0) {
165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen, int opflag) argument
191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
H A DkernelSign.c175 CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
230 pSignature, pulSignatureLen, OP_SINGLE);
244 sign.cs_signbuf = (char *)pSignature;
261 (rv == CKR_OK && pSignature == NULL)) {
373 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
414 NULL, 0, pSignature, pulSignatureLen, OP_FINAL);
430 pSignature, pulSignatureLen, OP_SINGLE);
447 pSignature, pulSignatureLen);
456 sign_final.sf_signbuf = (char *)pSignature;
473 (rv == CKR_OK && pSignature
174 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
604 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
[all...]
H A DkernelVerify.c179 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
229 pSignature, ulSignatureLen, OP_SINGLE);
242 verify.cv_signbuf = (char *)pSignature;
356 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
392 NULL, 0, pSignature, ulSignatureLen,
419 pSignature, ulSignatureLen);
428 verify_final.vf_signbuf = (char *)pSignature;
562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, argument
580 if (pSignature == NULL || pulDataLen == NULL) {
601 verify_recover.vr_signbuf = (char *)pSignature;
178 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/include/
H A Dpkcs11f.h560 CK_BYTE_PTR pSignature, /* gets the signature */
585 CK_BYTE_PTR pSignature, /* gets the signature */
611 CK_BYTE_PTR pSignature, /* gets the signature */
642 CK_BYTE_PTR pSignature, /* signature */
667 CK_BYTE_PTR pSignature, /* signature to verify */
691 CK_BYTE_PTR pSignature, /* signature to verify */
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c1701 CK_BYTE_PTR pSignature,
1729 if (! pSignature)
1734 pSignature, pulSignatureLen);
1784 CK_BYTE_PTR pSignature,
1813 if (! pSignature)
1817 &sess->sign_ctx, pSignature, pulSignatureLen);
1872 CK_BYTE_PTR pSignature,
1900 if (! pSignature)
1905 pSignature, pulSignatureLen);
1960 CK_BYTE_PTR pSignature,
1698 SC_Sign(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
1783 SC_SignFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
1869 SC_SignRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
1957 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2036 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A Dapi_interface.c1919 CK_BYTE_PTR pSignature,
1933 pSignature, pulSignatureLen);
1969 CK_BYTE_PTR pSignature,
1985 rv = FuncList.ST_SignFinal(rSession, pSignature,
2022 CK_BYTE_PTR pSignature,
2036 ulDataLen, pSignature, pulSignatureLen);
2126 CK_BYTE_PTR pSignature,
2140 pSignature, ulSignatureLen);
2149 CK_BYTE_PTR pSignature,
2158 if (! pSignature) {
1916 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
1968 C_SignFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
2019 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen) argument
2123 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2148 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A Dtpmtok_int.h1441 CK_ULONG usDataLen, CK_BYTE_PTR pSignature,
1449 (ST_SESSION_T hSession, CK_BYTE_PTR pSignature,
1458 CK_ULONG usDataLen, CK_BYTE_PTR pSignature,
1467 CK_ULONG usDataLen, CK_BYTE_PTR pSignature,
1475 (ST_SESSION_T hSession, CK_BYTE_PTR pSignature,
1483 (ST_SESSION_T hSession, CK_BYTE_PTR pSignature,

Completed in 76 milliseconds