Searched refs:signed_data (Results 1 - 6 of 6) sorted by relevance
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto.h | 149 unsigned char **signed_data, /* OUT 154 receives length of signed_data */ 173 unsigned char *signed_data, /* IN 177 contains length of signed_data*/ 229 unsigned char **signed_data, /* OUT 232 receives length of signed_data */
|
H A D | pkinit_crypto_openssl.c | 981 unsigned char **signed_data, 1009 if (signed_data == NULL) 1262 if ((p = *signed_data = 1280 print_buffer_bin(*signed_data, *signed_data_len, 1284 print_buffer_bin(*signed_data, *signed_data_len, 1287 print_buffer_bin(*signed_data, *signed_data_len, 1328 unsigned char *signed_data, 1344 const unsigned char *p = signed_data; 1363 print_buffer_bin(signed_data, signed_data_len, 1712 unsigned char *p = NULL, *signed_data local 973 cms_signeddata_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, int include_certchain, unsigned char *data, unsigned int data_len, unsigned char **signed_data, unsigned int *signed_data_len) argument 1322 cms_signeddata_verify(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int cms_msg_type, int require_crl_checking, unsigned char *signed_data, unsigned int signed_data_len, unsigned char **data, unsigned int *data_len, unsigned char **authz_data, unsigned int *authz_data_len, int *is_signed) argument [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 734 /* Get the tbs_data and signed_data attributes now */ 3014 KMF_DATA signed_data = {0, NULL}; local 3044 signed_data.Length = data_to_sign.Length*2; 3045 signed_data.Data = calloc(1, signed_data.Length); 3046 if (!signed_data.Data) { 3095 &signed_data, sizeof (KMF_DATA)); 3116 ret = DerEncodeECDSASignature(&signed_data, &signature); 3117 kmf_free_data(&signed_data); 3131 ret = DerEncodeDSASignature(&signed_data, 3173 KMF_DATA signed_data = {0, NULL}; local 3264 KMF_DATA signed_data = {0, NULL}; local [all...] |
H A D | csrcrlop.c | 369 KMF_DATA signed_data = {0, NULL}; local 389 signed_data.Length = SubjectCsr->Length*2; 390 signed_data.Data = calloc(1, signed_data.Length); 391 if (!signed_data.Data) { 410 &signed_data, sizeof (KMF_DATA)); 442 ret = DerEncodeDSASignature(&signed_data, &signature); 443 kmf_free_data(&signed_data); 450 subj_csr.signature.encrypted = signed_data; 467 kmf_free_data(&signed_data); [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1023 SECItem signed_data; local 1026 signed_data.data = 0; 1065 rv = SEC_SignData(&signed_data, tobesigned->Data, 1073 if (signed_data.len <= output->Length) { 1074 (void) memcpy(output->Data, signed_data.data, signed_data.len); 1075 output->Length = signed_data.len; 1080 free(signed_data.data);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 534 CK_BYTE signed_data[MAX_RSA_KEYLENGTH_IN_BYTES]; local 615 rv = soft_rsa_decrypt(key, plain_data, modulus_len, signed_data); 618 (void) memcpy(pSigned, signed_data, modulus_len);
|
Completed in 51 milliseconds