/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 120 * pSignature: pointer to the signature after signing 121 * pulSignatureLen: pointer to the length of the signature 172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 177 ulDataLen, signature, pulSignatureLen, B_TRUE, 186 (void) memcpy(pSignature, signature, *pulSignatureLen); 302 * pSignature: pointer to the signature after signing 303 * pulSignatureLen: pointer to the length of the signature 353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 358 signature, pulSignatureLen, B_TRUE, B_TRUE); 366 (void) memcpy(pSignature, signature, *pulSignatureLe [all...] |
H A D | softVerifyUtil.c | 121 * pSignature: pointer to the signature 122 * ulSignatureLen: length of the signature 179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 187 ulDataLen, signature, &len, B_FALSE, B_FALSE); 194 if (memcmp(signature, pSignature, len) != 0) { 313 * pSignature: pointer to the signature 314 * ulSignatureLen: length of the signature 370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 378 signature, &len, B_FALSE, B_TRUE); 385 if (memcmp(signature, pSignatur [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 489 CK_BYTE * signature, 497 if (! sess || ! ctx || ! in_data || ! signature) { 524 if (memcmp(hmac, signature, hmac_len) != 0) { 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 219 CK_BYTE *signature, 227 if (! sess || ! ctx || ! in_data || ! signature) { 252 if (memcmp(hmac, signature, hmac_len) != 0) { 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | sign_mgr.c | 268 // if the caller just wants the signature length, there is no reason to 335 CK_BYTE * signature, 351 ctx, signature, sig_len)); 376 // if the caller just wants the signature length, there is no reason to 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
|
H A D | verify_mgr.c | 235 CK_BYTE * signature, 248 if (! in_data || ! signature) { 259 signature, sig_len)); 264 signature, sig_len)); 270 signature, sig_len)); 275 signature, sig_len)); 312 CK_BYTE * signature, 328 signature, sig_len)); 338 CK_BYTE * signature, 353 if (! signature || ! out_le 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | mech_rsa.c | 311 CK_BYTE * signature, 338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature, 348 CK_BYTE *signature, 382 signature, modulus_bytes, out_data, out_data_len, key_obj); 393 CK_BYTE * signature, 464 ber_data_len, signature, sig_len); 523 CK_BYTE * signature, 593 ber_data_len, signature, sig_len); 648 CK_BYTE * signature, 711 ber_data_len, signature, sig_le 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | signing.c | 46 #define SMBSIGOFF 14 /* SMB signature offset */ 47 #define SMBSIGLEN 8 /* SMB signature length */ 67 uint32_t seqno, uchar_t *signature) 87 uint32_t sig[2]; /* MAC signature, aligned! */ 133 * Finally, store the signature. 136 if (signature) 137 bcopy(digest, signature, SMBSIGLEN); 185 * Verify reply signature. 234 * Compare the computed signature with the 240 DPRINT("BAD signature, MI 66 smb_compute_MAC(struct smb_ctx *ctx, mbuf_t *m, uint32_t seqno, uchar_t *signature) argument [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_thread.h | 59 uint32_t signature; member in struct:_iscsi_thread
|
H A D | iscsi_doorclt.c | 56 size_t signature; member in struct:_mybuffer 210 ASSERT(buffer->signature == ISCSI_DOOR_REQ_SIGNATURE); 211 if (buffer->signature == ISCSI_DOOR_REQ_SIGNATURE) { 281 buffer->signature = ISCSI_DOOR_REQ_SIGNATURE; 331 req->hdr.signature = ISCSI_DOOR_REQ_SIGNATURE; 375 (cnf->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) ||
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.c | 210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument 229 return (func->Verify(ctx, key, keylen, signature, siglen));
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 73 #define SMBSIGLEN 8 /* SMB signature length */ 74 #define SMBSIGOFF 14 /* SMB signature offset */ 84 uint32_t seqno, uchar_t *signature) 107 uint32_t sig[2]; /* MAC signature, aligned! */ 179 * Finally, store the signature. 182 if (signature) 183 bcopy(mac, signature, SMBSIGLEN); 231 * Verify reply signature. 266 * Compute the expected signature in sigbuf. 280 * Compare the computed signature wit 83 smb_compute_MAC(struct smb_vc *vcp, mblk_t *mp, uint32_t seqno, uchar_t *signature) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_sign.c | 147 crypto_data_t *signature, crypto_call_req_t *cr) 162 NULL, data, signature, NULL); 201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, argument 218 NULL, NULL, signature, NULL); 229 crypto_ctx_template_t tmpl, crypto_data_t *signature, 248 key, data, signature, tmpl); 258 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 305 key, data, spi_ctx_tmpl, signature, 309 &lmech, key, data, spi_ctx_tmpl, signature, 317 mech, key, data, signature, spi_ctx_tmp 146 crypto_sign_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument 227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 431 crypto_sign_recover_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_verify.c | 148 crypto_data_t *signature, crypto_call_req_t *cr) 163 NULL, data, signature, NULL); 203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, argument 220 NULL, NULL, NULL, signature, NULL); 231 crypto_ctx_template_t tmpl, crypto_data_t *signature, 250 key, data, signature, tmpl); 260 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 307 key, data, spi_ctx_tmpl, signature, 312 &lmech, key, signature, spi_ctx_tmpl, data, 320 mech, key, data, signature, spi_ctx_tmp 147 crypto_verify_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument 229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 433 crypto_verify_recover_single(crypto_context_t context, crypto_data_t *signature, crypto_data_t *data, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/uts/common/io/usb/scsa2usb/ |
H A D | usb_ms_bulkonly.c | 166 * - check length equals 13, signature, and matching tag 570 uint_t signature, tag, status; local 602 signature = SCSA2USB_MK_32BIT(csw.csw_dCSWSignature3, 613 signature, status, tag, residue); 616 if ((signature != CSW_SIGNATURE) || (tag != cmd->cmd_tag) ||
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 77 * UPDATE (hash (more) data), FINAL (generate a signature). This 85 * signature location to store signature. 86 * sig_len size of the signature location 88 * N Success on SIG_MODE_FINAL = returns signature length in bytes 96 u_char *signature, const int sig_len) 123 if (signature == NULL || sig_len < MD5_LEN) 125 MD5Final(signature, ctx); 130 MD5Update(ctx, signature, MD5_LEN); 131 MD5Final(signature, ct 94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument [all...] |
/illumos-gate/usr/src/common/crypto/dsa/ |
H A D | dsa_impl.h | 80 BIGNUM r; /* r (signature 1st part) */ 81 BIGNUM s; /* s (signature 2st part) */ 99 uchar_t *signature; /* concat(r, s) */ member in struct:__anon1955
|
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | pci_io.c | 308 unsigned long signature; local 329 : "=d" (signature), 339 if (present_status || (signature != PCI_SIGNATURE)) { 370 if (check->fields.signature != BIOS32_SIGNATURE)
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | smp-imps.h | 148 unsigned signature; member in struct:imps_processor
|
/illumos-gate/usr/src/uts/common/io/cpqary3/ |
H A D | cpqary3_talk2ctlr.c | 437 uint8_t signature[4] = { 'C', 'I', 'S', 'S' }; local 472 * Validate the signature - should be "CISS" 479 signature[cntr]) {
|
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/include/ |
H A D | iscsi_info.h | 50 u32_t signature; member in struct:_iscsi_info_block_hdr_t
|
/illumos-gate/usr/src/uts/sun4/sys/ |
H A D | cpu_sgnblk_defs.h | 44 * Build a CPU signature given a signature, state and sub-state. 50 * Definition of a CPU signature. 58 uint32_t signature; member in union:__anon9757 62 * CPU Signatures - the signature defines the entity that the CPU is executing. 63 * This entity can be the OS, OPB or the debugger. This signature consists of
|
/illumos-gate/usr/src/uts/common/io/i40e/core/ |
H A D | i40e_hmc.h | 104 u32 signature; member in struct:i40e_hmc_info
|
/illumos-gate/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_property.c | 195 char signature[1024]; local 208 (void) snprintf(signature, sizeof (signature), 213 env, class, "<init>", signature); 221 (void) snprintf(signature, sizeof (signature), 227 env, class, "<init>", signature); 288 char signature[1024]; local 295 (void) snprintf(signature, sizeof (signature), 341 char signature[1024]; local 412 char signature[1024]; local 437 char signature[1024]; local [all...] |
/illumos-gate/usr/src/boot/sys/amd64/include/pc/ |
H A D | bios.h | 111 struct bios_oem_signature signature[]; member in struct:bios_oem
|