Searched defs:ulSignatureLen (Results 1 - 12 of 12) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsVerify.c41 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
63 CK_ULONG ulSignatureLen)
85 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
62 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaVerify.c76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
93 pData, ulDataLen, pSignature, &ulSignatureLen);
137 CK_ULONG ulSignatureLen)
150 if (pSignature == NULL && ulSignatureLen != 0) {
157 pSignature, ulSignatureLen, NULL, NULL);
205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
221 pSignature, ulSignatureLen, pData, pulDataLen);
75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A Dpkcs11Verify.c96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
104 pSignature, ulSignatureLen));
120 ulDataLen, pSignature, ulSignatureLen);
177 CK_ULONG ulSignatureLen)
185 ulSignatureLen));
200 pSignature, ulSignatureLen);
274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
282 ulSignatureLen, pData, pulDataLen));
298 pSignature, ulSignatureLen, pData, pulDataLen);
95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerify.c104 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
152 ulSignatureLen);
222 CK_ULONG ulSignatureLen)
252 rv = soft_verify_final(session_p, pSignature, ulSignatureLen);
332 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
364 ulSignatureLen, pData, pulDataLen);
103 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
221 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A DsoftVerifyUtil.c123 * ulSignatureLen: length of the signature
133 CK_ULONG ulSignatureLen)
141 } else if (ulSignatureLen == 0) {
173 if (len != ulSignatureLen) {
199 if (len != ulSignatureLen) {
214 pSignature, ulSignatureLen, mechanism));
224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE));
229 pSignature, ulSignatureLen));
234 ulDataLen, pSignature, ulSignatureLen, B_FALSE));
239 pSignature, ulSignatureLen));
131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
335 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
[all...]
H A DsoftDSA.c369 CK_ULONG ulSignatureLen)
390 if ((ulSignatureLen != MIN_DSA_SIGNATURE_LEN_BYTES) &&
391 (ulSignatureLen != MID_DSA_SIGNATURE_LEN_BYTES) &&
392 (ulSignatureLen != MAX_DSA_SIGNATURE_LEN_BYTES)) {
367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A DsoftEC.c541 CK_ULONG ulSignatureLen)
557 if (ulSignatureLen > EC_MAX_SIG_LEN) {
582 signature_item.len = ulSignatureLen;
539 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
H A DsoftRSA.c643 CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism)
663 if (ulSignatureLen != (CK_ULONG)modulus_len) {
715 plain_data + ulSignatureLen - ulDataLen,
1191 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
1207 if (ulSignatureLen != (CK_ULONG)modulus_len) {
641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument
1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag)
212 if (len != ulSignatureLen) {
191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
H A DkernelVerify.c179 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
229 pSignature, ulSignatureLen, OP_SINGLE);
241 verify.cv_signlen = ulSignatureLen;
357 CK_ULONG ulSignatureLen)
392 NULL, 0, pSignature, ulSignatureLen,
419 pSignature, ulSignatureLen);
427 verify_final.vf_signlen = ulSignatureLen;
563 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
600 verify_recover.vr_signlen = ulSignatureLen;
178 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
356 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c1961 CK_ULONG ulSignatureLen)
1988 pSignature, ulSignatureLen);
2038 CK_ULONG ulSignatureLen)
2066 pSignature, ulSignatureLen);
2119 CK_ULONG ulSignatureLen,
2152 &sess->verify_ctx, pSignature, ulSignatureLen,
1957 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2036 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
H A Dapi_interface.c2127 CK_ULONG ulSignatureLen)
2140 pSignature, ulSignatureLen);
2150 CK_ULONG ulSignatureLen)
2167 ulSignatureLen);
2203 CK_ULONG ulSignatureLen,
2218 ulSignatureLen, pData, pulDataLen);
2123 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2148 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument

Completed in 47 milliseconds