/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsVerify.c | 41 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 63 CK_ULONG ulSignatureLen) 85 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 62 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaVerify.c | 76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 93 pData, ulDataLen, pSignature, &ulSignatureLen); 137 CK_ULONG ulSignatureLen) 150 if (pSignature == NULL && ulSignatureLen != 0) { 157 pSignature, ulSignatureLen, NULL, NULL); 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 221 pSignature, ulSignatureLen, pData, pulDataLen); 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 136 meta_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 204 meta_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | pkcs11Verify.c | 96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 104 pSignature, ulSignatureLen)); 120 ulDataLen, pSignature, ulSignatureLen); 177 CK_ULONG ulSignatureLen) 185 ulSignatureLen)); 200 pSignature, ulSignatureLen); 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 282 ulSignatureLen, pData, pulDataLen)); 298 pSignature, ulSignatureLen, pData, pulDataLen); 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 176 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 273 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerify.c | 104 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 152 ulSignatureLen); 222 CK_ULONG ulSignatureLen) 252 rv = soft_verify_final(session_p, pSignature, ulSignatureLen); 332 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 364 ulSignatureLen, pData, pulDataLen); 103 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 221 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 331 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | softVerifyUtil.c | 123 * ulSignatureLen: length of the signature 133 CK_ULONG ulSignatureLen) 141 } else if (ulSignatureLen == 0) { 173 if (len != ulSignatureLen) { 199 if (len != ulSignatureLen) { 214 pSignature, ulSignatureLen, mechanism)); 224 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); 229 pSignature, ulSignatureLen)); 234 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); 239 pSignature, ulSignatureLen)); 131 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 335 soft_verify_final(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 459 soft_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument [all...] |
H A D | softDSA.c | 369 CK_ULONG ulSignatureLen) 390 if ((ulSignatureLen != MIN_DSA_SIGNATURE_LEN_BYTES) && 391 (ulSignatureLen != MID_DSA_SIGNATURE_LEN_BYTES) && 392 (ulSignatureLen != MAX_DSA_SIGNATURE_LEN_BYTES)) { 367 soft_dsa_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softEC.c | 541 CK_ULONG ulSignatureLen) 557 if (ulSignatureLen > EC_MAX_SIG_LEN) { 582 signature_item.len = ulSignatureLen; 539 soft_ecc_verify(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument
|
H A D | softRSA.c | 643 CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) 663 if (ulSignatureLen != (CK_ULONG)modulus_len) { 715 plain_data + ulSignatureLen - ulDataLen, 1191 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 1207 if (ulSignatureLen != (CK_ULONG)modulus_len) { 641 soft_rsa_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) argument 1190 soft_rsa_verify_recover(soft_session_t *session_p, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) 212 if (len != ulSignatureLen) { 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) argument
|
H A D | kernelVerify.c | 179 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) 229 pSignature, ulSignatureLen, OP_SINGLE); 241 verify.cv_signlen = ulSignatureLen; 357 CK_ULONG ulSignatureLen) 392 NULL, 0, pSignature, ulSignatureLen, 419 pSignature, ulSignatureLen); 427 verify_final.vf_signlen = ulSignatureLen; 563 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) 600 verify_recover.vr_signlen = ulSignatureLen; 178 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 356 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 562 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1961 CK_ULONG ulSignatureLen) 1988 pSignature, ulSignatureLen); 2038 CK_ULONG ulSignatureLen) 2066 pSignature, ulSignatureLen); 2119 CK_ULONG ulSignatureLen, 2152 &sess->verify_ctx, pSignature, ulSignatureLen, 1957 SC_Verify(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2036 SC_VerifyFinal(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2117 SC_VerifyRecover(ST_SESSION_HANDLE sSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|
H A D | api_interface.c | 2127 CK_ULONG ulSignatureLen) 2140 pSignature, ulSignatureLen); 2150 CK_ULONG ulSignatureLen) 2167 ulSignatureLen); 2203 CK_ULONG ulSignatureLen, 2218 ulSignatureLen, pData, pulDataLen); 2123 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2148 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) argument 2201 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) argument
|