Searched refs:signed_data (Results 1 – 8 of 8) sorted by relevance
/titanic_41/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 369 KMF_DATA signed_data = { 0, NULL }; in sign_csr() local 389 signed_data.Length = SubjectCsr->Length*2; in sign_csr() 390 signed_data.Data = calloc(1, signed_data.Length); in sign_csr() 391 if (!signed_data.Data) { in sign_csr() 410 &signed_data, sizeof (KMF_DATA)); in sign_csr() 442 ret = DerEncodeDSASignature(&signed_data, &signature); in sign_csr() 443 kmf_free_data(&signed_data); in sign_csr() 450 subj_csr.signature.encrypted = signed_data; in sign_csr() 467 kmf_free_data(&signed_data); in sign_csr()
|
H A D | certop.c | 3009 KMF_DATA signed_data = { 0, NULL }; in sign_cert() local 3039 signed_data.Length = data_to_sign.Length*2; in sign_cert() 3040 signed_data.Data = calloc(1, signed_data.Length); in sign_cert() 3041 if (!signed_data.Data) { in sign_cert() 3090 &signed_data, sizeof (KMF_DATA)); in sign_cert() 3111 ret = DerEncodeECDSASignature(&signed_data, &signature); in sign_cert() 3112 kmf_free_data(&signed_data); in sign_cert() 3126 ret = DerEncodeDSASignature(&signed_data, &signature); in sign_cert() 3127 kmf_free_data(&signed_data); in sign_cert() 3134 ret = copy_data(&subj_cert->signature.encrypted, &signed_data); in sign_cert() [all …]
|
/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto.h | 141 unsigned char **signed_data, /* OUT 165 unsigned char *signed_data, /* IN 219 unsigned char **signed_data, /* OUT
|
H A D | pkinit_crypto_openssl.c | 849 unsigned char **signed_data, in cms_signeddata_create() argument 877 if (signed_data == NULL) in cms_signeddata_create() 1130 if ((p = *signed_data = in cms_signeddata_create() 1148 print_buffer_bin(*signed_data, *signed_data_len, in cms_signeddata_create() 1152 print_buffer_bin(*signed_data, *signed_data_len, in cms_signeddata_create() 1155 print_buffer_bin(*signed_data, *signed_data_len, in cms_signeddata_create() 1196 unsigned char *signed_data, in cms_signeddata_verify() argument 1208 const unsigned char *p = signed_data; in cms_signeddata_verify() 1223 print_buffer_bin(signed_data, signed_data_len, in cms_signeddata_verify() 1533 unsigned char *p = NULL, *signed_data = NULL, *enc_data = NULL; in cms_envelopeddata_create() local [all …]
|
/titanic_41/usr/src/uts/common/crypto/io/ |
H A D | ecc.c | 648 uchar_t signed_data[EC_MAX_SIG_LEN]; in ecc_sign_common() local 679 signature_item.data = signed_data; in ecc_sign_common() 680 signature_item.len = sizeof (signed_data); in ecc_sign_common() 693 if ((rv = crypto_put_output_data(signed_data, in ecc_sign_common() 850 uchar_t signed_data[EC_MAX_SIG_LEN]; in ecc_verify_common() local 862 if (signature->cd_length > sizeof (signed_data)) { in ecc_verify_common() 867 signed_data)) != CRYPTO_SUCCESS) { in ecc_verify_common()
|
H A D | rsa.c | 1059 uchar_t signed_data[MAX_RSA_KEYLENGTH_IN_BYTES]; in rsa_sign_common() local 1112 rv = core_rsa_decrypt(key, plain_data, modulus_len, signed_data); in rsa_sign_common() 1115 if ((rv = crypto_put_output_data(signed_data, in rsa_sign_common()
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1023 SECItem signed_data; in NSS_SignData() local 1026 signed_data.data = 0; in NSS_SignData() 1065 rv = SEC_SignData(&signed_data, tobesigned->Data, in NSS_SignData() 1073 if (signed_data.len <= output->Length) { in NSS_SignData() 1074 (void) memcpy(output->Data, signed_data.data, signed_data.len); in NSS_SignData() 1075 output->Length = signed_data.len; in NSS_SignData() 1080 free(signed_data.data); in NSS_SignData()
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 534 CK_BYTE signed_data[MAX_RSA_KEYLENGTH_IN_BYTES]; in soft_rsa_sign_common() local 614 rv = soft_rsa_decrypt(key, plain_data, modulus_len, signed_data); in soft_rsa_sign_common() 617 (void) memcpy(pSigned, signed_data, modulus_len); in soft_rsa_sign_common()
|