/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerifyUtil.c | 132 CK_ULONG ulSignatureLen) in soft_verify() argument 164 if (len != ulSignatureLen) { in soft_verify() 190 if (len != ulSignatureLen) { in soft_verify() 205 pSignature, ulSignatureLen, mechanism)); in soft_verify() 214 ulDataLen, pSignature, ulSignatureLen, mechanism, B_FALSE)); in soft_verify() 219 pSignature, ulSignatureLen)); in soft_verify() 224 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify() 229 pSignature, ulSignatureLen)); in soft_verify() 234 ulDataLen, pSignature, ulSignatureLen, B_FALSE)); in soft_verify() 323 CK_ULONG ulSignatureLen) in soft_verify_final() argument [all …]
|
H A D | softVerify.c | 105 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) in C_Verify() argument 153 ulSignatureLen); in C_Verify() 223 CK_ULONG ulSignatureLen) in C_VerifyFinal() argument 253 rv = soft_verify_final(session_p, pSignature, ulSignatureLen); in C_VerifyFinal() 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | softEC.c | 531 CK_ULONG ulSignatureLen) in soft_ecc_verify() argument 547 if (ulSignatureLen > EC_MAX_SIG_LEN) { in soft_ecc_verify() 572 signature_item.len = ulSignatureLen; in soft_ecc_verify()
|
H A D | softRSA.c | 642 CK_ULONG ulSignatureLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_verify_common() argument 662 if (ulSignatureLen != (CK_ULONG)modulus_len) { in soft_rsa_verify_common() 713 plain_data + ulSignatureLen - ulDataLen, in soft_rsa_verify_common() 1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_rsa_verify_recover() argument 1192 if (ulSignatureLen != (CK_ULONG)modulus_len) { in soft_rsa_verify_recover()
|
H A D | softDSA.c | 326 CK_ULONG ulSignatureLen) in soft_dsa_verify() argument 345 if (ulSignatureLen != DSA_SIGNATURE_LENGTH) { in soft_dsa_verify()
|
/titanic_44/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11Verify.c | 96 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) in C_Verify() argument 104 pSignature, ulSignatureLen)); in C_Verify() 120 ulDataLen, pSignature, ulSignatureLen); in C_Verify() 177 CK_ULONG ulSignatureLen) in C_VerifyFinal() argument 185 ulSignatureLen)); in C_VerifyFinal() 200 pSignature, ulSignatureLen); in C_VerifyFinal() 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 282 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover() 298 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | metaVerify.c | 76 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) in meta_Verify() argument 93 pData, ulDataLen, pSignature, &ulSignatureLen); in meta_Verify() 137 CK_ULONG ulSignatureLen) in meta_VerifyFinal() argument 150 if (pSignature == NULL && ulSignatureLen != 0) { in meta_VerifyFinal() 157 pSignature, ulSignatureLen, NULL, NULL); in meta_VerifyFinal() 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument 221 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
|
H A D | metaGlobal.h | 794 CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen); 798 CK_ULONG ulSignatureLen); 802 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelVerify.c | 180 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen) in C_Verify() argument 230 pSignature, ulSignatureLen, OP_SINGLE); in C_Verify() 242 verify.cv_signlen = ulSignatureLen; in C_Verify() 358 CK_ULONG ulSignatureLen) in C_VerifyFinal() argument 393 NULL, 0, pSignature, ulSignatureLen, in C_VerifyFinal() 420 pSignature, ulSignatureLen); in C_VerifyFinal() 428 verify_final.vf_signlen = ulSignatureLen; in C_VerifyFinal() 564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 601 verify_recover.vr_signlen = ulSignatureLen; in C_VerifyRecover()
|
H A D | kernelSoftCommon.c | 192 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag) in do_soft_hmac_verify() argument 212 if (len != ulSignatureLen) { in do_soft_hmac_verify()
|
H A D | kernelSoftCommon.h | 59 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, int opflag);
|
/titanic_44/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 643 CK_ULONG ulSignatureLen /* signature length*/ 668 CK_ULONG ulSignatureLen /* signature length */ 692 CK_ULONG ulSignatureLen, /* signature length */
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | api_interface.c | 2125 CK_ULONG ulSignatureLen) in C_Verify() argument 2138 pSignature, ulSignatureLen); in C_Verify() 2148 CK_ULONG ulSignatureLen) in C_VerifyFinal() argument 2165 ulSignatureLen); in C_VerifyFinal() 2201 CK_ULONG ulSignatureLen, in C_VerifyRecover() argument 2216 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | new_host.c | 1969 CK_ULONG ulSignatureLen) in SC_Verify() argument 1996 pSignature, ulSignatureLen); in SC_Verify() 2046 CK_ULONG ulSignatureLen) in SC_VerifyFinal() argument 2074 pSignature, ulSignatureLen); in SC_VerifyFinal() 2127 CK_ULONG ulSignatureLen, in SC_VerifyRecover() argument 2160 &sess->verify_ctx, pSignature, ulSignatureLen, in SC_VerifyRecover()
|