OLD | NEW |
1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 #ifndef _PK11PUB_H_ | 4 #ifndef _PK11PUB_H_ |
5 #define _PK11PUB_H_ | 5 #define _PK11PUB_H_ |
6 #include "plarena.h" | 6 #include "plarena.h" |
7 #include "seccomon.h" | 7 #include "seccomon.h" |
8 #include "secoidt.h" | 8 #include "secoidt.h" |
9 #include "secdert.h" | 9 #include "secdert.h" |
10 #include "keyt.h" | 10 #include "keyt.h" |
(...skipping 684 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
695 */ | 695 */ |
696 SECStatus PK11_HashBuf(SECOidTag hashAlg, unsigned char *out, | 696 SECStatus PK11_HashBuf(SECOidTag hashAlg, unsigned char *out, |
697 const unsigned char *in, PRInt32 len); | 697 const unsigned char *in, PRInt32 len); |
698 SECStatus PK11_DigestOp(PK11Context *context, const unsigned char *in, | 698 SECStatus PK11_DigestOp(PK11Context *context, const unsigned char *in, |
699 unsigned len); | 699 unsigned len); |
700 SECStatus PK11_CipherOp(PK11Context *context, unsigned char * out, int *outlen, | 700 SECStatus PK11_CipherOp(PK11Context *context, unsigned char * out, int *outlen, |
701 int maxout, const unsigned char *in, int inlen); | 701 int maxout, const unsigned char *in, int inlen); |
702 SECStatus PK11_Finalize(PK11Context *context); | 702 SECStatus PK11_Finalize(PK11Context *context); |
703 SECStatus PK11_DigestFinal(PK11Context *context, unsigned char *data, | 703 SECStatus PK11_DigestFinal(PK11Context *context, unsigned char *data, |
704 unsigned int *outLen, unsigned int length); | 704 unsigned int *outLen, unsigned int length); |
| 705 #define PK11_CipherFinal PK11_DigestFinal |
705 SECStatus PK11_SaveContext(PK11Context *cx,unsigned char *save, | 706 SECStatus PK11_SaveContext(PK11Context *cx,unsigned char *save, |
706 int *len, int saveLength); | 707 int *len, int saveLength); |
707 | 708 |
708 /* Save the context's state, with possible allocation. | 709 /* Save the context's state, with possible allocation. |
709 * The caller may supply an already allocated buffer in preAllocBuf, | 710 * The caller may supply an already allocated buffer in preAllocBuf, |
710 * with length pabLen. If the buffer is large enough for the context's | 711 * with length pabLen. If the buffer is large enough for the context's |
711 * state, it will receive the state. | 712 * state, it will receive the state. |
712 * If the buffer is not large enough (or NULL), then a new buffer will | 713 * If the buffer is not large enough (or NULL), then a new buffer will |
713 * be allocated with PORT_Alloc. | 714 * be allocated with PORT_Alloc. |
714 * In either case, the state will be returned as a buffer, and the length | 715 * In either case, the state will be returned as a buffer, and the length |
(...skipping 117 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
832 PK11_GetLowLevelKeyIDForCert(PK11SlotInfo *slot, | 833 PK11_GetLowLevelKeyIDForCert(PK11SlotInfo *slot, |
833 CERTCertificate *cert, void *pwarg); | 834 CERTCertificate *cert, void *pwarg); |
834 SECItem * | 835 SECItem * |
835 PK11_GetLowLevelKeyIDForPrivateKey(SECKEYPrivateKey *key); | 836 PK11_GetLowLevelKeyIDForPrivateKey(SECKEYPrivateKey *key); |
836 | 837 |
837 PRBool SECMOD_HasRootCerts(void); | 838 PRBool SECMOD_HasRootCerts(void); |
838 | 839 |
839 SEC_END_PROTOS | 840 SEC_END_PROTOS |
840 | 841 |
841 #endif | 842 #endif |
OLD | NEW |