⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 c_extern.h

📁 IBM的Linux上的PKCS#11实现
💻 H
📖 第 1 页 / 共 2 页
字号:
             to pay any damages as a result, the Commercial Contributor             must pay those damages.             5. NO WARRANTY             EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE             PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT             WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR             IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR             CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR             FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely             responsible for determining the appropriateness of using             and distributing the Program and assumes all risks             associated with its exercise of rights under this             Agreement, including but not limited to the risks and             costs of program errors, compliance with applicable laws,             damage to or loss of data, programs or equipment, and             unavailability or interruption of operations.              6. DISCLAIMER OF LIABILITY             EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER             RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY             FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,             OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION             LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF             LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT             (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT             OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE             OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE             POSSIBILITY OF SUCH DAMAGES.             7. GENERAL             If any provision of this Agreement is invalid or             unenforceable under applicable law, it shall not affect             the validity or enforceability of the remainder of the             terms of this Agreement, and without further action by the             parties hereto, such provision shall be reformed to the             minimum extent necessary to make such provision valid and             enforceable.             If Recipient institutes patent litigation against a             Contributor with respect to a patent applicable to             software (including a cross-claim or counterclaim in a             lawsuit), then any patent licenses granted by that             Contributor to such Recipient under this Agreement shall             terminate as of the date such litigation is filed. In             addition, If Recipient institutes patent litigation             against any entity (including a cross-claim or             counterclaim in a lawsuit) alleging that the Program             itself (excluding combinations of the Program with other             software or hardware) infringes such Recipient's             patent(s), then such Recipient's rights granted under             Section 2(b) shall terminate as of the date such             litigation is filed.             All Recipient's rights under this Agreement shall             terminate if it fails to comply with any of the material             terms or conditions of this Agreement and does not cure             such failure in a reasonable period of time after becoming             aware of such noncompliance. If all Recipient's rights             under this Agreement terminate, Recipient agrees to cease             use and distribution of the Program as soon as reasonably             practicable. However, Recipient's obligations under this             Agreement and any licenses granted by Recipient relating             to the Program shall continue and survive.              Everyone is permitted to copy and distribute copies of             this Agreement, but in order to avoid inconsistency the             Agreement is copyrighted and may only be modified in the             following manner. The Agreement Steward reserves the right             to publish new versions (including revisions) of this             Agreement from time to time. No one other than the             Agreement Steward has the right to modify this Agreement.             IBM is the initial Agreement Steward. IBM may assign the             responsibility to serve as the Agreement Steward to a             suitable separate entity. Each new version of the             Agreement will be given a distinguishing version number.             The Program (including Contributions) may always be             distributed subject to the version of the Agreement under             which it was received. In addition, after a new version of             the Agreement is published, Contributor may elect to             distribute the Program (including its Contributions) under             the new version. Except as expressly stated in Sections             2(a) and 2(b) above, Recipient receives no rights or             licenses to the intellectual property of any Contributor             under this Agreement, whether expressly, by implication,             estoppel or otherwise. All rights in the Program not             expressly granted under this Agreement are reserved.             This Agreement is governed by the laws of the State of New             York and the intellectual property laws of the United             States of America. No party to this Agreement will bring a             legal action under this Agreement more than one year after             the cause of action arose. Each party waives its rights to             a jury trial in any resulting litigation. *//* (C) COPYRIGHT International Business Machines Corp. 2001,2002          */// File:  extern.h//// Lists extern (global) variables for the coprocessor-side code//#ifndef _EXTERN_H#define _EXTERN_H#define malloc(x) newmalloc(x)#define free(x)   newfree(x)#define realloc(x,y) newrealloc(x,y)_prelinkc_ void   _postlinkc_ newfree(void *);_prelinkc_ void * _postlinkc_ newmalloc(size_t);_prelinkc_ void * _postlinkc_ newrealloc(void *,size_t);CK_RV api_DummyFunction  ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_RND_Generate    ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_DES_KeyGen      ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_CDMF_KeyGen     ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Encrypt_DES_ECB ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Decrypt_DES_ECB ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Encrypt_DES_CBC ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Decrypt_DES_CBC ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Encrypt_DES3_ECB( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Decrypt_DES3_ECB( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Encrypt_DES3_CBC( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_Decrypt_DES3_CBC( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_SHA1_Hash       ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_SHA1_Update     ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_SHA1_Final      ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_RSA_KeyPairGen  ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_RSA_Encrypt     ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_RSA_Decrypt     ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_DSA_KeyPairGen  ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_DSA_Sign        ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV do_DSA_Verify      ( sccRequestHeader_t *req, LEEDS_REQUEST *request, LEEDS_REPLY *reply );CK_RV mp_subtract( CK_BYTE   *bigint,                   CK_ULONG   val,                   CK_ULONG   len );CK_RV mp_mult( CK_BYTE  *bigint_a,               CK_ULONG  a_len,               CK_BYTE  *bigint_b,               CK_ULONG  b_len,               CK_BYTE  *bigint_n,               CK_ULONG  n_len,               CK_BYTE  *result,               CK_ULONG *result_len );CK_RV mp_exp( CK_BYTE  *bigint_a,              CK_ULONG  a_len,              CK_BYTE  *bigint_b,              CK_ULONG  b_len,              CK_BYTE  *bigint_n,              CK_ULONG  n_len,              CK_BYTE  *result,              CK_ULONG *result_len );CK_BYTE parity_adjust( CK_BYTE b );CK_RV   parity_is_odd( CK_BYTE b );CK_RV ckm_rsa_compute_priv_exp( sccPKCSKeyToken_t  * key_token,                                CK_BYTE            * dest,                                CK_ULONG           * exp_len );unsigned long treeCheck(int treeIdx);void *newmalloc(size_t size);void newfree(void *ptr);void *newrealloc(void *oldptr,size_t size);#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -