252 #define IF_p6ISign {0xf1d98e80,0xe10f,0x448f,{0x81,0xfa,0xe9,0x4b,0x75,0xb7,0x18,0x3a}}
255 #define COMP_p6Sign {0x13b2b4ba,0x9258,0x422b,{0xaf,0x54,0xfe,0x21,0x18,0xb1,0x45,0xb2}}
P6SIGNHMAC
Supported HMAC algorthms for signing:
Cryptography component definitions.
This interface provides key metadata infrormation and key access.
This interface provides cryptographic signature generation and verification functions.
virtual P6R::P6ERR verify(P6CRYPTODATASOURCE *pInData, P6CRYPTODATASOURCE *pSignature, P6BOOL base64Encoded, P6SIGNHMAC hmac)=0
Verify that the data pointed to by pInData has not been modified.
Where to get the data to process, either a file or generic buffer.
The base interface all [p6]COM components must derive from and implement.
P6UINT32 P6SIGNFLAGS
P6SIGNFLAGS.
virtual P6R::P6ERR sign(P6CRYPTODATASOURCE *pInData, P6CRYPTODATASINK *pOutData, P6BOOL base64Encode, P6SIGNHMAC hmac)=0
Sign the data pointed to by pInData given the key and the key type set in setKey. ...
Where to put the data processed, either a file or generic buffer.
const P6SIGNFLAGS P6SIGN_TRACEON
virtual P6R::P6ERR signDSARaw(P6CRYPTODATASOURCE *pInData, P6UCHAR *pR, P6UINT32 *pRLength, P6UCHAR *pS, P6UINT32 *pSLength)=0
Sign the data, using SH_SHA1, pointed to by pInData given the key and the key type set in setKey...
virtual P6R::P6ERR initialize(P6SIGNFLAGS flags)=0
Sets up the object to run properly.
virtual P6R::P6ERR setKey(p6ICryptoKey *pKey)=0
Load the key to be used for either signing or verficiation.
virtual P6R::P6ERR verifyDSARaw(P6CRYPTODATASOURCE *pInData, P6UCHAR *pR, P6UINT32 rLength, P6UCHAR *pS, P6UINT32 sLength)=0
Verify that the data pointed to by pInData has not been modified.
P6R Cryptographic key interface definitions.
const P6SIGNFLAGS P6SIGN_NOFLAGS