HomeSort by: relevance | last modified time | path
    Searched defs:signature (Results 1 - 25 of 177) sorted by relevancy

1 2 3 4 5 6 7 8

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 41 $self->{signature} = "";
64 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
67 print " Signature Len:".$siglen."\n";
70 $self->signature($sig);
78 my $sig = $self->signature();
97 sub signature subroutine
101 $self->{signature} = shift;
103 return $self->{signature};
ServerKeyExchange.pm 98 $self->signature($sig);
115 if (length($self->signature) > 0) {
116 $data .= pack('n', length($self->signature));
117 $data .= $self->signature;
157 sub signature subroutine
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 33 $self->{signature} = "";
55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
58 print " Signature Len:".$siglen."\n";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
ServerKeyExchange.pm 90 $self->signature($sig);
107 if (length($self->signature) > 0) {
108 $data .= pack('n', length($self->signature));
109 $data .= $self->signature;
149 sub signature subroutine
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
CertificateVerify.pm 33 $self->{signature} = "";
55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
58 print " Signature Len:".$siglen."\n";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
ServerKeyExchange.pm 90 $self->signature($sig);
107 if (length($self->signature) > 0) {
108 $data .= pack('n', length($self->signature));
109 $data .= $self->signature;
149 sub signature subroutine
  /src/external/bsd/libarchive/dist/libarchive/test/
test_read_format_rar_filter.c 33 const char signature[12] = { local
50 assertEqualMem(buff, signature, 12);
test_read_filter_program_signature.c 34 #define signature archive macro
75 signature, signature_len));
88 * Test bad signature.
  /src/sys/external/mit/xen-include-public/dist/xen/include/public/hvm/
hvm_info_table.h 46 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
  /src/external/mpl/bind/dist/lib/dns/rdata/any_255/
tsig_250.h 26 unsigned char *signature; member in struct:dns_rdata_any_tsig
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 32 unsigned char *signature; member in struct:dns_rdata_rrsig
sig_24.h 33 unsigned char *signature; member in struct:dns_rdata_sig_t
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/
tsig_250.h 27 unsigned char *signature; member in struct:dns_rdata_any_tsig
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 33 unsigned char *signature; member in struct:dns_rdata_rrsig
sig_24.h 34 unsigned char *signature; member in struct:dns_rdata_sig_t
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
test_soft_pkcs11.c 79 static char signature[1024]; variable
165 ck_sigsize = sizeof(signature);
167 (CK_BYTE *)signature, &ck_sigsize);
177 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize,
198 ck_sigsize = sizeof(signature);
200 (CK_BYTE *)signature, &ck_sigsize);
211 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
  /src/external/apache2/llvm/dist/llvm/include/llvm/DebugInfo/PDB/Native/
ModuleDebugStream.h 40 uint32_t signature() const { return Signature; } function in class:llvm::pdb::ModuleDebugStreamRef
75 uint32_t Signature;
  /src/external/gpl3/gdb.old/dist/gdb/dwarf2/
comp-unit-head.h 67 /* 64-bit signature of this unit. For type units, it denotes the signature of
71 ULONGEST signature = 0; member in struct:comp_unit_head
  /src/external/gpl3/gdb/dist/gdb/dwarf2/
unit-head.h 68 /* 64-bit signature of this unit. For type units, it denotes the signature of
72 ULONGEST signature = 0; member in struct:unit_head
  /src/crypto/external/bsd/openssh/dist/
kexgexs.c 134 u_char *signature = NULL; local
184 &signature, &slen, hash, hashlen, kex->hostkey_alg)) < 0)
191 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
212 free(signature);
  /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvfw/
flcn.h 47 u32 signature[4]; member in struct:flcn_bl_dmem_desc
66 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v1
83 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v2
  /src/crypto/external/apache2/openssl/dist/test/
dsa_no_digest_size_test.c 139 unsigned char *signature = NULL; local
162 TEST_error("Failed to get signature length, len=%d", len);
166 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength)))
169 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) {
174 /* Check that the signature is okay via the EVP interface */
179 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) {
185 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) {
191 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) {
196 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) {
206 OPENSSL_free(signature);
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
dsa_no_digest_size_test.c 139 unsigned char *signature = NULL; local
164 TEST_error("Failed to get signature length, len=%d", len);
168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength)))
171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) {
176 /* Check that the signature is okay via the EVP interface */
181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) {
187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) {
193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) {
198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) {
208 OPENSSL_free(signature);
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
dsa_no_digest_size_test.c 133 unsigned char *signature = NULL; local
158 TEST_error("Failed to get signature length, len=%d", len);
162 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength)))
165 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) {
170 /* Check that the signature is okay via the EVP interface */
175 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) {
181 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) {
187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) {
192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) {
202 OPENSSL_free(signature);
    [all...]
  /src/external/ibm-public/postfix/dist/src/util/
mymalloc.c 98 * free() calls we prepend a signature to memory given to the application.
104 int signature; /* set when block is active */ member in struct:MBLOCK
112 #define SIGNATURE 0xdead
119 if (real_ptr->signature != SIGNATURE) \
121 real_ptr->signature = 0; \
127 real_ptr->signature = SIGNATURE; \

Completed in 39 milliseconds

1 2 3 4 5 6 7 8