| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| signature.c | 35 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); local 37 if (signature == NULL) 40 if (!CRYPTO_NEW_REF(&signature->refcnt, 1) 42 CRYPTO_FREE_REF(&signature->refcnt); 43 OPENSSL_free(signature); 47 signature->prov = prov; 49 return signature; 57 EVP_SIGNATURE *signature = NULL; local 67 if ((signature = evp_signature_new(prov)) == NULL) { 72 signature->name_id = name_id 926 EVP_SIGNATURE *signature; local 958 EVP_SIGNATURE *signature; local 992 EVP_SIGNATURE *signature; local 1080 EVP_SIGNATURE *signature; local 1111 EVP_SIGNATURE *signature; local 1145 EVP_SIGNATURE *signature; local 1208 EVP_SIGNATURE *signature; local [all...] |
| m_sigver.c | 44 EVP_SIGNATURE *signature = NULL; local 78 || (signature = locpctx->op.sig.signature) == NULL 100 * Try to derive the supported signature from |locpctx->keymgmt|. 119 * 1. Do the normal signature fetch, using the fetching data given by 121 * 2. Do the provider specific signature fetch, from the same provider 125 * signature, and try to export |ctx->pkey| to that keymgmt (when 141 EVP_SIGNATURE_free(signature); 146 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, 148 if (signature != NULL 403 EVP_SIGNATURE *signature; local 449 EVP_SIGNATURE *signature; local 496 EVP_SIGNATURE *signature; local 634 EVP_SIGNATURE *signature = pctx->op.sig.signature; local 664 EVP_SIGNATURE *signature; local 771 EVP_SIGNATURE *signature = pctx->op.sig.signature; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| signature.c | 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); local 25 if (signature == NULL) { 30 signature->lock = CRYPTO_THREAD_lock_new(); 31 if (signature->lock == NULL) { 33 OPENSSL_free(signature); 36 signature->prov = prov; 38 signature->refcnt = 1; 40 return signature; 48 EVP_SIGNATURE *signature = NULL; local 53 if ((signature = evp_signature_new(prov)) == NULL) 399 EVP_SIGNATURE *signature = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/.ctags.d/openssl-stage1/ |
| 10extrac-macrodefs.ctags | 18 --fields=+{signature}
|
| /src/external/gpl2/lvm2/dist/lib/device/ |
| dev-swap.c | 43 int dev_is_swap(struct device *dev, uint64_t *signature) 59 *signature = 0; 75 *signature = page - SIGNATURE_SIZE; 83 if (*signature) 92 int dev_is_swap(struct device *dev, uint64_t *signature)
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 01-simple.conf | 6 test-1 = 1-Server signature algorithms bug 33 [1-Server signature algorithms bug] 34 ssl_conf = 1-Server signature algorithms bug-ssl 36 [1-Server signature algorithms bug-ssl] 37 server = 1-Server signature algorithms bug-server 38 client = 1-Server signature algorithms bug-client 40 [1-Server signature algorithms bug-server] 46 [1-Server signature algorithms bug-client]
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 41 $self->{signature} = ""; 64 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 67 print " Signature Len:".$siglen."\n"; 70 $self->signature($sig); 78 my $sig = $self->signature(); 97 sub signature subroutine 101 $self->{signature} = shift; 103 return $self->{signature};
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 33 $self->{signature} = ""; 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n"; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 33 $self->{signature} = ""; 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n"; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| verify-macos.c | 17 * DNS SIG(0) signature verification for DNSSD SRP using MacOS Security Framework. 20 * validating a signature using a context generated with that public key. Currently only ECDSASHA256 is 43 create_data_to_verify(dns_wire_t *const message, const dns_rr_t *const signature); 47 srp_sig0_verify(dns_wire_t *message, dns_rr_t *key, dns_rr_t *signature) 57 require_action_quiet(key->data.key.algorithm == signature->data.sig.algorithm, exit, 60 key->data.key.algorithm, signature->data.sig.algorithm)); 63 require_action_quiet(signature->data.sig.algorithm == dnssec_keytype_ecdsa, exit, 64 ERROR("Unsupported KEY algorithm - KEY algorithm: %u", signature->data.sig.algorithm)); 70 // The signature size should always be ECDSA_SHA256_SIG_SIZE, since only ECDSA Curve P-256 with SHA-256 is used now. 71 require_action_quiet(signature->data.sig.len == ECDSA_SHA256_SIG_SIZE, exit [all...] |
| verify-mbedtls.c | 17 * DNS SIG(0) signature verification for DNSSD SRP using mbedtls. 20 * validating a signature using a context generated with that public key. Currently only ECDSASHA256 is 34 // Given a DNS message, a signature, and a public key, validate the message 36 srp_sig0_verify(dns_wire_t *message, dns_rr_t *key, dns_rr_t *signature) 48 // The key algorithm and the signature algorithm have to match or we can't validate the signature. 49 if (key->data.key.algorithm != signature->data.sig.algorithm) { 59 if (signature->data.sig.algorithm != dnssec_keytype_ecdsa) { 63 // Make sure the signature is the right size. 64 if (signature->data.sig.len != ECDSA_SHA256_SIG_SIZE) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
| a_verify.c | 26 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, 45 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 74 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, 75 (unsigned int)signature->length, pkey) <= 0) { 89 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 102 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 113 /* Convert signature OID into digest and public key OIDs */ 124 ret = pkey->ameth->item_verify(ctx, it, asn, a, signature, pkey) [all...] |
| a_sign.c | 27 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 98 OPENSSL_free(signature->data); 99 signature->data = buf_out; 101 signature->length = outl; 106 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 107 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; 118 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, 133 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, ctx); 141 ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx) 164 rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2, signature); [all...] |
| /src/sys/external/mit/xen-include-public/dist/xen/include/public/hvm/ |
| hvm_info_table.h | 46 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/curve448/ |
| ed448.h | 24 /* Number of bytes in an EdDSA signature. */ 49 * signature (out): The signature. 56 * context (in): A "context" for this signature of up to 255 bytes. 65 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 76 * signature (out): The signature. 81 * context (in): A "context" for this signature of up to 255 bytes. Must be the 91 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 100 * EdDSA signature verification [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/ |
| curve448_local.h | 20 const uint8_t signature[114], const uint8_t public_key[57],
|
| ed448.h | 50 * signature (out): The signature. 57 * context (in): A "context" for this signature of up to 255 bytes. 66 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 77 * signature (out): The signature. 82 * context (in): A "context" for this signature of up to 255 bytes. Must be the 92 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 101 * EdDSA signature verification. 105 * signature (in): The signature [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/ |
| ed448.h | 47 * signature (out): The signature. 54 * context (in): A "context" for this signature of up to 255 bytes. 62 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 72 * signature (out): The signature. 77 * context (in): A "context" for this signature of up to 255 bytes. Must be the 86 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 94 * EdDSA signature verification. 98 * signature (in): The signature [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 26 unsigned char *signature; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 32 unsigned char *signature; member in struct:dns_rdata_rrsig
|
| sig_24.h | 33 unsigned char *signature; member in struct:dns_rdata_sig_t
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 27 unsigned char *signature; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 33 unsigned char *signature; member in struct:dns_rdata_rrsig
|
| sig_24.h | 34 unsigned char *signature; member in struct:dns_rdata_sig_t
|
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_local.h | 47 /*- Signature ::= SEQUENCE { 49 * signature BIT STRING, 54 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 60 * optionalSignature [0] EXPLICIT Signature OPTIONAL } 168 * signature BIT STRING, 172 * Note 1: The value for "signature" is specified in the OCSP rfc2560 as 173 * follows: "The value for the signature SHALL be computed on the hash of 180 * signature-specification algorithm, and try to do something intelligent. 194 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 223 (o)->optionalSignature->signature, &(o)->tbsRequest, [all...] |