HomeSort by: relevance | last modified time | path
    Searched refs:signature (Results 1 - 25 of 447) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/apache2/openssl/dist/crypto/evp/
signature.c 35 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); local
37 if (signature == NULL)
40 if (!CRYPTO_NEW_REF(&signature->refcnt, 1)
42 CRYPTO_FREE_REF(&signature->refcnt);
43 OPENSSL_free(signature);
47 signature->prov = prov;
49 return signature;
57 EVP_SIGNATURE *signature = NULL; local
67 if ((signature = evp_signature_new(prov)) == NULL) {
72 signature->name_id = name_id
926 EVP_SIGNATURE *signature; local
958 EVP_SIGNATURE *signature; local
992 EVP_SIGNATURE *signature; local
1080 EVP_SIGNATURE *signature; local
1111 EVP_SIGNATURE *signature; local
1145 EVP_SIGNATURE *signature; local
1208 EVP_SIGNATURE *signature; local
    [all...]
m_sigver.c 44 EVP_SIGNATURE *signature = NULL; local
78 || (signature = locpctx->op.sig.signature) == NULL
100 * Try to derive the supported signature from |locpctx->keymgmt|.
119 * 1. Do the normal signature fetch, using the fetching data given by
121 * 2. Do the provider specific signature fetch, from the same provider
125 * signature, and try to export |ctx->pkey| to that keymgmt (when
141 EVP_SIGNATURE_free(signature);
146 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig,
148 if (signature != NULL
403 EVP_SIGNATURE *signature; local
449 EVP_SIGNATURE *signature; local
496 EVP_SIGNATURE *signature; local
634 EVP_SIGNATURE *signature = pctx->op.sig.signature; local
664 EVP_SIGNATURE *signature; local
771 EVP_SIGNATURE *signature = pctx->op.sig.signature; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
signature.c 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); local
25 if (signature == NULL) {
30 signature->lock = CRYPTO_THREAD_lock_new();
31 if (signature->lock == NULL) {
33 OPENSSL_free(signature);
36 signature->prov = prov;
38 signature->refcnt = 1;
40 return signature;
48 EVP_SIGNATURE *signature = NULL; local
53 if ((signature = evp_signature_new(prov)) == NULL)
399 EVP_SIGNATURE *signature = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/.ctags.d/openssl-stage1/
10extrac-macrodefs.ctags 18 --fields=+{signature}
  /src/external/gpl2/lvm2/dist/lib/device/
dev-swap.c 43 int dev_is_swap(struct device *dev, uint64_t *signature)
59 *signature = 0;
75 *signature = page - SIGNATURE_SIZE;
83 if (*signature)
92 int dev_is_swap(struct device *dev, uint64_t *signature)
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
01-simple.conf 6 test-1 = 1-Server signature algorithms bug
33 [1-Server signature algorithms bug]
34 ssl_conf = 1-Server signature algorithms bug-ssl
36 [1-Server signature algorithms bug-ssl]
37 server = 1-Server signature algorithms bug-server
38 client = 1-Server signature algorithms bug-client
40 [1-Server signature algorithms bug-server]
46 [1-Server signature algorithms bug-client]
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 41 $self->{signature} = "";
64 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
67 print " Signature Len:".$siglen."\n";
70 $self->signature($sig);
78 my $sig = $self->signature();
97 sub signature subroutine
101 $self->{signature} = shift;
103 return $self->{signature};
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 33 $self->{signature} = "";
55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
58 print " Signature Len:".$siglen."\n";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
CertificateVerify.pm 33 $self->{signature} = "";
55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
58 print " Signature Len:".$siglen."\n";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
verify-macos.c 17 * DNS SIG(0) signature verification for DNSSD SRP using MacOS Security Framework.
20 * validating a signature using a context generated with that public key. Currently only ECDSASHA256 is
43 create_data_to_verify(dns_wire_t *const message, const dns_rr_t *const signature);
47 srp_sig0_verify(dns_wire_t *message, dns_rr_t *key, dns_rr_t *signature)
57 require_action_quiet(key->data.key.algorithm == signature->data.sig.algorithm, exit,
60 key->data.key.algorithm, signature->data.sig.algorithm));
63 require_action_quiet(signature->data.sig.algorithm == dnssec_keytype_ecdsa, exit,
64 ERROR("Unsupported KEY algorithm - KEY algorithm: %u", signature->data.sig.algorithm));
70 // The signature size should always be ECDSA_SHA256_SIG_SIZE, since only ECDSA Curve P-256 with SHA-256 is used now.
71 require_action_quiet(signature->data.sig.len == ECDSA_SHA256_SIG_SIZE, exit
    [all...]
verify-mbedtls.c 17 * DNS SIG(0) signature verification for DNSSD SRP using mbedtls.
20 * validating a signature using a context generated with that public key. Currently only ECDSASHA256 is
34 // Given a DNS message, a signature, and a public key, validate the message
36 srp_sig0_verify(dns_wire_t *message, dns_rr_t *key, dns_rr_t *signature)
48 // The key algorithm and the signature algorithm have to match or we can't validate the signature.
49 if (key->data.key.algorithm != signature->data.sig.algorithm) {
59 if (signature->data.sig.algorithm != dnssec_keytype_ecdsa) {
63 // Make sure the signature is the right size.
64 if (signature->data.sig.len != ECDSA_SHA256_SIG_SIZE)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/
a_verify.c 26 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature,
45 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) {
74 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data,
75 (unsigned int)signature->length, pkey) <= 0) {
89 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey)
102 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) {
113 /* Convert signature OID into digest and public key OIDs */
124 ret = pkey->ameth->item_verify(ctx, it, asn, a, signature, pkey)
    [all...]
a_sign.c 27 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey,
98 OPENSSL_free(signature->data);
99 signature->data = buf_out;
101 signature->length = outl;
106 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
107 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT;
118 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn,
133 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, ctx);
141 ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx)
164 rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2, signature);
    [all...]
  /src/sys/external/mit/xen-include-public/dist/xen/include/public/hvm/
hvm_info_table.h 46 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
  /src/crypto/external/apache2/openssl/dist/crypto/ec/curve448/
ed448.h 24 /* Number of bytes in an EdDSA signature. */
49 * signature (out): The signature.
56 * context (in): A "context" for this signature of up to 255 bytes.
65 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
76 * signature (out): The signature.
81 * context (in): A "context" for this signature of up to 255 bytes. Must be the
91 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
100 * EdDSA signature verification
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/
curve448_local.h 20 const uint8_t signature[114], const uint8_t public_key[57],
ed448.h 50 * signature (out): The signature.
57 * context (in): A "context" for this signature of up to 255 bytes.
66 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
77 * signature (out): The signature.
82 * context (in): A "context" for this signature of up to 255 bytes. Must be the
92 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
101 * EdDSA signature verification.
105 * signature (in): The signature
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/
ed448.h 47 * signature (out): The signature.
54 * context (in): A "context" for this signature of up to 255 bytes.
62 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
72 * signature (out): The signature.
77 * context (in): A "context" for this signature of up to 255 bytes. Must be the
86 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
94 * EdDSA signature verification.
98 * signature (in): The signature
    [all...]
  /src/external/mpl/bind/dist/lib/dns/rdata/any_255/
tsig_250.h 26 unsigned char *signature; member in struct:dns_rdata_any_tsig
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 32 unsigned char *signature; member in struct:dns_rdata_rrsig
sig_24.h 33 unsigned char *signature; member in struct:dns_rdata_sig_t
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/
tsig_250.h 27 unsigned char *signature; member in struct:dns_rdata_any_tsig
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 33 unsigned char *signature; member in struct:dns_rdata_rrsig
sig_24.h 34 unsigned char *signature; member in struct:dns_rdata_sig_t
  /src/crypto/external/apache2/openssl/dist/crypto/ocsp/
ocsp_local.h 47 /*- Signature ::= SEQUENCE {
49 * signature BIT STRING,
54 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st
60 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
168 * signature BIT STRING,
172 * Note 1: The value for "signature" is specified in the OCSP rfc2560 as
173 * follows: "The value for the signature SHALL be computed on the hash of
180 * signature-specification algorithm, and try to do something intelligent.
194 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st
223 (o)->optionalSignature->signature, &(o)->tbsRequest,
    [all...]

Completed in 40 milliseconds

1 2 3 4 5 6 7 8 91011>>