HomeSort by: relevance | last modified time | path
    Searched defs:rsa_sign (Results 1 - 10 of 10) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/crypto/rsa/
rsa_local.h 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead.
132 int (*rsa_sign)(int type, member in struct:rsa_meth_st
  /src/crypto/external/bsd/openssl/dist/crypto/rsa/
rsa_local.h 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead.
132 int (*rsa_sign) (int type, member in struct:rsa_meth_st
  /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/
rsa_local.h 95 * *NOT* be used RSA_sign(), RSA_verify() should be used instead.
97 int (*rsa_sign) (int type, member in struct:rsa_meth_st
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
rsa.h 64 #define RSA_sign hc_RSA_sign
97 int (*rsa_sign)(int, const unsigned char *, unsigned int, member in struct:RSA_METHOD
173 int RSA_sign(int, const unsigned char *, unsigned int,
  /src/crypto/external/bsd/netpgp/dist/src/lib/
signature.c 156 rsa_sign(pgp_hash_t *hash, function
185 (void) fprintf(stderr, "rsa_sign: keysize too big\n");
189 (void) fprintf(stderr, "rsa_sign: hashsize too big\n");
196 printf("rsa_sign: PS is %d\n", keysize - hashsize - 1 - 2);
206 (void) fprintf(stderr, "rsa_sign: short %s hash\n", hash->name);
214 (void) fprintf(stderr, "rsa_sign: n != keysize\n");
867 if (!rsa_sign(&sig->hash, &key->key.rsa, &seckey->key.rsa,
870 "pgp_write_sig: rsa_sign failure\n");
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
rsa_sig.c 41 static OSSL_FUNC_signature_sign_fn rsa_sign; variable
514 static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen, function
585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp,
917 * are ignored. Defer to rsa_sign.
928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen);
1442 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign },
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
rsa_sig.c 42 static OSSL_FUNC_signature_sign_fn rsa_sign; variable
745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp,
862 * are ignored. Defer to rsa_sign.
884 static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen, function
1859 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign },
2087 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign }, \
  /src/crypto/external/bsd/openssl/dist/ssl/
ssl_lib.c 3624 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local
3636 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID;
3642 OSSL_TRACE4(TLS_CIPHER, "dh_tmp=%d rsa_enc=%d rsa_sign=%d dsa_sign=%d\n",
3643 dh_tmp, rsa_enc, rsa_sign, dsa_sign);
3671 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN)
  /src/crypto/external/bsd/openssl.old/dist/ssl/
ssl_lib.c 3370 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local
3385 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID;
3395 dh_tmp, rsa_enc, rsa_sign, dsa_sign);
3424 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN)
  /src/crypto/external/apache2/openssl/dist/ssl/
ssl_lib.c 4564 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local
4576 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID;
4582 OSSL_TRACE4(TLS_CIPHER, "dh_tmp=%d rsa_enc=%d rsa_sign=%d dsa_sign=%d\n",
4583 dh_tmp, rsa_enc, rsa_sign, dsa_sign);
4611 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN) && pvalid[SSL_PKEY_RSA_PSS_SIGN] & CERT_PKEY_EXPLICIT_SIGN && TLS1_get_version(&s->ssl) == TLS1_2_VERSION))

Completed in 39 milliseconds