| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_local.h | 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead. 132 int (*rsa_sign)(int type, member in struct:rsa_meth_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_local.h | 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead. 132 int (*rsa_sign) (int type, member in struct:rsa_meth_st
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_local.h | 95 * *NOT* be used RSA_sign(), RSA_verify() should be used instead. 97 int (*rsa_sign) (int type, member in struct:rsa_meth_st
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| rsa.h | 64 #define RSA_sign hc_RSA_sign 97 int (*rsa_sign)(int, const unsigned char *, unsigned int, member in struct:RSA_METHOD 173 int RSA_sign(int, const unsigned char *, unsigned int,
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| signature.c | 156 rsa_sign(pgp_hash_t *hash, function 185 (void) fprintf(stderr, "rsa_sign: keysize too big\n"); 189 (void) fprintf(stderr, "rsa_sign: hashsize too big\n"); 196 printf("rsa_sign: PS is %d\n", keysize - hashsize - 1 - 2); 206 (void) fprintf(stderr, "rsa_sign: short %s hash\n", hash->name); 214 (void) fprintf(stderr, "rsa_sign: n != keysize\n"); 867 if (!rsa_sign(&sig->hash, &key->key.rsa, &seckey->key.rsa, 870 "pgp_write_sig: rsa_sign failure\n");
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 41 static OSSL_FUNC_signature_sign_fn rsa_sign; variable 514 static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen, function 585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, 917 * are ignored. Defer to rsa_sign. 928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); 1442 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign },
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 42 static OSSL_FUNC_signature_sign_fn rsa_sign; variable 745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, 862 * are ignored. Defer to rsa_sign. 884 static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen, function 1859 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign }, 2087 { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign }, \
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_lib.c | 3624 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local 3636 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID; 3642 OSSL_TRACE4(TLS_CIPHER, "dh_tmp=%d rsa_enc=%d rsa_sign=%d dsa_sign=%d\n", 3643 dh_tmp, rsa_enc, rsa_sign, dsa_sign); 3671 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN)
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_lib.c | 3370 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local 3385 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID; 3395 dh_tmp, rsa_enc, rsa_sign, dsa_sign); 3424 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN)
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_lib.c | 4564 int rsa_enc, rsa_sign, dh_tmp, dsa_sign; local 4576 rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID; 4582 OSSL_TRACE4(TLS_CIPHER, "dh_tmp=%d rsa_enc=%d rsa_sign=%d dsa_sign=%d\n", 4583 dh_tmp, rsa_enc, rsa_sign, dsa_sign); 4611 if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN) && pvalid[SSL_PKEY_RSA_PSS_SIGN] & CERT_PKEY_EXPLICIT_SIGN && TLS1_get_version(&s->ssl) == TLS1_2_VERSION))
|