Searched refs:signature (Results 26 - 50 of 381) sorted by relevance

1234567891011>>

/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/
H A Dx_spki.c25 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
H A Dt_spki.c46 n = spki->signature->length;
47 s = (char *)spki->signature->data;
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/
H A Dx_spki.c25 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
H A Dt_spki.c46 n = spki->signature->length;
47 s = (char *)spki->signature->data;
/netbsd-current/external/bsd/libarchive/dist/libarchive/test/
H A Dtest_read_format_rar_filter.c33 const char signature[12] = { local
50 assertEqualMem(buff, signature, 12);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dsshsig.h33 * Creates a detached SSH signature for a given buffer.
35 * out is populated with the detached signature, or NULL on failure.
43 * Verifies that a detached signature is valid and optionally returns key
47 int sshsig_verifyb(struct sshbuf *signature,
54 * Creates a detached SSH signature for a given file.
56 * out is populated with the detached signature, or NULL on failure.
64 * Verifies that a detached signature over a file is valid and optionally
68 int sshsig_verify_fd(struct sshbuf *signature, int fd,
75 * Return a base64 encoded "ASCII armoured" version of a raw signature.
80 * Decode a base64 encoded armoured signature t
[all...]
H A Dkexgen.c146 u_char *signature = NULL; local
170 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 ||
217 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
225 /* save initial signature and hostkey */
235 if ((r = sshbuf_put(kex->initial_sig, signature, slen)) != 0)
247 free(signature);
274 u_char *signature = NULL, hash[SSH_DIGEST_MAX_LENGTH]; local
343 &signature, &slen, hash, hashlen, kex->hostkey_alg)) != 0)
350 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
366 free(signature);
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DServerKeyExchange.pm90 $self->signature($sig);
107 if (length($self->signature) > 0) {
108 $data .= pack('n', length($self->signature));
109 $data .= $self->signature;
149 sub signature subroutine
/netbsd-current/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
H A DServerKeyExchange.pm90 $self->signature($sig);
107 if (length($self->signature) > 0) {
108 $data .= pack('n', length($self->signature));
109 $data .= $self->signature;
149 sub signature subroutine
/netbsd-current/external/gpl3/gdb/dist/gdb/dwarf2/
H A Dattribute.h61 /* Return the signature. The attribute must have signature
66 return u.signature;
232 /* Set the signature value for this attribute. */
233 void set_signature (ULONGEST signature) argument
236 u.signature = signature;
323 ULONGEST signature; member in union:attribute::__anon253
/netbsd-current/external/gpl3/gdb.old/dist/gdb/dwarf2/
H A Dattribute.h61 /* Return the signature. The attribute must have signature
66 return u.signature;
232 /* Set the signature value for this attribute. */
233 void set_signature (ULONGEST signature) argument
236 u.signature = signature;
323 ULONGEST signature; member in union:attribute::__anon2454
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ec/curve448/
H A Deddsa.c160 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
251 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES);
252 memcpy(signature, nonce_point, sizeof(nonce_point));
253 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES],
269 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1,
282 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
305 * variable time, since if this is not the case the signature if publicly
309 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i])
311 if (signature[
159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) argument
267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) argument
280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) argument
364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) argument
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
[all...]
/netbsd-current/sys/external/bsd/drm2/dist/drm/nouveau/include/nvfw/
H A Dflcn.h47 u32 signature[4]; member in struct:flcn_bl_dmem_desc
66 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v1
83 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v2
/netbsd-current/external/ibm-public/postfix/dist/src/util/
H A Dmymalloc.c98 * free() calls we prepend a signature to memory given to the application.
104 int signature; /* set when block is active */ member in struct:MBLOCK
119 if (real_ptr->signature != SIGNATURE) \
121 real_ptr->signature = 0; \
127 real_ptr->signature = SIGNATURE; \
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/
H A DMakefile.am22 signature.c \
/netbsd-current/sys/arch/x86/include/
H A Dmpbiosreg.h55 uint32_t signature; member in struct:mpbios_fps
73 uint32_t signature; member in struct:mpbios_cth
/netbsd-current/external/apache2/mDNSResponder/dist/mDNSCore/
H A DCryptoAlg.h41 // Verify the ctx using the key and compare it against signature/siglen
42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_verifier/
H A Dverifier_transaction.c400 TSS_DAA_SIGNATURE_internal *signature = NULL; local
453 // allocation of signature
454 signature = e_2_i_TSS_DAA_SIGNATURE( &signature_ext);
455 if( signature == NULL) {
462 sA = signature->sA;
484 c = bi_set_as_nbin( signature->challenge_length, signature->challenge);
488 if( bi_equals( signature->zeta, zeta_2_verify) == 0) {
540 // exp = signature->sE + tmp1
541 bi_add( exp, signature
[all...]
/netbsd-current/sys/compat/linux/common/
H A Dlinux_exec_elf32.c100 static const char signature[] = "__libc_atexit"; local
101 const size_t sigsz = sizeof(signature);
102 char tbuf[sizeof(signature)];
132 if (!memcmp(tbuf, signature, sigsz)) {
149 * with gcc, and gcc sticks in the comment field a signature. Note that
150 * on SVR4 binaries, the gcc signature will follow the OS name signature,
155 * XXX we have the same gcc signature which incorrectly identifies
166 static const char signature[] = "\0GCC: (GNU) "; local
167 char tbuf[sizeof(signature)
225 static const char signature[] = ".gnu_debuglink"; local
283 static const char signature[] = ".gopclntab"; local
[all...]
/netbsd-current/external/bsd/libarchive/dist/libarchive/
H A Darchive_read_support_filter_program.c71 const char *cmd, const void *signature, size_t signature_len)
74 cmd, signature, signature_len);
85 * The bidder object stores the command and the signature to watch for.
92 void *signature; member in struct:program_bidder
134 const char *cmd, const void *signature, size_t signature_len)
149 if (signature != NULL && signature_len > 0) {
151 state->signature = malloc(signature_len);
152 memcpy(state->signature, signature, signature_len);
182 free(state->signature);
70 archive_read_support_compression_program_signature(struct archive *a, const char *cmd, const void *signature, size_t signature_len) argument
133 archive_read_support_filter_program_signature(struct archive *_a, const char *cmd, const void *signature, size_t signature_len) argument
[all...]
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_platform/
H A Dtest_join.c75 BYTE *signature,
90 ret = RSA_sign( NID_sha1, message, current_len_message, signature, len_signature, rsa);
94 LogDebug("Sign rsa-> signature (length=%d)", *len_signature );
102 BYTE *signature; local
132 signature = (BYTE *)malloc( RSA_size(rsa));
134 // signature algorithm from Issuer.java - "SHA1withRSA"
138 LogDebug("signature=%s\n", dump_byte_array(256, signature));
148 signature, &len_sign, issuer->key_chain[i-1]);
153 LogDebug("Sign rsa->n (length=%d) with signature (lengt
72 sign( BYTE *buffer_2_sign, int len_buffer_2_sign, RSA *rsa, BYTE *signature, int *len_signature ) argument
183 BYTE *signature; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/
H A Dtest_soft_pkcs11.c79 static char signature[1024]; variable
165 ck_sigsize = sizeof(signature);
167 (CK_BYTE *)signature, &ck_sigsize);
177 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize,
198 ck_sigsize = sizeof(signature);
200 (CK_BYTE *)signature, &ck_sigsize);
211 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
/netbsd-current/external/gpl3/gcc.old/dist/gcc/config/
H A Dsol2.c196 /* Hash table of group signature symbols. */
201 FLAGS and group signature symbol DECL, using Sun as syntax. */
206 const char *signature; local
211 signature = IDENTIFIER_POINTER (decl);
213 signature = IDENTIFIER_POINTER (DECL_COMDAT_GROUP (decl));
219 of the form .text.<signature>) and append %<signature> to pacify as,
221 section = concat (name, "%", signature, NULL);
232 signature, section);
234 /* Unlike GNU as, group signature symbol
[all...]
/netbsd-current/external/gpl3/gcc/dist/gcc/config/
H A Dsol2.cc197 /* Hash table of group signature symbols. */
202 FLAGS and group signature symbol DECL, using Sun as syntax. */
207 const char *signature; local
212 signature = IDENTIFIER_POINTER (decl);
214 signature = IDENTIFIER_POINTER (DECL_COMDAT_GROUP (decl));
220 of the form .text.<signature>) and append %<signature> to pacify as,
222 section = concat (name, "%", signature, NULL);
233 signature, section);
235 /* Unlike GNU as, group signature symbol
[all...]
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libverify/
H A Dlibverify.c122 /* signature mpi indices in bignumber array */
129 /* signature types */
132 #define SIGTYPE_STANDALONE 0x02 /* Standalone signature */
143 #define SIGTYPE_KEY_REVOCATION 0x20 /* Key revocation signature */
144 #define SIGTYPE_SUBKEY_REVOCATION 0x28 /* Subkey revocation signature */
145 #define SIGTYPE_CERT_REVOCATION 0x30 /* Certification revocation signature */
147 #define SIGTYPE_TIMESTAMP_SIG 0x40 /* Timestamp signature */
148 #define SIGTYPE_3RDPARTY 0x50 /* Third-Party Confirmation signature */
666 /* read mpis in signature */
698 /* add the signature su
1206 recog_signature(pgpv_t *pgp, pgpv_signature_t *signature) argument
1224 pgpv_signature_t signature; local
1256 pgpv_signature_t signature; local
1282 pgpv_signature_t signature; local
1683 valid_dates(pgpv_signature_t *signature, pgpv_pubkey_t *pubkey, char *buf, size_t size) argument
1955 pgpv_signature_t signature; local
2137 match_sig(pgpv_cursor_t *cursor, pgpv_signature_t *signature, pgpv_pubkey_t *pubkey, uint8_t *data, size_t size) argument
2262 pgpv_signature_t *signature; local
[all...]

Completed in 410 milliseconds

1234567891011>>