/freebsd/crypto/openssl/crypto/evp/ |
H A D | p_verify.c | 17 int EVP_VerifyFinal_ex(EVP_MD_CTX *ctx, const unsigned char *sigbuf, in EVP_VerifyFinal_ex() argument 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex() 59 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, in EVP_VerifyFinal() argument 62 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL); in EVP_VerifyFinal()
|
/freebsd/usr.bin/tip/tip/ |
H A D | tipout.c | 44 static jmp_buf sigbuf; variable 61 longjmp(sigbuf, 1); in intIOT() 96 longjmp(sigbuf, 1); in intEMT() 114 longjmp(sigbuf, 1); in intSYS() 136 (void) setjmp(sigbuf); in tipout()
|
/freebsd/crypto/openssh/ |
H A D | ssh-ecdsa-sk.c | 247 struct sshbuf *b = NULL, *sigbuf = NULL, *original_signed = NULL; in ssh_ecdsa_sk_verify() local 282 if (sshbuf_froms(b, &sigbuf) != 0 || in ssh_ecdsa_sk_verify() 302 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_sk_verify() 303 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_sk_verify() 307 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify() 430 sshbuf_free(sigbuf); in ssh_ecdsa_sk_verify()
|
H A D | ssh-ecdsa.c | 395 struct sshbuf *b = NULL, *sigbuf = NULL; in ssh_ecdsa_verify() local 411 sshbuf_froms(b, &sigbuf) != 0) { in ssh_ecdsa_verify() 425 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_verify() 426 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_verify() 430 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify() 465 sshbuf_free(sigbuf); in ssh_ecdsa_verify()
|
H A D | serverloop.c | 648 struct sshbuf *sigbuf = NULL; in server_input_hostkeys_prove() local 656 if ((resp = sshbuf_new()) == NULL || (sigbuf = sshbuf_new()) == NULL) in server_input_hostkeys_prove() 686 sshbuf_reset(sigbuf); in server_input_hostkeys_prove() 704 if ((r = sshbuf_put_cstring(sigbuf, in server_input_hostkeys_prove() 706 (r = sshbuf_put_stringb(sigbuf, in server_input_hostkeys_prove() 708 (r = sshkey_puts(key, sigbuf)) != 0 || in server_input_hostkeys_prove() 710 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove() 723 sshbuf_free(sigbuf); in server_input_hostkeys_prove()
|
H A D | monitor.c | 617 struct sshbuf *sigbuf = NULL; in mm_answer_sign() local 655 if ((sigbuf = sshbuf_new()) == NULL) in mm_answer_sign() 657 if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 || in mm_answer_sign() 658 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 660 (r = sshkey_puts(key, sigbuf)) != 0) in mm_answer_sign() 662 if (datlen != sshbuf_len(sigbuf) || in mm_answer_sign() 663 memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) in mm_answer_sign() 665 datlen, sshbuf_len(sigbuf)); in mm_answer_sign() 666 sshbuf_free(sigbuf); in mm_answer_sign()
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() argument 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
H A D | ecdsa_ossl.c | 362 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ossl_ecdsa_verify() argument 365 const unsigned char *p = sigbuf; in ossl_ecdsa_verify() 377 if (derlen != sig_len || memcmp(sigbuf, der, derlen) != 0) in ossl_ecdsa_verify()
|
H A D | ec_kmeth.c | 255 const unsigned char *sigbuf, in EC_KEY_METHOD_set_verify() argument 333 const unsigned char *sigbuf, in EC_KEY_METHOD_get_verify() argument
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 333 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 450 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 454 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() 456 return ossl_rsa_verify(type, m, m_len, NULL, NULL, sigbuf, siglen, rsa); in RSA_verify()
|
H A D | rsa_saos.c | 61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_meth.c | 250 unsigned int m_length, const unsigned char *sigbuf, in RSA_meth_get_verify() 259 const unsigned char *sigbuf, in RSA_meth_set_verify() argument
|
/freebsd/sys/netsmb/ |
H A D | smb_crypt.c | 267 u_char sigbuf[8]; in smb_rq_verify() local 291 *(u_int32_t *)sigbuf = htole32(rqp->sr_rseqno); in smb_rq_verify() 292 *(u_int32_t *)(sigbuf + 4) = 0; in smb_rq_verify() 293 MD5Update(&md5, sigbuf, 8); in smb_rq_verify()
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_sign.c | 192 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() 195 const unsigned char *p = sigbuf; in DSA_verify() 207 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify() 187 DSA_verify(int type,const unsigned char * dgst,int dgst_len,const unsigned char * sigbuf,int siglen,DSA * dsa) DSA_verify() argument
|
/freebsd/crypto/openssl/apps/ |
H A D | dgst.c | 111 unsigned char *buf = NULL, *sigbuf = NULL; in dgst_main() local 401 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 402 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 438 ret = do_fp(out, buf, inp, separator, out_bin, xoflen, sigkey, sigbuf, in dgst_main() 455 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 472 OPENSSL_free(sigbuf); in dgst_main()
|
/freebsd/contrib/dma/ |
H A D | util.c | 253 static sigjmp_buf sigbuf; variable 261 siglongjmp(sigbuf, 1); in sigalrm_handler() 278 ret = sigsetjmp(sigbuf, 1); in do_timeout()
|
/freebsd/contrib/less/ |
H A D | os.c | 385 static char sigbuf[sizeof("Signal ") + INT_STRLEN_BOUND(sig) + 1]; in signal_message() 391 sprintf(sigbuf, "Signal %d", sig); in signal_message() 392 return sigbuf; 383 static char sigbuf[sizeof("Signal ") + INT_STRLEN_BOUND(sig) + 1]; signal_message() local
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_VerifyInit.pod | 15 int EVP_VerifyFinal_ex(EVP_MD_CTX *ctx, const unsigned char *sigbuf, 18 int EVP_VerifyFinal(EVP_MD_CTX *ctx, unsigned char *sigbuf, unsigned int siglen, 37 I<pkey> and I<siglen> bytes in I<sigbuf>.
|
H A D | RSA_sign_ASN1_OCTET_STRING.pod | 20 unsigned int m_len, unsigned char *sigbuf, 41 RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
|
H A D | RSA_sign.pod | 19 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 42 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
H A D | DSA_sign.pod | 21 unsigned char *sigbuf, int siglen, DSA *dsa); 41 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 353 const unsigned char *sigbuf, 368 unsigned char *sigbuf, unsigned int siglen, 572 const unsigned char *sigbuf, 579 const unsigned char *sigbuf,
|
/freebsd/crypto/openssl/test/ |
H A D | rsa_test.c | 399 unsigned char sigbuf[384]; in test_EVP_rsa_legacy_key() local 502 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen))); in test_EVP_rsa_legacy_key()
|
/freebsd/contrib/libucl/src/ |
H A D | ucl_util.c | 1025 unsigned char *sigbuf = NULL; local 1029 if (!ucl_fetch_url (urlbuf, &sigbuf, &siglen, &parser->err, true)) { 1032 if (!ucl_sig_check (buf, buflen, sigbuf, siglen, parser)) { 1037 ucl_munmap (sigbuf, siglen); 1042 ucl_munmap (sigbuf, siglen); 1136 unsigned char *sigbuf = NULL; local 1140 if (!ucl_fetch_file (filebuf, &sigbuf, &siglen, &parser->err, true)) { 1143 if (!ucl_sig_check (buf, buflen, sigbuf, siglen, parser)) { 1147 if (sigbuf) { 1148 ucl_munmap (sigbuf, siglen); [all …]
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rsa.h | 104 size_t *prm_len, const unsigned char *sigbuf,
|