| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | p_verify.c | 17 int EVP_VerifyFinal_ex(EVP_MD_CTX *ctx, const unsigned char *sigbuf, in EVP_VerifyFinal_ex() argument 55 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex() 61 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, in EVP_VerifyFinal() argument 64 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL); in EVP_VerifyFinal()
|
| /freebsd/usr.bin/tip/tip/ |
| H A D | tipout.c | 44 static jmp_buf sigbuf; variable 61 longjmp(sigbuf, 1); in intIOT() 96 longjmp(sigbuf, 1); in intEMT() 114 longjmp(sigbuf, 1); in intSYS() 136 (void) setjmp(sigbuf); in tipout()
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() argument 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
| H A D | ecdsa_ossl.c | 420 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ossl_ecdsa_verify() argument 423 const unsigned char *p = sigbuf; in ossl_ecdsa_verify() 435 if (derlen != sig_len || memcmp(sigbuf, der, derlen) != 0) in ossl_ecdsa_verify()
|
| H A D | ec_kmeth.c | 248 const unsigned char *sigbuf, in EC_KEY_METHOD_set_verify() argument 325 const unsigned char *sigbuf, in EC_KEY_METHOD_get_verify() argument
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-ecdsa-sk.c | 247 struct sshbuf *b = NULL, *sigbuf = NULL, *original_signed = NULL; in ssh_ecdsa_sk_verify() local 282 if (sshbuf_froms(b, &sigbuf) != 0 || in ssh_ecdsa_sk_verify() 302 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_sk_verify() 303 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_sk_verify() 307 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify() 430 sshbuf_free(sigbuf); in ssh_ecdsa_sk_verify()
|
| H A D | ssh-ecdsa.c | 395 struct sshbuf *b = NULL, *sigbuf = NULL; in ssh_ecdsa_verify() local 411 sshbuf_froms(b, &sigbuf) != 0) { in ssh_ecdsa_verify() 425 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_verify() 426 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_verify() 430 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify() 465 sshbuf_free(sigbuf); in ssh_ecdsa_verify()
|
| H A D | serverloop.c | 648 struct sshbuf *sigbuf = NULL; in server_input_hostkeys_prove() local 656 if ((resp = sshbuf_new()) == NULL || (sigbuf = sshbuf_new()) == NULL) in server_input_hostkeys_prove() 686 sshbuf_reset(sigbuf); in server_input_hostkeys_prove() 705 if ((r = sshbuf_put_cstring(sigbuf, in server_input_hostkeys_prove() 707 (r = sshbuf_put_stringb(sigbuf, in server_input_hostkeys_prove() 709 (r = sshkey_puts(key, sigbuf)) != 0 || in server_input_hostkeys_prove() 711 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove() 724 sshbuf_free(sigbuf); in server_input_hostkeys_prove()
|
| H A D | monitor.c | 711 struct sshbuf *sigbuf = NULL; in mm_answer_sign() local 752 if ((sigbuf = sshbuf_new()) == NULL) in mm_answer_sign() 754 if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 || in mm_answer_sign() 755 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 757 (r = sshkey_puts(key, sigbuf)) != 0) in mm_answer_sign() 759 if (datlen != sshbuf_len(sigbuf) || in mm_answer_sign() 760 memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) in mm_answer_sign() 762 datlen, sshbuf_len(sigbuf)); in mm_answer_sign() 763 sshbuf_free(sigbuf); in mm_answer_sign()
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_sign.c | 346 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 362 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 461 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 465 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() 467 return ossl_rsa_verify(type, m, m_len, NULL, NULL, sigbuf, siglen, rsa); in RSA_verify()
|
| H A D | rsa_saos.c | 59 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument 75 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
| H A D | rsa_meth.c | 238 unsigned int m_length, const unsigned char *sigbuf, in RSA_meth_get_verify() 247 const unsigned char *sigbuf, in RSA_meth_set_verify() argument
|
| /freebsd/sys/netsmb/ |
| H A D | smb_crypt.c | 267 u_char sigbuf[8]; in smb_rq_verify() local 291 *(u_int32_t *)sigbuf = htole32(rqp->sr_rseqno); in smb_rq_verify() 292 *(u_int32_t *)(sigbuf + 4) = 0; in smb_rq_verify() 293 MD5Update(&md5, sigbuf, 8); in smb_rq_verify()
|
| /freebsd/crypto/openssl/apps/ |
| H A D | dgst.c | 131 unsigned char *buf = NULL, *sigbuf = NULL; in dgst_main() local 431 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 432 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 471 sigkey, sigbuf, siglen, NULL, "stdin"); in dgst_main() 474 sigkey, sigbuf, siglen, NULL, md_name, "stdin"); in dgst_main() 491 sigkey, sigbuf, siglen, sig_name, in dgst_main() 496 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 515 OPENSSL_free(sigbuf); in dgst_main()
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_sign.c | 195 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument 198 const unsigned char *p = sigbuf; in DSA_verify() 210 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
|
| /freebsd/contrib/dma/ |
| H A D | util.c | 253 static sigjmp_buf sigbuf; variable 261 siglongjmp(sigbuf, 1); in sigalrm_handler() 278 ret = sigsetjmp(sigbuf, 1); in do_timeout()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_VerifyInit.pod | 15 int EVP_VerifyFinal_ex(EVP_MD_CTX *ctx, const unsigned char *sigbuf, 18 int EVP_VerifyFinal(EVP_MD_CTX *ctx, unsigned char *sigbuf, unsigned int siglen, 37 I<pkey> and I<siglen> bytes in I<sigbuf>.
|
| H A D | RSA_sign_ASN1_OCTET_STRING.pod | 20 unsigned int m_len, unsigned char *sigbuf, 41 RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
|
| H A D | RSA_sign.pod | 19 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 42 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
| H A D | DSA_sign.pod | 21 unsigned char *sigbuf, int siglen, DSA *dsa); 41 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
| /freebsd/contrib/less/ |
| H A D | os.c | 485 static char sigbuf[sizeof("Signal ") + INT_STRLEN_BOUND(sig) + 1]; in signal_message() local 491 sprintf(sigbuf, "Signal %d", sig); in signal_message() 492 return sigbuf; in signal_message()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | rsa.h | 363 const unsigned char *sigbuf, 378 unsigned char *sigbuf, unsigned int siglen, 582 const unsigned char *sigbuf, 589 const unsigned char *sigbuf,
|
| /freebsd/crypto/openssl/test/ |
| H A D | rsa_test.c | 375 unsigned char sigbuf[384]; in test_EVP_rsa_legacy_key() local 482 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen))); in test_EVP_rsa_legacy_key()
|
| /freebsd/contrib/libucl/src/ |
| H A D | ucl_util.c | 1033 unsigned char *sigbuf = NULL; local 1037 if (!ucl_fetch_url (urlbuf, &sigbuf, &siglen, &parser->err, true)) { 1040 if (!ucl_sig_check (buf, buflen, sigbuf, siglen, parser)) { 1045 ucl_munmap (sigbuf, siglen); 1050 ucl_munmap (sigbuf, siglen); 1151 unsigned char *sigbuf = NULL; local 1155 if (!ucl_fetch_file (filebuf, &sigbuf, &siglen, &parser->err, true)) { 1162 if (!ucl_sig_check (buf, buflen, sigbuf, siglen, parser)) { 1166 if (sigbuf) { 1167 ucl_munmap (sigbuf, siglen); [all …]
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | rsa.h | 114 size_t *prm_len, const unsigned char *sigbuf,
|