/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 81 hx509_ca_tbs_init(hx509_context context, hx509_ca_tbs *tbs) in hx509_ca_tbs_init() argument 83 *tbs = calloc(1, sizeof(**tbs)); in hx509_ca_tbs_init() 84 if (*tbs == NULL) in hx509_ca_tbs_init() 99 hx509_ca_tbs_free(hx509_ca_tbs *tbs) in hx509_ca_tbs_free() argument 101 if (tbs == NULL || *tbs == NULL) in hx509_ca_tbs_free() 104 free_SubjectPublicKeyInfo(&(*tbs)->spki); in hx509_ca_tbs_free() 105 free_GeneralNames(&(*tbs)->san); in hx509_ca_tbs_free() 106 free_ExtKeyUsage(&(*tbs)->eku); in hx509_ca_tbs_free() 107 der_free_heim_integer(&(*tbs)->serial); in hx509_ca_tbs_free() 108 free_CRLDistributionPoints(&(*tbs)->crldp); in hx509_ca_tbs_free() [all …]
|
H A D | hxtool.c | 1560 https_server(hx509_context contextp, hx509_ca_tbs tbs, struct cert_type_opt *opt) in https_server() argument 1562 return hx509_ca_tbs_add_eku(contextp, tbs, &asn1_oid_id_pkix_kp_serverAuth); in https_server() 1566 https_client(hx509_context contextp, hx509_ca_tbs tbs, struct cert_type_opt *opt) in https_client() argument 1568 return hx509_ca_tbs_add_eku(contextp, tbs, &asn1_oid_id_pkix_kp_clientAuth); in https_client() 1572 peap_server(hx509_context contextp, hx509_ca_tbs tbs, struct cert_type_opt *opt) in peap_server() argument 1574 return hx509_ca_tbs_add_eku(contextp, tbs, &asn1_oid_id_pkix_kp_serverAuth); in peap_server() 1578 pkinit_kdc(hx509_context contextp, hx509_ca_tbs tbs, struct cert_type_opt *opt) in pkinit_kdc() argument 1581 return hx509_ca_tbs_add_eku(contextp, tbs, &asn1_oid_id_pkkdcekuoid); in pkinit_kdc() 1585 pkinit_client(hx509_context contextp, hx509_ca_tbs tbs, struct cert_type_opt *opt) in pkinit_client() argument 1591 ret = hx509_ca_tbs_add_eku(contextp, tbs, &asn1_oid_id_pkekuoid); in pkinit_client() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | ecdsatest.c | 76 const char *r_in = NULL, *s_in = NULL, *tbs = NULL; in x9_62_tests() local 93 tbs = ecdsa_cavs_kats[n].msg; in x9_62_tests() 106 || !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len)) in x9_62_tests() 191 unsigned char dirt, offset, tbs[128]; in test_builtin() local 226 || !TEST_int_gt(RAND_bytes(tbs, sizeof(tbs)), 0) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), in test_builtin() [all...] |
H A D | evp_extra_test.c | 1151 unsigned char tbs[] = { in test_EVP_PKEY_sign() local 1180 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, in test_EVP_PKEY_sign() 1181 sizeof(tbs)), 0)) in test_EVP_PKEY_sign() 1186 || !TEST_int_le(EVP_PKEY_sign(ctx, sig, &shortsig_len, tbs, in test_EVP_PKEY_sign() 1187 sizeof(tbs)), 0) in test_EVP_PKEY_sign() 1188 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 1192 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 1218 unsigned char tbs[] = { in test_EVP_PKEY_sign_with_app_method() local 1255 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, in test_EVP_PKEY_sign_with_app_method() 1256 sizeof(tbs)), 0)) in test_EVP_PKEY_sign_with_app_method() [all …]
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 152 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument 174 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign() 182 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign() 193 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument 215 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed448_digest_sign() 223 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey, in ed448_digest_sign() [all …]
|
H A D | rsa_sig.c | 515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument 551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign() 574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign() 585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign() 627 prsactx->tbuf, tbs, in rsa_sign() 644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign() 762 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument 772 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, in rsa_verify() 810 ret = RSA_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs, in rsa_verify() 839 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify()
|
H A D | sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
H A D | dsa_sig.c | 232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign() 263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
|
H A D | ecdsa_sig.c | 170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign() 205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | openssl-compat.c | 101 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 104 if (EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 115 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 117 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kx509.c | 156 hx509_ca_tbs tbs = NULL; in build_certificate() local 202 ret = hx509_ca_tbs_init(context->hx509ctx, &tbs); in build_certificate() 222 ret = hx509_ca_tbs_set_spki(context->hx509ctx, tbs, &spki); in build_certificate() 246 ret = hx509_ca_tbs_set_template(context->hx509ctx, tbs, in build_certificate() 256 hx509_ca_tbs_set_notAfter(context->hx509ctx, tbs, endtime); in build_certificate() 258 hx509_ca_tbs_subject_expand(context->hx509ctx, tbs, env); in build_certificate() 261 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert); in build_certificate() 266 hx509_ca_tbs_free(&tbs); in build_certificate() 277 if (tbs) in build_certificate() 278 hx509_ca_tbs_free(&tbs); in build_certificate()
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecx_meth.c | 806 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign25519() argument 825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, in pkey_ecd_digestsign25519() 833 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 860 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify25519() argument 873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 878 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify448() argument 891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448() 1186 const unsigned char *tbs, in s390x_pkey_ecd_digestsign25519() argument 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() [all …]
|
H A D | ec_pmeth.c | 107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 134 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 185 rctx->tbuf, tbs, in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument 270 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify() 287 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, in pkey_rsa_verify() 305 if ((rslen != tbslen) || memcmp(tbs, rctx->tbuf, rslen)) in pkey_rsa_verify()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_meth_new.pod | 64 const unsigned char *tbs, 71 const unsigned char *tbs, 82 char *tbs, 127 const unsigned char *tbs, 133 const unsigned char *tbs, 164 const unsigned char *tbs, 171 const unsigned char *tbs, 182 char *tbs, 227 const unsigned char *tbs, 233 const unsigned char *tbs, [all …]
|
H A D | EVP_PKEY_verify.pod | 16 const unsigned char *tbs, size_t tbslen); 32 signed) is specified using the I<tbs> and I<tbslen> parameters. 48 successfully (that is tbs did not match the original data or the signature was
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | m_sigver.c | 568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 580 tbs, tbslen); in EVP_DigestSign() 584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 676 tbs, tbslen); in EVP_DigestVerify() 680 return pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 683 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
H A D | signature.c | 632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 655 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 666 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify_init() 681 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() 704 tbs, tbslen); in EVP_PKEY_verify() 713 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify_recover_init_ex() 676 EVP_PKEY_verify(EVP_PKEY_CTX * ctx,const unsigned char * sig,size_t siglen,const unsigned char * tbs,size_t tbslen) EVP_PKEY_verify() argument
|
/freebsd/contrib/libfido2/src/ |
H A D | eddsa.c | 46 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 51 (void)tbs; in EVP_DigestVerify()
|
/freebsd/sys/contrib/dev/iwlwifi/queue/ |
H A D | tx.c |
|
H A D | tx.h |
|
/freebsd/lib/libsecureboot/ |
H A D | vets.c | 611 void *tbs; in check_forbidden_digests() local 626 tbs = X509_to_tbs(xcs[num].data, &tbs_len); in check_forbidden_digests() 627 if (tbs == NULL) { in check_forbidden_digests() 641 md->update(&ctx.vtable, tbs, tbs_len); in check_forbidden_digests() 655 md->update(&ctx.vtable, tbs, tbs_len); in check_forbidden_digests() 669 md->update(&ctx.vtable, tbs, tbs_len); in check_forbidden_digests()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 29 size_t sigsize, const unsigned char *tbs, size_t tbslen); 35 const unsigned char *tbs, size_t tbslen); 54 size_t sigsize, const unsigned char *tbs, 67 size_t siglen, const unsigned char *tbs, 211 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen> 232 The data that the signature covers is pointed to be the I<tbs> parameter which 289 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL, 323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
|
/freebsd/sys/contrib/dev/iwlwifi/ |
H A D | iwl-fh.h | 687 * 0-4 number of active tbs 690 * @tbs: transmit frame buffer descriptors 696 struct iwl_tfd_tb tbs[IWL_NUM_OF_TBS]; 703 * 0-4 number of active tbs 705 * @tbs: transmit frame buffer descriptors member 710 struct iwl_tfh_tb tbs[IWL_TFH_NUM_TBS]; 692 struct iwl_tfd_tb tbs[IWL_NUM_OF_TBS]; global() member
|