Home
last modified time | relevance | path

Searched refs:vrfy (Results 1 – 11 of 11) sorted by relevance

/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_ossl.c609 BIGNUM *r1, *m1, *vrfy; in rsa_ossl_mod_exp() local
624 vrfy = BN_CTX_get(ctx); in rsa_ossl_mod_exp()
625 if (vrfy == NULL) in rsa_ossl_mod_exp()
915 if (!BN_mod_exp_mont(vrfy, r0, rsa->e, rsa->n, ctx, in rsa_ossl_mod_exp()
920 if (!rsa->meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx, in rsa_ossl_mod_exp()
930 if (!BN_sub(vrfy, vrfy, I)) in rsa_ossl_mod_exp()
932 if (BN_is_zero(vrfy)) { in rsa_ossl_mod_exp()
937 if (!BN_mod(vrfy, vrfy, rsa->n, ctx)) in rsa_ossl_mod_exp()
939 if (BN_is_negative(vrfy)) in rsa_ossl_mod_exp()
940 if (!BN_add(vrfy, vrfy, rsa->n)) in rsa_ossl_mod_exp()
[all …]
/freebsd/crypto/openssl/crypto/bn/
H A Dbn_sqrt.c104 goto vrfy; in BN_mod_sqrt()
166 goto vrfy; in BN_mod_sqrt()
304 goto vrfy; in BN_mod_sqrt()
342 vrfy: in BN_mod_sqrt()
/freebsd/lib/libsecureboot/
H A Dvets.c793 br_ecdsa_vrfy vrfy; in verify_ec() local
819 vrfy = br_ecdsa_vrfy_asn1_get_default(); in verify_ec()
820 if (!vrfy(ec, rhbuf, br_sha256_SIZE, &pk->key.ec, po->data, in verify_ec()
842 br_rsa_pkcs1_vrfy vrfy; in verify_rsa_digest() local
845 vrfy = br_rsa_pkcs1_vrfy_get_default(); in verify_rsa_digest()
847 if (!vrfy(sdata, slen, hash_oid, mlen, pkey, vhbuf) || in verify_rsa_digest()
/freebsd/contrib/sendmail/src/
H A Dhelpfile70 vrfy VRFY <recipient>
71 vrfy Verify an address. If you want to see what it aliases
72 vrfy to, use EXPN instead.
H A Dsrvrsmtp.c956 bool vrfy; /* set if this is a vrfy command */ local
3535 vrfy = c->cmd_code == CMDVRFY;
3536 DELAY_CONN(vrfy ? "VRFY" : "EXPN");
3542 vrfy ? "VRFY" : "EXPN",
3550 false, vrfy ? "VRFY" : "EXPN", e);
3553 if ((vrfy && bitset(PRIV_NOVRFY, PrivacyFlags)) ||
3554 (!vrfy && !bitset(SRV_OFFER_EXPN, features)))
3556 if (vrfy)
3568 bitset(vrfy ? PRIV_NEEDVRFYHELO : PRIV_NEEDEXPNHELO,
3584 if (vrfy)
[all …]
H A Ddeliver.c1716 char *vrfy; local
2685 vrfy = "";
2688 vrfy = macget(&mci->mci_macro, macid("{verify}"));
2689 new_session = NULL == vrfy || strcmp("TRUSTED", vrfy) != 0;
2694 dane_new, new_session, vrfy);
4300 vrfy = macvalue(macid("{verify}"), e);
4301 if (NULL == vrfy)
4302 vrfy = "NONE";
4303 vrfy = sm_strdup(vrfy);
4306 vrfy, to->q_user, CurHostName, RCPT_MXSECURE(to),
[all …]
H A Dtls.c533 tls_set_verify(ctx, ssl, vrfy)
536 bool vrfy;
539 SSL_set_verify(ssl, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE, NULL);
541 SSL_CTX_set_verify(ctx, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE,
/freebsd/contrib/bearssl/test/
H A Dtest_crypto.c6382 br_rsa_pss_sign sign, br_rsa_pss_vrfy vrfy) in test_RSA_PSS() argument
6455 if (vrfy(sig, sig_len, in test_RSA_PSS()
6464 if (vrfy(sig, sig_len, in test_RSA_PSS()
6765 br_rsa_public pub, br_rsa_pkcs1_sign sign, br_rsa_pkcs1_vrfy vrfy) in test_RSA_keygen() argument
6921 if (!vrfy(sig, pk.nlen, BR_HASH_OID_SHA256, sizeof hv, in test_RSA_keygen()
6993 br_rsa_pkcs1_vrfy vrfy; in test_RSA_i62() local
7003 vrfy = br_rsa_i62_pkcs1_vrfy_get(); in test_RSA_i62()
7010 if (!priv || !sign || !vrfy || !pss_sign || !pss_vrfy in test_RSA_i62()
7017 test_RSA_sign("RSA i62 sign", priv, sign, vrfy); in test_RSA_i62()
7023 sign, vrfy); in test_RSA_i62()
[all …]
H A Dtest_speed.c1146 br_ecdsa_sign sign, br_ecdsa_vrfy vrfy) in test_speed_ecdsa_inner() argument
1173 if (vrfy(impl, hv, sizeof hv, &pk, sig, sig_len) != 1) { in test_speed_ecdsa_inner()
1181 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len); in test_speed_ecdsa_inner()
1214 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len); in test_speed_ecdsa_inner()
/freebsd/contrib/bearssl/src/x509/
H A Dx509_minimal.t0913 cc: do-rsa-vrfy ( nlen elen -- err ) {
930 cc: do-ecdsa-vrfy ( curve qlen -- err ) {
1308 KEYTYPE_RSA of nlen elen do-rsa-vrfy endof
1309 KEYTYPE_EC of curve qlen do-ecdsa-vrfy endof
/freebsd/sys/dev/bnxt/bnxt_en/
H A Dif_bnxt.c3783 struct bnxt_ioctl_hwrm_nvm_verify_update *vrfy = in bnxt_priv_ioctl() local
3786 rc = bnxt_hwrm_nvm_verify_update(softc, vrfy->type, in bnxt_priv_ioctl()
3787 vrfy->ordinal, vrfy->ext); in bnxt_priv_ioctl()