/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 609 BIGNUM *r1, *m1, *vrfy; in rsa_ossl_mod_exp() local 624 vrfy = BN_CTX_get(ctx); in rsa_ossl_mod_exp() 625 if (vrfy == NULL) in rsa_ossl_mod_exp() 915 if (!BN_mod_exp_mont(vrfy, r0, rsa->e, rsa->n, ctx, in rsa_ossl_mod_exp() 920 if (!rsa->meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx, in rsa_ossl_mod_exp() 930 if (!BN_sub(vrfy, vrfy, I)) in rsa_ossl_mod_exp() 932 if (BN_is_zero(vrfy)) { in rsa_ossl_mod_exp() 937 if (!BN_mod(vrfy, vrfy, rsa->n, ctx)) in rsa_ossl_mod_exp() 939 if (BN_is_negative(vrfy)) in rsa_ossl_mod_exp() 940 if (!BN_add(vrfy, vrfy, rsa->n)) in rsa_ossl_mod_exp() [all …]
|
/freebsd/crypto/openssl/crypto/bn/ |
H A D | bn_sqrt.c | 104 goto vrfy; in BN_mod_sqrt() 166 goto vrfy; in BN_mod_sqrt() 304 goto vrfy; in BN_mod_sqrt() 342 vrfy: in BN_mod_sqrt()
|
/freebsd/lib/libsecureboot/ |
H A D | vets.c | 793 br_ecdsa_vrfy vrfy; in verify_ec() local 819 vrfy = br_ecdsa_vrfy_asn1_get_default(); in verify_ec() 820 if (!vrfy(ec, rhbuf, br_sha256_SIZE, &pk->key.ec, po->data, in verify_ec() 842 br_rsa_pkcs1_vrfy vrfy; in verify_rsa_digest() local 845 vrfy = br_rsa_pkcs1_vrfy_get_default(); in verify_rsa_digest() 847 if (!vrfy(sdata, slen, hash_oid, mlen, pkey, vhbuf) || in verify_rsa_digest()
|
/freebsd/contrib/sendmail/src/ |
H A D | helpfile | 70 vrfy VRFY <recipient> 71 vrfy Verify an address. If you want to see what it aliases 72 vrfy to, use EXPN instead.
|
H A D | srvrsmtp.c | 956 bool vrfy; /* set if this is a vrfy command */ local 3535 vrfy = c->cmd_code == CMDVRFY; 3536 DELAY_CONN(vrfy ? "VRFY" : "EXPN"); 3542 vrfy ? "VRFY" : "EXPN", 3550 false, vrfy ? "VRFY" : "EXPN", e); 3553 if ((vrfy && bitset(PRIV_NOVRFY, PrivacyFlags)) || 3554 (!vrfy && !bitset(SRV_OFFER_EXPN, features))) 3556 if (vrfy) 3568 bitset(vrfy ? PRIV_NEEDVRFYHELO : PRIV_NEEDEXPNHELO, 3584 if (vrfy) [all …]
|
H A D | deliver.c | 1716 char *vrfy; local 2685 vrfy = ""; 2688 vrfy = macget(&mci->mci_macro, macid("{verify}")); 2689 new_session = NULL == vrfy || strcmp("TRUSTED", vrfy) != 0; 2694 dane_new, new_session, vrfy); 4300 vrfy = macvalue(macid("{verify}"), e); 4301 if (NULL == vrfy) 4302 vrfy = "NONE"; 4303 vrfy = sm_strdup(vrfy); 4306 vrfy, to->q_user, CurHostName, RCPT_MXSECURE(to), [all …]
|
H A D | tls.c | 533 tls_set_verify(ctx, ssl, vrfy) 536 bool vrfy; 539 SSL_set_verify(ssl, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE, NULL); 541 SSL_CTX_set_verify(ctx, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE,
|
/freebsd/contrib/bearssl/test/ |
H A D | test_crypto.c | 6382 br_rsa_pss_sign sign, br_rsa_pss_vrfy vrfy) in test_RSA_PSS() argument 6455 if (vrfy(sig, sig_len, in test_RSA_PSS() 6464 if (vrfy(sig, sig_len, in test_RSA_PSS() 6765 br_rsa_public pub, br_rsa_pkcs1_sign sign, br_rsa_pkcs1_vrfy vrfy) in test_RSA_keygen() argument 6921 if (!vrfy(sig, pk.nlen, BR_HASH_OID_SHA256, sizeof hv, in test_RSA_keygen() 6993 br_rsa_pkcs1_vrfy vrfy; in test_RSA_i62() local 7003 vrfy = br_rsa_i62_pkcs1_vrfy_get(); in test_RSA_i62() 7010 if (!priv || !sign || !vrfy || !pss_sign || !pss_vrfy in test_RSA_i62() 7017 test_RSA_sign("RSA i62 sign", priv, sign, vrfy); in test_RSA_i62() 7023 sign, vrfy); in test_RSA_i62() [all …]
|
H A D | test_speed.c | 1146 br_ecdsa_sign sign, br_ecdsa_vrfy vrfy) in test_speed_ecdsa_inner() argument 1173 if (vrfy(impl, hv, sizeof hv, &pk, sig, sig_len) != 1) { in test_speed_ecdsa_inner() 1181 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len); in test_speed_ecdsa_inner() 1214 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len); in test_speed_ecdsa_inner()
|
/freebsd/contrib/bearssl/src/x509/ |
H A D | x509_minimal.t0 | 913 cc: do-rsa-vrfy ( nlen elen -- err ) { 930 cc: do-ecdsa-vrfy ( curve qlen -- err ) { 1308 KEYTYPE_RSA of nlen elen do-rsa-vrfy endof 1309 KEYTYPE_EC of curve qlen do-ecdsa-vrfy endof
|
/freebsd/sys/dev/bnxt/bnxt_en/ |
H A D | if_bnxt.c | 3783 struct bnxt_ioctl_hwrm_nvm_verify_update *vrfy = in bnxt_priv_ioctl() local 3786 rc = bnxt_hwrm_nvm_verify_update(softc, vrfy->type, in bnxt_priv_ioctl() 3787 vrfy->ordinal, vrfy->ext); in bnxt_priv_ioctl()
|