/titanic_41/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_property.c | 195 char signature[1024]; in create_BasicProperty() local 208 (void) snprintf(signature, sizeof (signature), in create_BasicProperty() 213 env, class, "<init>", signature); in create_BasicProperty() 221 (void) snprintf(signature, sizeof (signature), in create_BasicProperty() 227 env, class, "<init>", signature); in create_BasicProperty() 288 char signature[1024]; in create_ObjectProperty() local 295 (void) snprintf(signature, sizeof (signature), in create_ObjectProperty() 299 env, class, "<init>", signature); in create_ObjectProperty() 307 (void) snprintf(signature, sizeof (signature), in create_ObjectProperty() 312 env, class, "<init>", signature); in create_ObjectProperty() [all …]
|
/titanic_41/usr/src/uts/common/crypto/api/ |
H A D | kcf_sign.c | 147 crypto_data_t *signature, crypto_call_req_t *cr) in crypto_sign_single() argument 162 NULL, data, signature, NULL); in crypto_sign_single() 201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, in crypto_sign_final() argument 218 NULL, NULL, signature, NULL); in crypto_sign_final() 229 crypto_ctx_template_t tmpl, crypto_data_t *signature, in crypto_sign_prov() argument 248 key, data, signature, tmpl); in crypto_sign_prov() 258 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, in sign_sr_atomic_common() argument 305 key, data, spi_ctx_tmpl, signature, in sign_sr_atomic_common() 309 &lmech, key, data, spi_ctx_tmpl, signature, in sign_sr_atomic_common() 317 mech, key, data, signature, spi_ctx_tmpl); in sign_sr_atomic_common() [all …]
|
H A D | kcf_verify.c | 148 crypto_data_t *signature, crypto_call_req_t *cr) in crypto_verify_single() argument 163 NULL, data, signature, NULL); in crypto_verify_single() 203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, in crypto_verify_final() argument 220 NULL, NULL, NULL, signature, NULL); in crypto_verify_final() 231 crypto_ctx_template_t tmpl, crypto_data_t *signature, in crypto_verify_prov() argument 250 key, data, signature, tmpl); in crypto_verify_prov() 260 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, in verify_vr_atomic_common() argument 307 key, data, spi_ctx_tmpl, signature, in verify_vr_atomic_common() 312 &lmech, key, signature, spi_ctx_tmpl, data, in verify_vr_atomic_common() 320 mech, key, data, signature, spi_ctx_tmpl); in verify_vr_atomic_common() [all …]
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | verify_mgr.c | 235 CK_BYTE * signature, in verify_mgr_verify() argument 248 if (! in_data || ! signature) { in verify_mgr_verify() 259 signature, sig_len)); in verify_mgr_verify() 264 signature, sig_len)); in verify_mgr_verify() 270 signature, sig_len)); in verify_mgr_verify() 275 signature, sig_len)); in verify_mgr_verify() 312 CK_BYTE * signature, in verify_mgr_verify_final() argument 328 signature, sig_len)); in verify_mgr_verify_final() 338 CK_BYTE * signature, in verify_mgr_verify_recover() argument 353 if (! signature || ! out_len) { in verify_mgr_verify_recover() [all …]
|
H A D | mech_rsa.c | 311 CK_BYTE * signature, in rsa_pkcs_verify() argument 338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature, in rsa_pkcs_verify() 348 CK_BYTE *signature, in rsa_pkcs_verify_recover() argument 382 signature, modulus_bytes, out_data, out_data_len, key_obj); in rsa_pkcs_verify_recover() 393 CK_BYTE * signature, in rsa_hash_pkcs_sign() argument 464 ber_data_len, signature, sig_len); in rsa_hash_pkcs_sign() 523 CK_BYTE * signature, in rsa_hash_pkcs_verify() argument 593 ber_data_len, signature, sig_len); in rsa_hash_pkcs_verify() 648 CK_BYTE * signature, in rsa_hash_pkcs_sign_final() argument 711 ber_data_len, signature, sig_len); in rsa_hash_pkcs_sign_final() [all …]
|
/titanic_41/usr/src/uts/common/crypto/io/ |
H A D | rsa.c | 936 crypto_data_t *signature, uchar_t flag) in rsa_digest_svrfy_common() argument 969 if (signature->cd_length < modulus_len) { in rsa_digest_svrfy_common() 970 signature->cd_length = modulus_len; in rsa_digest_svrfy_common() 1040 signature); in rsa_digest_svrfy_common() 1043 signature); in rsa_digest_svrfy_common() 1050 crypto_data_t *data, crypto_data_t *signature) in rsa_sign_common() argument 1078 if (signature->cd_length < modulus_len) { in rsa_sign_common() 1079 signature->cd_length = modulus_len; in rsa_sign_common() 1116 signature, modulus_len)) != CRYPTO_SUCCESS) in rsa_sign_common() 1119 signature->cd_length = modulus_len; in rsa_sign_common() [all …]
|
H A D | ecc.c | 595 crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req) in ecc_digest_svrfy_common() argument 610 if (signature->cd_length > 0) { in ecc_digest_svrfy_common() 624 rv = ecc_sign_common((ecc_ctx_t *)ctxp, &der_cd, signature, in ecc_digest_svrfy_common() 627 rv = ecc_verify_common((ecc_ctx_t *)ctxp, &der_cd, signature, in ecc_digest_svrfy_common() 638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, in ecc_sign_common() argument 694 signature, signature_item.len)) != CRYPTO_SUCCESS) in ecc_sign_common() 697 signature->cd_length = signature_item.len; in ecc_sign_common() 705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, in ecc_sign() argument 717 signature, CRYPTO_DO_SIGN | CRYPTO_DO_UPDATE | in ecc_sign() 721 rv = ecc_sign_common(ctxp, data, signature, req); in ecc_sign() [all …]
|
/titanic_41/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 172 free_algoid(&tbscert->signature); in free_tbscert() 197 free_algoid(&certptr->signature.algorithmIdentifier); in free_decoded_cert() 198 free_data(&certptr->signature.encrypted); in free_decoded_cert() 423 DerEncodeDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) in DerEncodeDSASignature() argument 429 if (rawdata == NULL || signature == NULL) in DerEncodeDSASignature() 455 signature->Data = (uchar_t *)buf->bv_val; in DerEncodeDSASignature() 456 signature->Length = buf->bv_len; in DerEncodeDSASignature() 468 DerEncodeECDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) in DerEncodeECDSASignature() argument 470 return (DerEncodeDSASignature(rawdata, signature)); in DerEncodeECDSASignature() 512 DerDecodeDSASignature(KMF_DATA *encoded, KMF_DATA *signature) in DerDecodeDSASignature() argument [all …]
|
/titanic_41/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 213 &CsrData->signature.algorithmIdentifier.algorithm, in kmf_set_csr_sig_alg() 216 &CsrData->signature.algorithmIdentifier.parameters, in kmf_set_csr_sig_alg() 425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo); in sign_csr() 440 KMF_DATA signature; in sign_csr() local 442 ret = DerEncodeDSASignature(&signed_data, &signature); in sign_csr() 448 subj_csr.signature.encrypted = signature; in sign_csr() 450 subj_csr.signature.encrypted = signed_data; in sign_csr() 466 kmf_free_algoid(&subj_csr.signature.algorithmIdentifier); in sign_csr() 519 &tbsCsr->signature.algorithmIdentifier, in kmf_sign_csr() 597 x509alg = &csrdata->signature.algorithmIdentifier; in kmf_verify_csr() [all …]
|
H A D | certop.c | 66 &SignerCert->signature.algorithmIdentifier.algorithm); in get_keyalg_from_cert() 295 NODATA(tbs_cert->signature.algorithm) || in kmf_encode_cert_record() 669 KMF_DATA signature = { 0, NULL }; in kmf_sign_data() local 785 ret = DerDecodeDSASignature(output, &signature); in kmf_sign_data() 789 output->Length = signature.Length; in kmf_sign_data() 790 (void) memcpy(output->Data, signature.Data, signature.Length); in kmf_sign_data() 797 if (signature.Data) in kmf_sign_data() 798 free(signature.Data); in kmf_sign_data() 3056 if (!IsEqualOid(&subj_cert->signature.algorithmIdentifier.algorithm, in sign_cert() 3058 kmf_free_algoid(&subj_cert->signature.algorithmIdentifier); in sign_cert() [all …]
|
/titanic_41/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_thread.c | 47 thread->signature = SIG_ISCSI_THREAD; in iscsi_thread_create() 74 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_destroy() 109 thread->signature = (uint32_t)~SIG_ISCSI_THREAD; in iscsi_thread_destroy() 124 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_start() 179 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_stop() 222 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_send_kill() 256 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_send_wakeup() 291 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_check_signals() 311 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_wait() 367 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_threads_entry()
|
H A D | iscsi_doorclt.c | 56 size_t signature; member 210 ASSERT(buffer->signature == ISCSI_DOOR_REQ_SIGNATURE); in kfreehostent() 211 if (buffer->signature == ISCSI_DOOR_REQ_SIGNATURE) { in kfreehostent() 281 buffer->signature = ISCSI_DOOR_REQ_SIGNATURE; in kgetipnodebyname() 331 req->hdr.signature = ISCSI_DOOR_REQ_SIGNATURE; in kgetipnodebyname() 375 (cnf->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) || in kgetipnodebyname()
|
H A D | iscsiAuthClient.c | 1517 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvBegin() 1556 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvEnd() 1719 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientAuthResponse() 1801 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvKeyValue() 1841 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSendKeyValue() 1889 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvTransitBit() 1913 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSendTransitBit() 1994 client->signature = iscsiAuthClientSignature; in iscsiAuthClientInit() 2046 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientFinish() 2071 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSetOptionList() [all …]
|
/titanic_41/usr/src/uts/sun4u/boston/os/ |
H A D | boston.c | 344 dp_cpu_signature_t signature; in cpu_sgn_update() local 380 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); in cpu_sgn_update() 391 signature.cpu_id = -1; in cpu_sgn_update() 392 signature.sig = sig; in cpu_sgn_update() 393 signature.states = state; in cpu_sgn_update() 394 signature.sub_state = sub_state; in cpu_sgn_update() 396 req.msg_len = (int)(sizeof (signature)); in cpu_sgn_update() 398 req.msg_buf = (caddr_t)&signature; in cpu_sgn_update()
|
/titanic_41/usr/src/uts/sun4u/seattle/os/ |
H A D | seattle.c | 346 dp_cpu_signature_t signature; in cpu_sgn_update() local 382 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); in cpu_sgn_update() 393 signature.cpu_id = -1; in cpu_sgn_update() 394 signature.sig = sig; in cpu_sgn_update() 395 signature.states = state; in cpu_sgn_update() 396 signature.sub_state = sub_state; in cpu_sgn_update() 398 req.msg_len = (int)(sizeof (signature)); in cpu_sgn_update() 400 req.msg_buf = (caddr_t)&signature; in cpu_sgn_update()
|
/titanic_41/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 96 u_char *signature, const int sig_len) in dst_hmac_md5_sign() argument 123 if (signature == NULL || sig_len < MD5_LEN) in dst_hmac_md5_sign() 125 MD5Final(signature, ctx); in dst_hmac_md5_sign() 130 MD5Update(ctx, signature, MD5_LEN); in dst_hmac_md5_sign() 131 MD5Final(signature, ctx); in dst_hmac_md5_sign() 165 const u_char *signature, const int sig_len) in dst_hmac_md5_verify() argument 190 if (signature == NULL || key == NULL || sig_len != MD5_LEN) in dst_hmac_md5_verify() 201 if (memcmp(digest, signature, MD5_LEN) != 0) in dst_hmac_md5_verify()
|
/titanic_41/usr/src/grub/grub-0.97/netboot/ |
H A D | undi.h | 107 uint32_t signature; member 120 uint16_t signature; member 129 uint32_t signature; member 136 uint32_t signature; member 158 uint32_t signature; member
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | kexdhc.c | 49 u_char *server_host_key_blob = NULL, *signature = NULL; in kexdh_client() local 96 signature = packet_get_string(&slen); in kexdh_client() 129 if (key_verify(server_host_key, signature, slen, hash, 20) != 1) in kexdh_client() 132 xfree(signature); in kexdh_client()
|
H A D | kexdhs.c | 49 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexdh_server() local 125 key_sign(server_host_key, &signature, &slen, hash, 20); in kexdh_server() 133 packet_put_string(signature, slen); in kexdh_server() 136 xfree(signature); in kexdh_server()
|
H A D | kexgexs.c | 50 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_server() local 170 key_sign(server_host_key, &signature, &slen, hash, 20); in kexgex_server() 179 packet_put_string(signature, slen); in kexgex_server() 182 xfree(signature); in kexgex_server()
|
H A D | kexgexc.c | 50 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_client() local 141 signature = packet_get_string(&slen); in kexgex_client() 180 if (key_verify(server_host_key, signature, slen, hash, 20) != 1) in kexgex_client() 183 xfree(signature); in kexgex_client()
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerifyUtil.c | 179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_verify() local 187 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify() 194 if (memcmp(signature, pSignature, len) != 0) { in soft_verify() 370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_verify_final() local 378 signature, &len, B_FALSE, B_TRUE); in soft_verify_final() 385 if (memcmp(signature, pSignature, len) != 0) { in soft_verify_final()
|
H A D | softSignUtil.c | 172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_sign() local 177 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign() 186 (void) memcpy(pSignature, signature, *pulSignatureLen); in soft_sign() 353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_sign_final() local 358 signature, pulSignatureLen, B_TRUE, B_TRUE); in soft_sign_final() 366 (void) memcpy(pSignature, signature, *pulSignatureLen); in soft_sign_final()
|
/titanic_41/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 123 struct ami_algid *signature; member 141 ami_bitstring signature; member 211 ami_algid signature; member 227 ami_bitstring signature; member 262 ami_bitstring signature; member 314 struct ami_algid *signature; member 327 ami_bitstring signature; member 347 ami_bitstring signature; member 497 ami_bitstring signature; member 520 ami_bitstring signature; member
|
/titanic_41/usr/src/common/crypto/ecc/ |
H A D | ec.c | 631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, in ECDSA_SignDigestWithSeed() argument 659 if (!key || !signature || !digest || !kb || (kblen < 0)) { in ECDSA_SignDigestWithSeed() 667 if (signature->data == NULL) { in ECDSA_SignDigestWithSeed() 671 if (signature->len < 2*olen) { in ECDSA_SignDigestWithSeed() 793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) ); in ECDSA_SignDigestWithSeed() 794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) ); in ECDSA_SignDigestWithSeed() 796 signature->len = 2*olen; in ECDSA_SignDigestWithSeed() 830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, in ECDSA_SignDigest() argument 849 rv = ECDSA_SignDigestWithSeed(key, signature, digest, kBytes, len, kmflag); in ECDSA_SignDigest() 868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, in ECDSA_VerifyDigest() argument [all …]
|