Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 173) sorted by relevance

1234567

/titanic_41/usr/src/lib/libzfs_jni/common/
H A Dlibzfs_jni_property.c195 char signature[1024]; in create_BasicProperty() local
208 (void) snprintf(signature, sizeof (signature), in create_BasicProperty()
213 env, class, "<init>", signature); in create_BasicProperty()
221 (void) snprintf(signature, sizeof (signature), in create_BasicProperty()
227 env, class, "<init>", signature); in create_BasicProperty()
288 char signature[1024]; in create_ObjectProperty() local
295 (void) snprintf(signature, sizeof (signature), in create_ObjectProperty()
299 env, class, "<init>", signature); in create_ObjectProperty()
307 (void) snprintf(signature, sizeof (signature), in create_ObjectProperty()
312 env, class, "<init>", signature); in create_ObjectProperty()
[all …]
/titanic_41/usr/src/uts/common/crypto/api/
H A Dkcf_sign.c147 crypto_data_t *signature, crypto_call_req_t *cr) in crypto_sign_single() argument
162 NULL, data, signature, NULL); in crypto_sign_single()
201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, in crypto_sign_final() argument
218 NULL, NULL, signature, NULL); in crypto_sign_final()
229 crypto_ctx_template_t tmpl, crypto_data_t *signature, in crypto_sign_prov() argument
248 key, data, signature, tmpl); in crypto_sign_prov()
258 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, in sign_sr_atomic_common() argument
305 key, data, spi_ctx_tmpl, signature, in sign_sr_atomic_common()
309 &lmech, key, data, spi_ctx_tmpl, signature, in sign_sr_atomic_common()
317 mech, key, data, signature, spi_ctx_tmpl); in sign_sr_atomic_common()
[all …]
H A Dkcf_verify.c148 crypto_data_t *signature, crypto_call_req_t *cr) in crypto_verify_single() argument
163 NULL, data, signature, NULL); in crypto_verify_single()
203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, in crypto_verify_final() argument
220 NULL, NULL, NULL, signature, NULL); in crypto_verify_final()
231 crypto_ctx_template_t tmpl, crypto_data_t *signature, in crypto_verify_prov() argument
250 key, data, signature, tmpl); in crypto_verify_prov()
260 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, in verify_vr_atomic_common() argument
307 key, data, spi_ctx_tmpl, signature, in verify_vr_atomic_common()
312 &lmech, key, signature, spi_ctx_tmpl, data, in verify_vr_atomic_common()
320 mech, key, data, signature, spi_ctx_tmpl); in verify_vr_atomic_common()
[all …]
/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dverify_mgr.c235 CK_BYTE * signature, in verify_mgr_verify() argument
248 if (! in_data || ! signature) { in verify_mgr_verify()
259 signature, sig_len)); in verify_mgr_verify()
264 signature, sig_len)); in verify_mgr_verify()
270 signature, sig_len)); in verify_mgr_verify()
275 signature, sig_len)); in verify_mgr_verify()
312 CK_BYTE * signature, in verify_mgr_verify_final() argument
328 signature, sig_len)); in verify_mgr_verify_final()
338 CK_BYTE * signature, in verify_mgr_verify_recover() argument
353 if (! signature || ! out_len) { in verify_mgr_verify_recover()
[all …]
H A Dmech_rsa.c311 CK_BYTE * signature, in rsa_pkcs_verify() argument
338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature, in rsa_pkcs_verify()
348 CK_BYTE *signature, in rsa_pkcs_verify_recover() argument
382 signature, modulus_bytes, out_data, out_data_len, key_obj); in rsa_pkcs_verify_recover()
393 CK_BYTE * signature, in rsa_hash_pkcs_sign() argument
464 ber_data_len, signature, sig_len); in rsa_hash_pkcs_sign()
523 CK_BYTE * signature, in rsa_hash_pkcs_verify() argument
593 ber_data_len, signature, sig_len); in rsa_hash_pkcs_verify()
648 CK_BYTE * signature, in rsa_hash_pkcs_sign_final() argument
711 ber_data_len, signature, sig_len); in rsa_hash_pkcs_sign_final()
[all …]
/titanic_41/usr/src/uts/common/crypto/io/
H A Drsa.c936 crypto_data_t *signature, uchar_t flag) in rsa_digest_svrfy_common() argument
969 if (signature->cd_length < modulus_len) { in rsa_digest_svrfy_common()
970 signature->cd_length = modulus_len; in rsa_digest_svrfy_common()
1040 signature); in rsa_digest_svrfy_common()
1043 signature); in rsa_digest_svrfy_common()
1050 crypto_data_t *data, crypto_data_t *signature) in rsa_sign_common() argument
1078 if (signature->cd_length < modulus_len) { in rsa_sign_common()
1079 signature->cd_length = modulus_len; in rsa_sign_common()
1116 signature, modulus_len)) != CRYPTO_SUCCESS) in rsa_sign_common()
1119 signature->cd_length = modulus_len; in rsa_sign_common()
[all …]
H A Decc.c595 crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req) in ecc_digest_svrfy_common() argument
610 if (signature->cd_length > 0) { in ecc_digest_svrfy_common()
624 rv = ecc_sign_common((ecc_ctx_t *)ctxp, &der_cd, signature, in ecc_digest_svrfy_common()
627 rv = ecc_verify_common((ecc_ctx_t *)ctxp, &der_cd, signature, in ecc_digest_svrfy_common()
638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, in ecc_sign_common() argument
694 signature, signature_item.len)) != CRYPTO_SUCCESS) in ecc_sign_common()
697 signature->cd_length = signature_item.len; in ecc_sign_common()
705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, in ecc_sign() argument
717 signature, CRYPTO_DO_SIGN | CRYPTO_DO_UPDATE | in ecc_sign()
721 rv = ecc_sign_common(ctxp, data, signature, req); in ecc_sign()
[all …]
/titanic_41/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c172 free_algoid(&tbscert->signature); in free_tbscert()
197 free_algoid(&certptr->signature.algorithmIdentifier); in free_decoded_cert()
198 free_data(&certptr->signature.encrypted); in free_decoded_cert()
423 DerEncodeDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) in DerEncodeDSASignature() argument
429 if (rawdata == NULL || signature == NULL) in DerEncodeDSASignature()
455 signature->Data = (uchar_t *)buf->bv_val; in DerEncodeDSASignature()
456 signature->Length = buf->bv_len; in DerEncodeDSASignature()
468 DerEncodeECDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) in DerEncodeECDSASignature() argument
470 return (DerEncodeDSASignature(rawdata, signature)); in DerEncodeECDSASignature()
512 DerDecodeDSASignature(KMF_DATA *encoded, KMF_DATA *signature) in DerDecodeDSASignature() argument
[all …]
/titanic_41/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c213 &CsrData->signature.algorithmIdentifier.algorithm, in kmf_set_csr_sig_alg()
216 &CsrData->signature.algorithmIdentifier.parameters, in kmf_set_csr_sig_alg()
425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo); in sign_csr()
440 KMF_DATA signature; in sign_csr() local
442 ret = DerEncodeDSASignature(&signed_data, &signature); in sign_csr()
448 subj_csr.signature.encrypted = signature; in sign_csr()
450 subj_csr.signature.encrypted = signed_data; in sign_csr()
466 kmf_free_algoid(&subj_csr.signature.algorithmIdentifier); in sign_csr()
519 &tbsCsr->signature.algorithmIdentifier, in kmf_sign_csr()
597 x509alg = &csrdata->signature.algorithmIdentifier; in kmf_verify_csr()
[all …]
H A Dcertop.c66 &SignerCert->signature.algorithmIdentifier.algorithm); in get_keyalg_from_cert()
295 NODATA(tbs_cert->signature.algorithm) || in kmf_encode_cert_record()
669 KMF_DATA signature = { 0, NULL }; in kmf_sign_data() local
785 ret = DerDecodeDSASignature(output, &signature); in kmf_sign_data()
789 output->Length = signature.Length; in kmf_sign_data()
790 (void) memcpy(output->Data, signature.Data, signature.Length); in kmf_sign_data()
797 if (signature.Data) in kmf_sign_data()
798 free(signature.Data); in kmf_sign_data()
3056 if (!IsEqualOid(&subj_cert->signature.algorithmIdentifier.algorithm, in sign_cert()
3058 kmf_free_algoid(&subj_cert->signature.algorithmIdentifier); in sign_cert()
[all …]
/titanic_41/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Discsi_thread.c47 thread->signature = SIG_ISCSI_THREAD; in iscsi_thread_create()
74 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_destroy()
109 thread->signature = (uint32_t)~SIG_ISCSI_THREAD; in iscsi_thread_destroy()
124 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_start()
179 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_stop()
222 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_send_kill()
256 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_send_wakeup()
291 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_check_signals()
311 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_thread_wait()
367 ASSERT(thread->signature == SIG_ISCSI_THREAD); in iscsi_threads_entry()
H A Discsi_doorclt.c56 size_t signature; member
210 ASSERT(buffer->signature == ISCSI_DOOR_REQ_SIGNATURE); in kfreehostent()
211 if (buffer->signature == ISCSI_DOOR_REQ_SIGNATURE) { in kfreehostent()
281 buffer->signature = ISCSI_DOOR_REQ_SIGNATURE; in kgetipnodebyname()
331 req->hdr.signature = ISCSI_DOOR_REQ_SIGNATURE; in kgetipnodebyname()
375 (cnf->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) || in kgetipnodebyname()
H A DiscsiAuthClient.c1517 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvBegin()
1556 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvEnd()
1719 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientAuthResponse()
1801 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvKeyValue()
1841 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSendKeyValue()
1889 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientRecvTransitBit()
1913 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSendTransitBit()
1994 client->signature = iscsiAuthClientSignature; in iscsiAuthClientInit()
2046 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientFinish()
2071 if (!client || client->signature != iscsiAuthClientSignature) { in iscsiAuthClientSetOptionList()
[all …]
/titanic_41/usr/src/uts/sun4u/boston/os/
H A Dboston.c344 dp_cpu_signature_t signature; in cpu_sgn_update() local
380 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); in cpu_sgn_update()
391 signature.cpu_id = -1; in cpu_sgn_update()
392 signature.sig = sig; in cpu_sgn_update()
393 signature.states = state; in cpu_sgn_update()
394 signature.sub_state = sub_state; in cpu_sgn_update()
396 req.msg_len = (int)(sizeof (signature)); in cpu_sgn_update()
398 req.msg_buf = (caddr_t)&signature; in cpu_sgn_update()
/titanic_41/usr/src/uts/sun4u/seattle/os/
H A Dseattle.c346 dp_cpu_signature_t signature; in cpu_sgn_update() local
382 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); in cpu_sgn_update()
393 signature.cpu_id = -1; in cpu_sgn_update()
394 signature.sig = sig; in cpu_sgn_update()
395 signature.states = state; in cpu_sgn_update()
396 signature.sub_state = sub_state; in cpu_sgn_update()
398 req.msg_len = (int)(sizeof (signature)); in cpu_sgn_update()
400 req.msg_buf = (caddr_t)&signature; in cpu_sgn_update()
/titanic_41/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c96 u_char *signature, const int sig_len) in dst_hmac_md5_sign() argument
123 if (signature == NULL || sig_len < MD5_LEN) in dst_hmac_md5_sign()
125 MD5Final(signature, ctx); in dst_hmac_md5_sign()
130 MD5Update(ctx, signature, MD5_LEN); in dst_hmac_md5_sign()
131 MD5Final(signature, ctx); in dst_hmac_md5_sign()
165 const u_char *signature, const int sig_len) in dst_hmac_md5_verify() argument
190 if (signature == NULL || key == NULL || sig_len != MD5_LEN) in dst_hmac_md5_verify()
201 if (memcmp(digest, signature, MD5_LEN) != 0) in dst_hmac_md5_verify()
/titanic_41/usr/src/grub/grub-0.97/netboot/
H A Dundi.h107 uint32_t signature; member
120 uint16_t signature; member
129 uint32_t signature; member
136 uint32_t signature; member
158 uint32_t signature; member
/titanic_41/usr/src/cmd/ssh/libssh/common/
H A Dkexdhc.c49 u_char *server_host_key_blob = NULL, *signature = NULL; in kexdh_client() local
96 signature = packet_get_string(&slen); in kexdh_client()
129 if (key_verify(server_host_key, signature, slen, hash, 20) != 1) in kexdh_client()
132 xfree(signature); in kexdh_client()
H A Dkexdhs.c49 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexdh_server() local
125 key_sign(server_host_key, &signature, &slen, hash, 20); in kexdh_server()
133 packet_put_string(signature, slen); in kexdh_server()
136 xfree(signature); in kexdh_server()
H A Dkexgexs.c50 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_server() local
170 key_sign(server_host_key, &signature, &slen, hash, 20); in kexgex_server()
179 packet_put_string(signature, slen); in kexgex_server()
182 xfree(signature); in kexgex_server()
H A Dkexgexc.c50 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; in kexgex_client() local
141 signature = packet_get_string(&slen); in kexgex_client()
180 if (key_verify(server_host_key, signature, slen, hash, 20) != 1) in kexgex_client()
183 xfree(signature); in kexgex_client()
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerifyUtil.c179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_verify() local
187 ulDataLen, signature, &len, B_FALSE, B_FALSE); in soft_verify()
194 if (memcmp(signature, pSignature, len) != 0) { in soft_verify()
370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_verify_final() local
378 signature, &len, B_FALSE, B_TRUE); in soft_verify_final()
385 if (memcmp(signature, pSignature, len) != 0) { in soft_verify_final()
H A DsoftSignUtil.c172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_sign() local
177 ulDataLen, signature, pulSignatureLen, B_TRUE, in soft_sign()
186 (void) memcpy(pSignature, signature, *pulSignatureLen); in soft_sign()
353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ in soft_sign_final() local
358 signature, pulSignatureLen, B_TRUE, B_TRUE); in soft_sign_final()
366 (void) memcpy(pSignature, signature, *pulSignatureLen); in soft_sign_final()
/titanic_41/usr/src/lib/libslp/clib/
H A Dslp_ami.h123 struct ami_algid *signature; member
141 ami_bitstring signature; member
211 ami_algid signature; member
227 ami_bitstring signature; member
262 ami_bitstring signature; member
314 struct ami_algid *signature; member
327 ami_bitstring signature; member
347 ami_bitstring signature; member
497 ami_bitstring signature; member
520 ami_bitstring signature; member
/titanic_41/usr/src/common/crypto/ecc/
H A Dec.c631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, in ECDSA_SignDigestWithSeed() argument
659 if (!key || !signature || !digest || !kb || (kblen < 0)) { in ECDSA_SignDigestWithSeed()
667 if (signature->data == NULL) { in ECDSA_SignDigestWithSeed()
671 if (signature->len < 2*olen) { in ECDSA_SignDigestWithSeed()
793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) ); in ECDSA_SignDigestWithSeed()
794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) ); in ECDSA_SignDigestWithSeed()
796 signature->len = 2*olen; in ECDSA_SignDigestWithSeed()
830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, in ECDSA_SignDigest() argument
849 rv = ECDSA_SignDigestWithSeed(key, signature, digest, kBytes, len, kmflag); in ECDSA_SignDigest()
868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, in ECDSA_VerifyDigest() argument
[all …]

1234567