Home
last modified time | relevance | path

Searched refs:siglen (Results 1 – 7 of 7) sorted by relevance

/titanic_44/usr/src/lib/libresolv2/common/nameser/
H A Dns_sign.c79 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_sign() argument
83 querysig, querysiglen, sig, siglen, in ns_sign()
89 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_sign2() argument
102 if (msg == NULL || msglen == NULL || sig == NULL || siglen == NULL) in ns_sign2()
214 sig, *siglen); in ns_sign2()
217 *siglen = n; in ns_sign2()
219 *siglen = 0; in ns_sign2()
222 BOUNDS_CHECK(cp, INT16SZ + (*siglen)); in ns_sign2()
223 PUTSHORT(*siglen, cp); in ns_sign2()
224 memcpy(cp, sig, *siglen); in ns_sign2()
[all …]
H A Dns_verify.c136 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_verify() argument
291 if (sig != NULL && siglen != NULL) { in ns_verify()
292 if (*siglen < sigfieldlen) in ns_verify()
295 *siglen = sigfieldlen; in ns_verify()
300 if (sig != NULL && siglen != NULL) in ns_verify()
301 *siglen = 0; in ns_verify()
336 state->siglen = querysiglen; in ns_verify_tcp_init()
361 state->sig, state->siglen, in ns_verify_tcp()
362 state->sig, &state->siglen, &timesigned, 0)); in ns_verify_tcp()
364 if (state->siglen > 0) { in ns_verify_tcp()
[all …]
/titanic_44/usr/src/lib/libresolv2/common/resolv/
H A Dres_sendsigned.c36 int newmsglen, bufsize, siglen; in res_nsendsigned() local
77 siglen = sizeof(sig); in res_nsendsigned()
79 sig, &siglen, 0); in res_nsendsigned()
113 ret = ns_verify(answer, &len, dstkey, sig, siglen, in res_nsendsigned()
H A Dres_mkupdate.c95 int siglen, keylen, certlen; in res_nmkupdate() local
534 siglen = b64_pton(buf2, buf3, sizeof(buf3)); in res_nmkupdate()
535 if (siglen < 0) in res_nmkupdate()
537 ShrinkBuffer(siglen); in res_nmkupdate()
538 memcpy(cp, buf3, siglen); in res_nmkupdate()
539 cp += siglen; in res_nmkupdate()
/titanic_44/usr/src/cmd/ssh/libssh/common/
H A Dssh-rsa.c214 u_char *sigbuf, u_int siglen, RSA *rsa) in openssh_RSA_verify() argument
242 if (siglen == 0 || siglen > rsasize) { in openssh_RSA_verify()
247 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
/titanic_44/usr/src/lib/libslp/clib/
H A Dslp_auth.c243 size_t siglen; in slp_verify() local
312 siglen = ablen - (off - this_ab); in slp_verify()
314 off += siglen; in slp_verify()
316 err = do_verify(inbytes, inbytes_len, bsd, sig, siglen, spi); in slp_verify()
721 size_t siglen, const char *esc_spi) { in do_verify() argument
772 aid, sig, siglen)) != AMI_OK) { in do_verify()
/titanic_44/usr/src/head/arpa/
H A Dnameser.h307 int siglen; member