/titanic_44/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_sign.c | 79 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_sign() argument 83 querysig, querysiglen, sig, siglen, in ns_sign() 89 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_sign2() argument 102 if (msg == NULL || msglen == NULL || sig == NULL || siglen == NULL) in ns_sign2() 214 sig, *siglen); in ns_sign2() 217 *siglen = n; in ns_sign2() 219 *siglen = 0; in ns_sign2() 222 BOUNDS_CHECK(cp, INT16SZ + (*siglen)); in ns_sign2() 223 PUTSHORT(*siglen, cp); in ns_sign2() 224 memcpy(cp, sig, *siglen); in ns_sign2() [all …]
|
H A D | ns_verify.c | 136 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, in ns_verify() argument 291 if (sig != NULL && siglen != NULL) { in ns_verify() 292 if (*siglen < sigfieldlen) in ns_verify() 295 *siglen = sigfieldlen; in ns_verify() 300 if (sig != NULL && siglen != NULL) in ns_verify() 301 *siglen = 0; in ns_verify() 336 state->siglen = querysiglen; in ns_verify_tcp_init() 361 state->sig, state->siglen, in ns_verify_tcp() 362 state->sig, &state->siglen, ×igned, 0)); in ns_verify_tcp() 364 if (state->siglen > 0) { in ns_verify_tcp() [all …]
|
/titanic_44/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_sendsigned.c | 36 int newmsglen, bufsize, siglen; in res_nsendsigned() local 77 siglen = sizeof(sig); in res_nsendsigned() 79 sig, &siglen, 0); in res_nsendsigned() 113 ret = ns_verify(answer, &len, dstkey, sig, siglen, in res_nsendsigned()
|
H A D | res_mkupdate.c | 95 int siglen, keylen, certlen; in res_nmkupdate() local 534 siglen = b64_pton(buf2, buf3, sizeof(buf3)); in res_nmkupdate() 535 if (siglen < 0) in res_nmkupdate() 537 ShrinkBuffer(siglen); in res_nmkupdate() 538 memcpy(cp, buf3, siglen); in res_nmkupdate() 539 cp += siglen; in res_nmkupdate()
|
/titanic_44/usr/src/cmd/ssh/libssh/common/ |
H A D | ssh-rsa.c | 214 u_char *sigbuf, u_int siglen, RSA *rsa) in openssh_RSA_verify() argument 242 if (siglen == 0 || siglen > rsasize) { in openssh_RSA_verify() 247 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
|
/titanic_44/usr/src/lib/libslp/clib/ |
H A D | slp_auth.c | 243 size_t siglen; in slp_verify() local 312 siglen = ablen - (off - this_ab); in slp_verify() 314 off += siglen; in slp_verify() 316 err = do_verify(inbytes, inbytes_len, bsd, sig, siglen, spi); in slp_verify() 721 size_t siglen, const char *esc_spi) { in do_verify() argument 772 aid, sig, siglen)) != AMI_OK) { in do_verify()
|
/titanic_44/usr/src/head/arpa/ |
H A D | nameser.h | 307 int siglen; member
|