Searched defs:signature (Results 1 - 25 of 47) sorted by relevance

12

/osnet-11/usr/src/grub/grub2/include/grub/i386/coreboot/
H A Dlbio.h25 char signature[4]; member in struct:grub_linuxbios_table_header
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftFipsPostUtil.c90 unsigned char *signature; local
106 /* Check to see if key object supports signature. */
110 /* Determine length of signature. */
131 /* Allocate space for signature data. */
132 signature = (unsigned char *) calloc(1, signature_length);
133 if (signature == NULL) {
140 free(signature);
145 signature, &signature_length);
147 free(signature);
154 free(signature);
[all...]
H A DsoftSignUtil.c121 * pSignature: pointer to the signature after signing
122 * pulSignatureLen: pointer to the length of the signature
175 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
180 ulDataLen, signature, pulSignatureLen, B_TRUE,
189 (void) memcpy(pSignature, signature, *pulSignatureLen);
309 * pSignature: pointer to the signature after signing
310 * pulSignatureLen: pointer to the length of the signature
362 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
367 signature, pulSignatureLen, B_TRUE, B_TRUE);
375 (void) memcpy(pSignature, signature, *pulSignatureLe
[all...]
H A DsoftVerifyUtil.c122 * pSignature: pointer to the signature
123 * ulSignatureLen: length of the signature
188 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
196 ulDataLen, signature, &len, B_FALSE, B_FALSE);
203 if (memcmp(signature, pSignature, len) != 0) {
326 * pSignature: pointer to the signature
327 * ulSignatureLen: length of the signature
389 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
397 signature, &len, B_FALSE, B_TRUE);
404 if (memcmp(signature, pSignatur
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_signing.c45 #define SMBSIGOFF 14 /* SMB security signature offset */
65 uint32_t seqno, uchar_t *signature)
85 uint32_t sig[2]; /* MAC signature, aligned! */
131 * Finally, store the signature.
134 if (signature)
135 bcopy(digest, signature, SMB_SIG_SIZE);
183 * Verify reply signature.
232 * Compare the computed signature with the
238 DPRINT("BAD signature, MID=0x%x", rqp->rq_mid);
64 smbfs_compute_MAC(struct smb_ctx *ctx, mbuf_t *m, uint32_t seqno, uchar_t *signature) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c489 CK_BYTE * signature,
497 if (! sess || ! ctx || ! in_data || ! signature) {
524 if (memcmp(hmac, signature, hmac_len) != 0) {
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
H A Dmech_sha.c219 CK_BYTE *signature,
227 if (! sess || ! ctx || ! in_data || ! signature) {
252 if (memcmp(hmac, signature, hmac_len) != 0) {
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
H A Dsign_mgr.c268 // if the caller just wants the signature length, there is no reason to
335 CK_BYTE * signature,
351 ctx, signature, sig_len));
376 // if the caller just wants the signature length, there is no reason to
332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
H A Dverify_mgr.c235 CK_BYTE * signature,
248 if (! in_data || ! signature) {
259 signature, sig_len));
264 signature, sig_len));
270 signature, sig_len));
275 signature, sig_len));
312 CK_BYTE * signature,
328 signature, sig_len));
338 CK_BYTE * signature,
353 if (! signature || ! out_le
231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
[all...]
H A Dmech_rsa.c311 CK_BYTE * signature,
338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature,
348 CK_BYTE *signature,
382 signature, modulus_bytes, out_data, out_data_len, key_obj);
393 CK_BYTE * signature,
464 ber_data_len, signature, sig_len);
523 CK_BYTE * signature,
593 ber_data_len, signature, sig_len);
648 CK_BYTE * signature,
711 ber_data_len, signature, sig_le
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/loader/i386/pc/
H A Dchainloader.c147 grub_uint16_t signature; local
191 /* Check the signature. */
192 signature = *((grub_uint16_t *) (bs + GRUB_DISK_SECTOR_SIZE - 2));
193 if (signature != grub_le_to_cpu16 (0xaa55)
196 grub_error (GRUB_ERR_BAD_OS, "invalid signature");
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c77 * UPDATE (hash (more) data), FINAL (generate a signature). This
85 * signature location to store signature.
86 * sig_len size of the signature location
88 * N Success on SIG_MODE_FINAL = returns signature length in bytes
96 u_char *signature, const int sig_len)
123 if (signature == NULL || sig_len < MD5_LEN)
125 MD5Final(signature, ctx);
130 MD5Update(ctx, signature, MD5_LEN);
131 MD5Final(signature, ct
94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
H A Ddst_api.c216 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature
225 * SIG_MODE_FINAL 4 Generate signature
226 * from signature
233 * signature
234 * The location to which the signature will be written.
235 * sig_len Length of the signature field in bytes.
245 u_char *signature, const int sig_len)
250 (in_key->dk_KEY_struct == NULL || signature == NULL))
255 signature, sig_len));
263 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature
243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Ddmraid_nvidia.c53 grub_uint32_t signature[NV_SIGNATURES]; member in struct:grub_nv_array
145 array->uuid_len = sizeof (sb.array.signature);
146 array->uuid = grub_malloc (sizeof (sb.array.signature));
150 grub_memcpy (array->uuid, (char *) &sb.array.signature,
151 sizeof (sb.array.signature));
H A Dusbms.c34 grub_uint32_t signature; member in struct:grub_usbms_cbw
45 grub_uint32_t signature; member in struct:grub_usbms_csw
254 cbw.signature = grub_cpu_to_le32 (0x43425355);
264 cbw.signature, cbw.tag, cbw.transfer_length);
356 status.signature, status.tag, status.residue);
359 /* If phase error or not valid signature, do bulk-only reset device. */
361 (status.signature != grub_cpu_to_le32(0x53425355)))
/osnet-11/usr/src/grub/grub2/include/grub/
H A Dmsdos_partition.h29 /* The signature. */
104 /* The signature 0xaa55. */
105 grub_uint16_t signature; member in struct:grub_msdos_partition_mbr
H A Dacpi.h29 grub_uint8_t signature[8]; member in struct:grub_acpi_rsdp_v10
47 grub_uint8_t signature[4]; member in struct:grub_acpi_table_header
/osnet-11/usr/src/grub/grub-0.97/netboot/
H A Dpci_io.c308 unsigned long signature; local
329 : "=d" (signature),
339 if (present_status || (signature != PCI_SIGNATURE)) {
370 if (check->fields.signature != BIOS32_SIGNATURE)
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dsmp-imps.h148 unsigned signature; member in struct:imps_processor
/osnet-11/usr/src/lib/libzfs_jni/common/
H A Dlibzfs_jni_property.c190 char signature[1024]; local
203 (void) snprintf(signature, sizeof (signature),
208 env, class, "<init>", signature);
216 (void) snprintf(signature, sizeof (signature),
222 env, class, "<init>", signature);
283 char signature[1024]; local
290 (void) snprintf(signature, sizeof (signature),
336 char signature[1024]; local
407 char signature[1024]; local
432 char signature[1024]; local
[all...]
H A Dlibzfs_jni_util.c204 char signature[1024]; local
206 (void) snprintf(signature, sizeof (signature), "L%s;",
211 env, class, field_name, signature);
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c213 &CsrData->signature.algorithmIdentifier.algorithm,
216 &CsrData->signature.algorithmIdentifier.parameters,
425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo);
438 * signature correctly.
440 KMF_DATA signature; local
442 ret = DerEncodeDSASignature(&signed_data, &signature);
448 subj_csr.signature.encrypted = signature;
450 subj_csr.signature.encrypted = signed_data;
453 /* Now, re-encode the CSR with the new signature */
602 KMF_DATA signature; local
617 KMF_DATA signature; local
[all...]
/osnet-11/usr/src/lib/libelfsign/common/
H A Delfcertlib.c470 * OUT sig - must be big enough to hold the signature of data
483 KMF_DATA signature; local
516 signature.Data = (uchar_t *)sig;
517 signature.Length = *sig_len;
530 KMF_OUT_DATA_ATTR, &signature, sizeof (KMF_DATA));
544 *sig_len = signature.Length;
553 * signature
562 const uchar_t *signature, size_t sig_len,
575 insig.Data = (uchar_t *)signature;
561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dacpi.c330 if (grub_memcmp (fadt->hdr.signature, GRUB_ACPI_FADT_SIGNATURE,
331 sizeof (fadt->hdr.signature)) == 0)
360 grub_memcpy (&(rsdt->signature), "RSDT", 4);
384 grub_memcpy (&(rsdpv1_new->signature), "RSD PTR ",
385 sizeof (rsdpv1_new->signature));
414 grub_memcpy (&(xsdt->signature), "XSDT", 4);
428 grub_memcpy (&(rsdpv2_new->rsdpv1.signature), "RSD PTR ",
429 sizeof (rsdpv2_new->rsdpv1.signature));
517 char signature[5]; local
521 signature[
[all...]
/osnet-11/usr/src/common/crypto/ecc/
H A Dec.c622 /* Computes the ECDSA signature (a concatenation of two values r and s)
627 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument
633 mp_int r, s; /* tuple (r, s) is the signature */
655 if (!key || !signature || !digest || !kb || (kblen < 0)) {
663 if (signature->data == NULL) {
664 /* a call to get the signature length only */
667 if (signature->len < 2*olen) {
789 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) );
790 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) );
792 signature
826 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument
864 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument
[all...]

Completed in 81 milliseconds

12