Searched refs:verify (Results 26 - 50 of 75) sorted by relevance

123

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDSA.c43 * Allocate a DSA context for the active sign or verify operation.
61 } else { /* verify */
111 } else { /* verify */
112 session_p->verify.context = dsa_ctx;
113 session_p->verify.mech.mechanism = pMechanism->mechanism;
240 /* Get q byte length (N/8) to set or verify buffer lengths below */
373 soft_dsa_ctx_t *dsa_ctx = session_p->verify.context;
401 free(session_p->verify.context);
402 session_p->verify.context = NULL;
420 soft_dsa_ctx_t *dsa_ctx = session_p->verify
[all...]
H A DsoftDESCrypt.c759 /* allocate memory for the sign/verify context */
817 session_p->verify.context = soft_des_ctx;
818 session_p->verify.mech.mechanism =
873 (soft_des_ctx_t *)session_p->verify.context;
927 * for sign/verify operations, the input will
968 free(session_p->verify.context);
969 session_p->verify.context = NULL;
H A DsoftSession.h96 crypto_active_op_t verify; /* context of active verify op */ member in struct:session
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dutil_cksum.c221 krb5_boolean verify,
232 if (verify)
285 if (verify)
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSessionUtil.c332 if (session_p->verify.context != NULL) {
333 digest_buf_t *bufp = session_p->verify.context;
336 void **sp = get_spp(&session_p->verify);
H A DkernelSession.h58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC
98 crypto_active_op_t verify; /* context of active verify op */ member in struct:session
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Ddst_internal.h83 int (*verify)(const int mode, DST_KEY *key, void **context, member in struct:dst_func
H A Ddst_api.c29 * int dst_verify_data() Incremental verify routine.
261 * An incremental verify function. Data is verified in steps.
272 * SIG_MODE_FINAL 4 verify signature
295 if (in_key->dk_func == NULL || in_key->dk_func->verify == NULL)
297 return (in_key->dk_func->verify(mode, in_key, context, data, len,
/osnet-11/usr/src/lib/libast/common/misc/
H A Dfts.c135 * must always verify; undef verify to enable the unsafe code
138 #define verify 1 macro
465 #ifndef verify
466 register int verify; local
474 #ifndef verify
475 verify = 0;
483 #ifndef verify
484 verify |= fts->pwd->symlink;
496 return (verify
[all...]
/osnet-11/usr/src/lib/fm/topo/modules/common/ses/common/
H A Dses_facility.c166 verify((props = ses_node_props(np)) != NULL);
278 verify((props = ses_node_props(np)) != NULL);
338 verify((props = ses_node_props(np)) != NULL);
419 verify((props = ses_node_props(np)) != NULL);
777 verify((props = ses_node_props(np)) != NULL);
778 verify(nvlist_lookup_uint64(props, SES_PROP_ELEMENT_TYPE, &type) == 0);
1000 verify((aprops = ses_node_props(agg)) != NULL);
H A Dses.c910 verify(topo_prop_get_uint64(tn, TOPO_PGROUP_SES,
912 verify((np = ses_node_lookup(snap, nodeid)) != NULL);
923 verify(tp != NULL);
944 verify((props = ses_node_props(np)) != NULL);
945 verify(nvlist_lookup_uint64(props,
989 verify(nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_CHASSIS_NM,
991 verify(nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_CHASSIS_SN,
2645 verify(i != 0);
2829 verify(nvlist_lookup_uint64(props,
2832 verify(nvlist_lookup_uint6
[all...]
/osnet-11/usr/src/lib/libcmd/common/
H A Dcksum.c142 static void verify(State_t*, char*, char*, Sfio_t*);
190 verify(state, p, file, check);
254 * verify previous sum output
258 verify(State_t* state, register char* s, char* check, Sfio_t* rp) function
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/
H A DAuthBlock.java157 ab.verify();
598 void verify() throws ServiceLocationException { method in class:AuthBlock
675 if (!sig.verify(abBytes))
896 chain[i-1].verify(chain[i].getPublicKey(), "SunAMI");
921 * verify a message signed by the Principal named by 'cert'.
961 * This routine does not verify the cert chain.
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dauthdata_plugin.h324 authdata_client_verify_proc verify; member in struct:krb5plugin_authdata_client_ftable_v0
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Delgamal.c60 static int verify (gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input,
149 if ( !verify( out1_a, out1_b, test, &pk ) )
160 (failed & 2)? "sign+verify":"");
164 (failed & 2)? "sign+verify":"");
559 verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) function
800 if (! verify (data[0], data[1], hash, &pk))
H A Ddsa.c109 static int verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t input,
220 if ( !verify (sig_a, sig_b, data, &pk) )
225 if ( verify (sig_a, sig_b, data, &pk) )
631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey )
1009 if (! verify (data[0], data[1], hash, &pk))
1067 errtxt = "verify failed";
630 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) function
H A Decc.c302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey,
580 * To verify correct skey it use a random information.
583 * Second, test with the sign and verify functions.
610 if (verify (test, &pk, r, s))
612 log_fatal ("ECDSA operation: sign, verify failed\n");
616 log_debug ("ECDSA operation: sign, verify ok.\n");
760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s)
811 log_debug ("ecc verify: Rejected\n");
818 log_debug ("ecc verify: Failed to get affine coordinates\n");
831 log_debug ("ecc verify
756 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) function
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Delgamal.c60 static int verify (gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input,
149 if ( !verify( out1_a, out1_b, test, &pk ) )
160 (failed & 2)? "sign+verify":"");
164 (failed & 2)? "sign+verify":"");
559 verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) function
800 if (! verify (data[0], data[1], hash, &pk))
H A Ddsa.c109 static int verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t input,
220 if ( !verify (sig_a, sig_b, data, &pk) )
225 if ( verify (sig_a, sig_b, data, &pk) )
631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey )
1009 if (! verify (data[0], data[1], hash, &pk))
630 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) function
H A Decc.c302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey,
580 * To verify correct skey it use a random information.
583 * Second, test with the sign and verify functions.
610 if (verify (test, &pk, r, s))
612 log_fatal ("ECDSA operation: sign, verify failed\n");
616 log_debug ("ECDSA operation: sign, verify ok.\n");
760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s)
811 log_debug ("ecc verify: Rejected\n");
818 log_debug ("ecc verify: Failed to get affine coordinates\n");
831 log_debug ("ecc verify
756 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) function
[all...]
/osnet-11/usr/src/lib/brand/shared/zone/
H A Ddsconvert.ksh590 corrected. Run 'zonecfg -z $zonename' then use the verify subcommand
598 zoneadm -z "$zonename" verify
610 You may run 'zoneadm -z $zonename verify' at any time to re-verify the
621 zonecfg -z "$zonename" verify -v
632 You may run 'zonecfg -z $zonename verify -v' at any time to perform
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Devel/
H A DSelfStubber.t212 # Possibly a pointless test as this doesn't really verify that it's been
/osnet-11/usr/src/cmd/perl/contrib/Sun/Solaris/BSM/
H A D_BSMparse.pm527 my $verify = $always . ',' . $never;
528 my @class = split(/\s*,\s*/, $verify);
/osnet-11/usr/src/grub/grub2/grub-core/gnulib/
H A Dmbrtowc.c31 # include "verify.h"
34 verify (sizeof (mbstate_t) >= 4);
/osnet-11/usr/src/lib/libzfs/common/
H A Dlibzfs_impl.h47 #define VERIFY verify

Completed in 82 milliseconds

123