/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDSA.c | 43 * Allocate a DSA context for the active sign or verify operation. 61 } else { /* verify */ 111 } else { /* verify */ 112 session_p->verify.context = dsa_ctx; 113 session_p->verify.mech.mechanism = pMechanism->mechanism; 240 /* Get q byte length (N/8) to set or verify buffer lengths below */ 373 soft_dsa_ctx_t *dsa_ctx = session_p->verify.context; 401 free(session_p->verify.context); 402 session_p->verify.context = NULL; 420 soft_dsa_ctx_t *dsa_ctx = session_p->verify [all...] |
H A D | softDESCrypt.c | 759 /* allocate memory for the sign/verify context */ 817 session_p->verify.context = soft_des_ctx; 818 session_p->verify.mech.mechanism = 873 (soft_des_ctx_t *)session_p->verify.context; 927 * for sign/verify operations, the input will 968 free(session_p->verify.context); 969 session_p->verify.context = NULL;
|
H A D | softSession.h | 96 crypto_active_op_t verify; /* context of active verify op */ member in struct:session
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | util_cksum.c | 221 krb5_boolean verify, 232 if (verify) 285 if (verify)
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSessionUtil.c | 332 if (session_p->verify.context != NULL) { 333 digest_buf_t *bufp = session_p->verify.context; 336 void **sp = get_spp(&session_p->verify);
|
H A D | kernelSession.h | 58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC 98 crypto_active_op_t verify; /* context of active verify op */ member in struct:session
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_internal.h | 83 int (*verify)(const int mode, DST_KEY *key, void **context, member in struct:dst_func
|
H A D | dst_api.c | 29 * int dst_verify_data() Incremental verify routine. 261 * An incremental verify function. Data is verified in steps. 272 * SIG_MODE_FINAL 4 verify signature 295 if (in_key->dk_func == NULL || in_key->dk_func->verify == NULL) 297 return (in_key->dk_func->verify(mode, in_key, context, data, len,
|
/osnet-11/usr/src/lib/libast/common/misc/ |
H A D | fts.c | 135 * must always verify; undef verify to enable the unsafe code 138 #define verify 1 macro 465 #ifndef verify 466 register int verify; local 474 #ifndef verify 475 verify = 0; 483 #ifndef verify 484 verify |= fts->pwd->symlink; 496 return (verify [all...] |
/osnet-11/usr/src/lib/fm/topo/modules/common/ses/common/ |
H A D | ses_facility.c | 166 verify((props = ses_node_props(np)) != NULL); 278 verify((props = ses_node_props(np)) != NULL); 338 verify((props = ses_node_props(np)) != NULL); 419 verify((props = ses_node_props(np)) != NULL); 777 verify((props = ses_node_props(np)) != NULL); 778 verify(nvlist_lookup_uint64(props, SES_PROP_ELEMENT_TYPE, &type) == 0); 1000 verify((aprops = ses_node_props(agg)) != NULL);
|
H A D | ses.c | 910 verify(topo_prop_get_uint64(tn, TOPO_PGROUP_SES, 912 verify((np = ses_node_lookup(snap, nodeid)) != NULL); 923 verify(tp != NULL); 944 verify((props = ses_node_props(np)) != NULL); 945 verify(nvlist_lookup_uint64(props, 989 verify(nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_CHASSIS_NM, 991 verify(nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_CHASSIS_SN, 2645 verify(i != 0); 2829 verify(nvlist_lookup_uint64(props, 2832 verify(nvlist_lookup_uint6 [all...] |
/osnet-11/usr/src/lib/libcmd/common/ |
H A D | cksum.c | 142 static void verify(State_t*, char*, char*, Sfio_t*); 190 verify(state, p, file, check); 254 * verify previous sum output 258 verify(State_t* state, register char* s, char* check, Sfio_t* rp) function
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 157 ab.verify(); 598 void verify() throws ServiceLocationException { method in class:AuthBlock 675 if (!sig.verify(abBytes)) 896 chain[i-1].verify(chain[i].getPublicKey(), "SunAMI"); 921 * verify a message signed by the Principal named by 'cert'. 961 * This routine does not verify the cert chain.
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | authdata_plugin.h | 324 authdata_client_verify_proc verify; member in struct:krb5plugin_authdata_client_ftable_v0
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | elgamal.c | 60 static int verify (gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, 149 if ( !verify( out1_a, out1_b, test, &pk ) ) 160 (failed & 2)? "sign+verify":""); 164 (failed & 2)? "sign+verify":""); 559 verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) function 800 if (! verify (data[0], data[1], hash, &pk))
|
H A D | dsa.c | 109 static int verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t input, 220 if ( !verify (sig_a, sig_b, data, &pk) ) 225 if ( verify (sig_a, sig_b, data, &pk) ) 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 1009 if (! verify (data[0], data[1], hash, &pk)) 1067 errtxt = "verify failed"; 630 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) function
|
H A D | ecc.c | 302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey, 580 * To verify correct skey it use a random information. 583 * Second, test with the sign and verify functions. 610 if (verify (test, &pk, r, s)) 612 log_fatal ("ECDSA operation: sign, verify failed\n"); 616 log_debug ("ECDSA operation: sign, verify ok.\n"); 760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) 811 log_debug ("ecc verify: Rejected\n"); 818 log_debug ("ecc verify: Failed to get affine coordinates\n"); 831 log_debug ("ecc verify 756 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) function [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | elgamal.c | 60 static int verify (gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, 149 if ( !verify( out1_a, out1_b, test, &pk ) ) 160 (failed & 2)? "sign+verify":""); 164 (failed & 2)? "sign+verify":""); 559 verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) function 800 if (! verify (data[0], data[1], hash, &pk))
|
H A D | dsa.c | 109 static int verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t input, 220 if ( !verify (sig_a, sig_b, data, &pk) ) 225 if ( verify (sig_a, sig_b, data, &pk) ) 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 1009 if (! verify (data[0], data[1], hash, &pk)) 630 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) function
|
H A D | ecc.c | 302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey, 580 * To verify correct skey it use a random information. 583 * Second, test with the sign and verify functions. 610 if (verify (test, &pk, r, s)) 612 log_fatal ("ECDSA operation: sign, verify failed\n"); 616 log_debug ("ECDSA operation: sign, verify ok.\n"); 760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) 811 log_debug ("ecc verify: Rejected\n"); 818 log_debug ("ecc verify: Failed to get affine coordinates\n"); 831 log_debug ("ecc verify 756 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) function [all...] |
/osnet-11/usr/src/lib/brand/shared/zone/ |
H A D | dsconvert.ksh | 590 corrected. Run 'zonecfg -z $zonename' then use the verify subcommand 598 zoneadm -z "$zonename" verify 610 You may run 'zoneadm -z $zonename verify' at any time to re-verify the 621 zonecfg -z "$zonename" verify -v 632 You may run 'zonecfg -z $zonename verify -v' at any time to perform
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Devel/ |
H A D | SelfStubber.t | 212 # Possibly a pointless test as this doesn't really verify that it's been
|
/osnet-11/usr/src/cmd/perl/contrib/Sun/Solaris/BSM/ |
H A D | _BSMparse.pm | 527 my $verify = $always . ',' . $never; 528 my @class = split(/\s*,\s*/, $verify);
|
/osnet-11/usr/src/grub/grub2/grub-core/gnulib/ |
H A D | mbrtowc.c | 31 # include "verify.h" 34 verify (sizeof (mbstate_t) >= 4);
|
/osnet-11/usr/src/lib/libzfs/common/ |
H A D | libzfs_impl.h | 47 #define VERIFY verify
|