/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | verify_mgr.c | 235 CK_BYTE * signature, 248 if (! in_data || ! signature) { 259 signature, sig_len)); 264 signature, sig_len)); 270 signature, sig_len)); 275 signature, sig_len)); 312 CK_BYTE * signature, 328 signature, sig_len)); 338 CK_BYTE * signature, 353 if (! signature || ! out_le 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
/illumos-gate/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_property.c | 195 char signature[1024]; local 208 (void) snprintf(signature, sizeof (signature), 213 env, class, "<init>", signature); 221 (void) snprintf(signature, sizeof (signature), 227 env, class, "<init>", signature); 288 char signature[1024]; local 295 (void) snprintf(signature, sizeof (signature), 341 char signature[1024]; local 412 char signature[1024]; local 437 char signature[1024]; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_sign.c | 147 crypto_data_t *signature, crypto_call_req_t *cr) 162 NULL, data, signature, NULL); 201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, argument 218 NULL, NULL, signature, NULL); 229 crypto_ctx_template_t tmpl, crypto_data_t *signature, 248 key, data, signature, tmpl); 258 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 305 key, data, spi_ctx_tmpl, signature, 309 &lmech, key, data, spi_ctx_tmpl, signature, 317 mech, key, data, signature, spi_ctx_tmp 146 crypto_sign_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument 227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 431 crypto_sign_recover_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_verify.c | 148 crypto_data_t *signature, crypto_call_req_t *cr) 163 NULL, data, signature, NULL); 203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, argument 220 NULL, NULL, NULL, signature, NULL); 231 crypto_ctx_template_t tmpl, crypto_data_t *signature, 250 key, data, signature, tmpl); 260 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 307 key, data, spi_ctx_tmpl, signature, 312 &lmech, key, signature, spi_ctx_tmpl, data, 320 mech, key, data, signature, spi_ctx_tmp 147 crypto_verify_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument 229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 433 crypto_verify_recover_single(crypto_context_t context, crypto_data_t *signature, crypto_data_t *data, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_thread.c | 47 thread->signature = SIG_ISCSI_THREAD; 74 ASSERT(thread->signature == SIG_ISCSI_THREAD); 109 thread->signature = (uint32_t)~SIG_ISCSI_THREAD; 124 ASSERT(thread->signature == SIG_ISCSI_THREAD); 179 ASSERT(thread->signature == SIG_ISCSI_THREAD); 222 ASSERT(thread->signature == SIG_ISCSI_THREAD); 256 ASSERT(thread->signature == SIG_ISCSI_THREAD); 291 ASSERT(thread->signature == SIG_ISCSI_THREAD); 311 ASSERT(thread->signature == SIG_ISCSI_THREAD); 367 ASSERT(thread->signature [all...] |
H A D | iscsi_doorclt.c | 56 size_t signature; member in struct:_mybuffer 210 ASSERT(buffer->signature == ISCSI_DOOR_REQ_SIGNATURE); 211 if (buffer->signature == ISCSI_DOOR_REQ_SIGNATURE) { 281 buffer->signature = ISCSI_DOOR_REQ_SIGNATURE; 331 req->hdr.signature = ISCSI_DOOR_REQ_SIGNATURE; 375 (cnf->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) ||
|
/illumos-gate/usr/src/uts/sun4u/boston/os/ |
H A D | boston.c | 338 * "signature" on this platform - not individual cpu signatures 344 dp_cpu_signature_t signature; local 351 * setting of the substate of the signature. 357 * A panic reboot is detected by a current (previous) signature 358 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT. 359 * The domain signature state SIGST_EXIT is used as the panic flow 380 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); 391 signature.cpu_id = -1; 392 signature.sig = sig; 393 signature [all...] |
/illumos-gate/usr/src/uts/sun4u/seattle/os/ |
H A D | seattle.c | 340 * "signature" on this platform - not individual cpu signatures 346 dp_cpu_signature_t signature; local 353 * setting of the substate of the signature. 359 * A panic reboot is detected by a current (previous) signature 360 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT. 361 * The domain signature state SIGST_EXIT is used as the panic flow 382 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state); 393 signature.cpu_id = -1; 394 signature.sig = sig; 395 signature [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.h | 41 // Verify the ctx using the key and compare it against signature/siglen 42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
|
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | undi.h | 107 uint32_t signature; member in struct:pnp_bios 120 uint16_t signature; member in struct:rom 129 uint32_t signature; member in struct:pcir_header 136 uint32_t signature; member in struct:pnp_header 158 uint32_t signature; member in struct:undi_rom_id
|
H A D | pci_io.c | 308 unsigned long signature; local 329 : "=d" (signature), 339 if (present_status || (signature != PCI_SIGNATURE)) { 370 if (check->fields.signature != BIOS32_SIGNATURE)
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | rsa.c | 936 crypto_data_t *signature, uchar_t flag) 957 * the data. No check is needed for verify as signature is not 969 if (signature->cd_length < modulus_len) { 970 signature->cd_length = modulus_len; 1040 signature); 1043 signature); 1050 crypto_data_t *data, crypto_data_t *signature) 1078 if (signature->cd_length < modulus_len) { 1079 signature->cd_length = modulus_len; 1114 /* copy out to signature */ 935 rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data, crypto_data_t *signature, uchar_t flag) argument 1049 rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) argument 1127 rsaprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 1195 rsa_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 1214 rsa_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1263 rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) argument 1320 rsaprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 1394 rsa_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 1414 rsa_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1465 rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data) argument 1521 rsa_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument 1542 rsa_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
H A D | ecc.c | 595 crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req) 609 /* Don't digest if only returning length of signature. */ 610 if (signature->cd_length > 0) { 624 rv = ecc_sign_common((ecc_ctx_t *)ctxp, &der_cd, signature, 627 rv = ecc_verify_common((ecc_ctx_t *)ctxp, &der_cd, signature, 638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, argument 692 /* copy out the signature */ 694 signature, signature_item.len)) != CRYPTO_SUCCESS) 697 signature->cd_length = signature_item.len; 705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, argument 594 ecc_digest_svrfy_common(digest_ecc_ctx_t *ctxp, crypto_data_t *data, crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req) argument 761 ecc_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 780 ecc_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 841 ecc_verify_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 904 ecc_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 957 ecc_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 977 ecc_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 172 free_algoid(&tbscert->signature); 197 free_algoid(&certptr->signature.algorithmIdentifier); 198 free_data(&certptr->signature.encrypted); 423 DerEncodeDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument 429 if (rawdata == NULL || signature == NULL) 440 * The [EC]DSA signature is the concatenation of 2 455 signature->Data = (uchar_t *)buf->bv_val; 456 signature->Length = buf->bv_len; 468 DerEncodeECDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument 470 return (DerEncodeDSASignature(rawdata, signature)); 512 DerDecodeDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument 596 DerDecodeECDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument 1443 char *signature; local 1741 KMF_X509_SIGNATURE *signature = NULL; local 1809 ExtractX509CertParts(KMF_DATA *x509cert, KMF_DATA *tbscert, KMF_DATA *signature) argument 2016 char *signature; local 2397 KMF_X509_SIGNATURE *signature = NULL; local [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 77 * UPDATE (hash (more) data), FINAL (generate a signature). This 85 * signature location to store signature. 86 * sig_len size of the signature location 88 * N Success on SIG_MODE_FINAL = returns signature length in bytes 96 u_char *signature, const int sig_len) 123 if (signature == NULL || sig_len < MD5_LEN) 125 MD5Final(signature, ctx); 130 MD5Update(ctx, signature, MD5_LEN); 131 MD5Final(signature, ct 94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument [all...] |
H A D | dst_internal.h | 82 u_int8_t *signature, const int sig_len); 85 const u_int8_t *signature, const int sig_len);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerifyUtil.c | 121 * pSignature: pointer to the signature 122 * ulSignatureLen: length of the signature 179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 187 ulDataLen, signature, &len, B_FALSE, B_FALSE); 194 if (memcmp(signature, pSignature, len) != 0) { 313 * pSignature: pointer to the signature 314 * ulSignatureLen: length of the signature 370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 378 signature, &len, B_FALSE, B_TRUE); 385 if (memcmp(signature, pSignatur [all...] |
H A D | softSignUtil.c | 120 * pSignature: pointer to the signature after signing 121 * pulSignatureLen: pointer to the length of the signature 172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 177 ulDataLen, signature, pulSignatureLen, B_TRUE, 186 (void) memcpy(pSignature, signature, *pulSignatureLen); 302 * pSignature: pointer to the signature after signing 303 * pulSignatureLen: pointer to the length of the signature 353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 358 signature, pulSignatureLen, B_TRUE, B_TRUE); 366 (void) memcpy(pSignature, signature, *pulSignatureLe [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 213 &CsrData->signature.algorithmIdentifier.algorithm, 216 &CsrData->signature.algorithmIdentifier.parameters, 425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo); 438 * signature correctly. 440 KMF_DATA signature; local 442 ret = DerEncodeDSASignature(&signed_data, &signature); 448 subj_csr.signature.encrypted = signature; 450 subj_csr.signature.encrypted = signed_data; 453 /* Now, re-encode the CSR with the new signature */ 602 KMF_DATA signature; local 617 KMF_DATA signature; local [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | signing.c | 46 #define SMBSIGOFF 14 /* SMB signature offset */ 47 #define SMBSIGLEN 8 /* SMB signature length */ 67 uint32_t seqno, uchar_t *signature) 87 uint32_t sig[2]; /* MAC signature, aligned! */ 133 * Finally, store the signature. 136 if (signature) 137 bcopy(digest, signature, SMBSIGLEN); 185 * Verify reply signature. 234 * Compare the computed signature with the 240 DPRINT("BAD signature, MI 66 smb_compute_MAC(struct smb_ctx *ctx, mbuf_t *m, uint32_t seqno, uchar_t *signature) argument [all...] |
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ec.c | 626 /* Computes the ECDSA signature (a concatenation of two values r and s) 631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument 637 mp_int r, s; /* tuple (r, s) is the signature */ 659 if (!key || !signature || !digest || !kb || (kblen < 0)) { 667 if (signature->data == NULL) { 668 /* a call to get the signature length only */ 671 if (signature->len < 2*olen) { 793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) ); 794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) ); 796 signature 830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument 868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.h | 49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature);
|
/illumos-gate/usr/src/common/crypto/dsa/ |
H A D | dsa_impl.h | 80 BIGNUM r; /* r (signature 1st part) */ 81 BIGNUM s; /* s (signature 2st part) */ 99 uchar_t *signature; /* concat(r, s) */ member in struct:__anon1955
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | smp-imps.h | 148 unsigned signature; member in struct:imps_processor
|
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/include/ |
H A D | iscsi_info.h | 50 u32_t signature; member in struct:_iscsi_info_block_hdr_t
|