Searched refs:signature (Results 1 - 25 of 134) sorted by relevance

123456

/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dverify_mgr.c235 CK_BYTE * signature,
248 if (! in_data || ! signature) {
259 signature, sig_len));
264 signature, sig_len));
270 signature, sig_len));
275 signature, sig_len));
312 CK_BYTE * signature,
328 signature, sig_len));
338 CK_BYTE * signature,
353 if (! signature || ! out_le
231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
[all...]
/illumos-gate/usr/src/lib/libzfs_jni/common/
H A Dlibzfs_jni_property.c195 char signature[1024]; local
208 (void) snprintf(signature, sizeof (signature),
213 env, class, "<init>", signature);
221 (void) snprintf(signature, sizeof (signature),
227 env, class, "<init>", signature);
288 char signature[1024]; local
295 (void) snprintf(signature, sizeof (signature),
341 char signature[1024]; local
412 char signature[1024]; local
437 char signature[1024]; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_sign.c147 crypto_data_t *signature, crypto_call_req_t *cr)
162 NULL, data, signature, NULL);
201 crypto_sign_final(crypto_context_t context, crypto_data_t *signature, argument
218 NULL, NULL, signature, NULL);
229 crypto_ctx_template_t tmpl, crypto_data_t *signature,
248 key, data, signature, tmpl);
258 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature,
305 key, data, spi_ctx_tmpl, signature,
309 &lmech, key, data, spi_ctx_tmpl, signature,
317 mech, key, data, signature, spi_ctx_tmp
146 crypto_sign_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument
227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument
338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
431 crypto_sign_recover_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument
[all...]
H A Dkcf_verify.c148 crypto_data_t *signature, crypto_call_req_t *cr)
163 NULL, data, signature, NULL);
203 crypto_verify_final(crypto_context_t context, crypto_data_t *signature, argument
220 NULL, NULL, NULL, signature, NULL);
231 crypto_ctx_template_t tmpl, crypto_data_t *signature,
250 key, data, signature, tmpl);
260 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature,
307 key, data, spi_ctx_tmpl, signature,
312 &lmech, key, signature, spi_ctx_tmpl, data,
320 mech, key, data, signature, spi_ctx_tmp
147 crypto_verify_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *signature, crypto_call_req_t *cr) argument
229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument
341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
433 crypto_verify_recover_single(crypto_context_t context, crypto_data_t *signature, crypto_data_t *data, crypto_call_req_t *cr) argument
[all...]
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Discsi_thread.c47 thread->signature = SIG_ISCSI_THREAD;
74 ASSERT(thread->signature == SIG_ISCSI_THREAD);
109 thread->signature = (uint32_t)~SIG_ISCSI_THREAD;
124 ASSERT(thread->signature == SIG_ISCSI_THREAD);
179 ASSERT(thread->signature == SIG_ISCSI_THREAD);
222 ASSERT(thread->signature == SIG_ISCSI_THREAD);
256 ASSERT(thread->signature == SIG_ISCSI_THREAD);
291 ASSERT(thread->signature == SIG_ISCSI_THREAD);
311 ASSERT(thread->signature == SIG_ISCSI_THREAD);
367 ASSERT(thread->signature
[all...]
H A Discsi_doorclt.c56 size_t signature; member in struct:_mybuffer
210 ASSERT(buffer->signature == ISCSI_DOOR_REQ_SIGNATURE);
211 if (buffer->signature == ISCSI_DOOR_REQ_SIGNATURE) {
281 buffer->signature = ISCSI_DOOR_REQ_SIGNATURE;
331 req->hdr.signature = ISCSI_DOOR_REQ_SIGNATURE;
375 (cnf->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) ||
/illumos-gate/usr/src/uts/sun4u/boston/os/
H A Dboston.c338 * "signature" on this platform - not individual cpu signatures
344 dp_cpu_signature_t signature; local
351 * setting of the substate of the signature.
357 * A panic reboot is detected by a current (previous) signature
358 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT.
359 * The domain signature state SIGST_EXIT is used as the panic flow
380 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state);
391 signature.cpu_id = -1;
392 signature.sig = sig;
393 signature
[all...]
/illumos-gate/usr/src/uts/sun4u/seattle/os/
H A Dseattle.c340 * "signature" on this platform - not individual cpu signatures
346 dp_cpu_signature_t signature; local
353 * setting of the substate of the signature.
359 * A panic reboot is detected by a current (previous) signature
360 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT.
361 * The domain signature state SIGST_EXIT is used as the panic flow
382 current_sgn.signature = CPU_SIG_BLD(sig, state, sub_state);
393 signature.cpu_id = -1;
394 signature.sig = sig;
395 signature
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.h41 // Verify the ctx using the key and compare it against signature/siglen
42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
/illumos-gate/usr/src/grub/grub-0.97/netboot/
H A Dundi.h107 uint32_t signature; member in struct:pnp_bios
120 uint16_t signature; member in struct:rom
129 uint32_t signature; member in struct:pcir_header
136 uint32_t signature; member in struct:pnp_header
158 uint32_t signature; member in struct:undi_rom_id
H A Dpci_io.c308 unsigned long signature; local
329 : "=d" (signature),
339 if (present_status || (signature != PCI_SIGNATURE)) {
370 if (check->fields.signature != BIOS32_SIGNATURE)
/illumos-gate/usr/src/uts/common/crypto/io/
H A Drsa.c936 crypto_data_t *signature, uchar_t flag)
957 * the data. No check is needed for verify as signature is not
969 if (signature->cd_length < modulus_len) {
970 signature->cd_length = modulus_len;
1040 signature);
1043 signature);
1050 crypto_data_t *data, crypto_data_t *signature)
1078 if (signature->cd_length < modulus_len) {
1079 signature->cd_length = modulus_len;
1114 /* copy out to signature */
935 rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data, crypto_data_t *signature, uchar_t flag) argument
1049 rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) argument
1127 rsaprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
1195 rsa_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument
1214 rsa_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1263 rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature) argument
1320 rsaprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
1394 rsa_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument
1414 rsa_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1465 rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data) argument
1521 rsa_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument
1542 rsa_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
[all...]
H A Decc.c595 crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req)
609 /* Don't digest if only returning length of signature. */
610 if (signature->cd_length > 0) {
624 rv = ecc_sign_common((ecc_ctx_t *)ctxp, &der_cd, signature,
627 rv = ecc_verify_common((ecc_ctx_t *)ctxp, &der_cd, signature,
638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, argument
692 /* copy out the signature */
694 signature, signature_item.len)) != CRYPTO_SUCCESS)
697 signature->cd_length = signature_item.len;
705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, argument
594 ecc_digest_svrfy_common(digest_ecc_ctx_t *ctxp, crypto_data_t *data, crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req) argument
761 ecc_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument
780 ecc_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
841 ecc_verify_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
904 ecc_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
957 ecc_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument
977 ecc_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c172 free_algoid(&tbscert->signature);
197 free_algoid(&certptr->signature.algorithmIdentifier);
198 free_data(&certptr->signature.encrypted);
423 DerEncodeDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument
429 if (rawdata == NULL || signature == NULL)
440 * The [EC]DSA signature is the concatenation of 2
455 signature->Data = (uchar_t *)buf->bv_val;
456 signature->Length = buf->bv_len;
468 DerEncodeECDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument
470 return (DerEncodeDSASignature(rawdata, signature));
512 DerDecodeDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument
596 DerDecodeECDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument
1443 char *signature; local
1741 KMF_X509_SIGNATURE *signature = NULL; local
1809 ExtractX509CertParts(KMF_DATA *x509cert, KMF_DATA *tbscert, KMF_DATA *signature) argument
2016 char *signature; local
2397 KMF_X509_SIGNATURE *signature = NULL; local
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c77 * UPDATE (hash (more) data), FINAL (generate a signature). This
85 * signature location to store signature.
86 * sig_len size of the signature location
88 * N Success on SIG_MODE_FINAL = returns signature length in bytes
96 u_char *signature, const int sig_len)
123 if (signature == NULL || sig_len < MD5_LEN)
125 MD5Final(signature, ctx);
130 MD5Update(ctx, signature, MD5_LEN);
131 MD5Final(signature, ct
94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
H A Ddst_internal.h82 u_int8_t *signature, const int sig_len);
85 const u_int8_t *signature, const int sig_len);
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerifyUtil.c121 * pSignature: pointer to the signature
122 * ulSignatureLen: length of the signature
179 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
187 ulDataLen, signature, &len, B_FALSE, B_FALSE);
194 if (memcmp(signature, pSignature, len) != 0) {
313 * pSignature: pointer to the signature
314 * ulSignatureLen: length of the signature
370 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
378 signature, &len, B_FALSE, B_TRUE);
385 if (memcmp(signature, pSignatur
[all...]
H A DsoftSignUtil.c120 * pSignature: pointer to the signature after signing
121 * pulSignatureLen: pointer to the length of the signature
172 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
177 ulDataLen, signature, pulSignatureLen, B_TRUE,
186 (void) memcpy(pSignature, signature, *pulSignatureLen);
302 * pSignature: pointer to the signature after signing
303 * pulSignatureLen: pointer to the length of the signature
353 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local
358 signature, pulSignatureLen, B_TRUE, B_TRUE);
366 (void) memcpy(pSignature, signature, *pulSignatureLe
[all...]
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c213 &CsrData->signature.algorithmIdentifier.algorithm,
216 &CsrData->signature.algorithmIdentifier.parameters,
425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo);
438 * signature correctly.
440 KMF_DATA signature; local
442 ret = DerEncodeDSASignature(&signed_data, &signature);
448 subj_csr.signature.encrypted = signature;
450 subj_csr.signature.encrypted = signed_data;
453 /* Now, re-encode the CSR with the new signature */
602 KMF_DATA signature; local
617 KMF_DATA signature; local
[all...]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dsigning.c46 #define SMBSIGOFF 14 /* SMB signature offset */
47 #define SMBSIGLEN 8 /* SMB signature length */
67 uint32_t seqno, uchar_t *signature)
87 uint32_t sig[2]; /* MAC signature, aligned! */
133 * Finally, store the signature.
136 if (signature)
137 bcopy(digest, signature, SMBSIGLEN);
185 * Verify reply signature.
234 * Compare the computed signature with the
240 DPRINT("BAD signature, MI
66 smb_compute_MAC(struct smb_ctx *ctx, mbuf_t *m, uint32_t seqno, uchar_t *signature) argument
[all...]
/illumos-gate/usr/src/common/crypto/ecc/
H A Dec.c626 /* Computes the ECDSA signature (a concatenation of two values r and s)
631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument
637 mp_int r, s; /* tuple (r, s) is the signature */
659 if (!key || !signature || !digest || !kb || (kblen < 0)) {
667 if (signature->data == NULL) {
668 /* a call to get the signature length only */
671 if (signature->len < 2*olen) {
793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) );
794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) );
796 signature
830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument
868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.h49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature);
/illumos-gate/usr/src/common/crypto/dsa/
H A Ddsa_impl.h80 BIGNUM r; /* r (signature 1st part) */
81 BIGNUM s; /* s (signature 2st part) */
99 uchar_t *signature; /* concat(r, s) */ member in struct:__anon1955
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dsmp-imps.h148 unsigned signature; member in struct:imps_processor
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/include/
H A Discsi_info.h50 u32_t signature; member in struct:_iscsi_info_block_hdr_t

Completed in 427 milliseconds

123456