/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | openpgpkey_61.c | 113 dns_rdata_openpgpkey_t *sig = source; local 117 REQUIRE(sig->common.rdtype == type); 118 REQUIRE(sig->common.rdclass == rdclass); 119 REQUIRE(sig->keyring != NULL && sig->length != 0); 127 return (mem_tobuffer(target, sig->keyring, sig->length)); 133 dns_rdata_openpgpkey_t *sig = target; local 139 sig->common.rdclass = rdata->rdclass; 140 sig 162 dns_rdata_openpgpkey_t *sig = (dns_rdata_openpgpkey_t *) source; local [all...] |
H A D | rrsig_46.c | 355 dns_rdata_rrsig_t *sig = source; local 359 REQUIRE(sig->common.rdtype == type); 360 REQUIRE(sig->common.rdclass == rdclass); 361 REQUIRE(sig->signature != NULL || sig->siglen == 0); 369 RETERR(uint16_tobuffer(sig->covered, target)); 374 RETERR(uint8_tobuffer(sig->algorithm, target)); 379 RETERR(uint8_tobuffer(sig->labels, target)); 384 RETERR(uint32_tobuffer(sig->originalttl, target)); 389 RETERR(uint32_tobuffer(sig 415 dns_rdata_rrsig_t *sig = target; local 496 dns_rdata_rrsig_t *sig = (dns_rdata_rrsig_t *) source; local [all...] |
H A D | sig_24.c | 356 dns_rdata_sig_t *sig = source; local 360 REQUIRE(sig->common.rdtype == type); 361 REQUIRE(sig->common.rdclass == rdclass); 362 REQUIRE(sig->signature != NULL || sig->siglen == 0); 370 RETERR(uint16_tobuffer(sig->covered, target)); 375 RETERR(uint8_tobuffer(sig->algorithm, target)); 380 RETERR(uint8_tobuffer(sig->labels, target)); 385 RETERR(uint32_tobuffer(sig->originalttl, target)); 390 RETERR(uint32_tobuffer(sig 416 dns_rdata_sig_t *sig = target; local 497 dns_rdata_sig_t *sig = (dns_rdata_sig_t *) source; local [all...] |
/bind-9.11.3/contrib/dnsperf-2.1.0.0-1/ |
H A D | os.c | 33 perf_os_blocksignal(int sig, isc_boolean_t block) argument 41 sigaddset(&sset, sig) < 0 || 47 perf_os_handlesignal(int sig, void (*handler)(int)) argument 55 sigaction(sig, &sa, NULL) < 0)
|
/bind-9.11.3/bin/tests/pkcs11/benchmarks/ |
H A D | verify.c | 109 CK_BYTE sig[128]; variable 249 slen = (CK_ULONG) sizeof(sig); 250 rv = pkcs_C_Verify(hSession, buf, len, sig, slen);
|
H A D | sign.c | 182 CK_BYTE sig[128]; variable 327 slen = (CK_ULONG) sizeof(sig); 328 rv = pkcs_C_Sign(hSession, buf, len, sig, &slen);
|
/bind-9.11.3/lib/dns/ |
H A D | openssleddsa_link.c | 252 openssleddsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 273 isc_buffer_availableregion(sig, &sigreg); 288 isc_buffer_add(sig, (unsigned int) siglen); 301 openssleddsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 322 if (sig->length != siglen) 332 status = EVP_DigestVerify(ctx, sig->base, siglen,
|
H A D | gssapi_link.c | 131 gssapi_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 166 if (gsig.length > isc_buffer_availablelength(sig)) { 175 isc_buffer_putmem(sig, gsig.value, (unsigned int)gsig.length); 186 gssapi_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 208 buf = isc_mem_allocate(dst__memory_pool, sig->length); 211 memmove(buf, sig->base, sig->length); 213 r.length = sig->length;
|
H A D | opensslecdsa_link.c | 48 ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps) { argument 50 *pr = sig->r; 52 *ps = sig->s; 56 ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s) { argument 60 BN_clear_free(sig->r); 61 BN_clear_free(sig->s); 62 sig->r = r; 63 sig->s = s; 140 opensslecdsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 163 isc_buffer_availableregion(sig, 193 opensslecdsa_verify(dst_context_t *dctx, const isc_region_t *sig) argument [all...] |
H A D | opensslgost_link.c | 154 opensslgost_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 161 isc_buffer_availableregion(sig, &r); 169 isc_buffer_add(sig, siglen); 175 opensslgost_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 181 status = EVP_VerifyFinal(evp_md_ctx, sig->base, sig->length, pkey);
|
H A D | pkcs11dsa_link.c | 386 pkcs11dsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 394 isc_buffer_availableregion(sig, &r); 408 isc_buffer_add(sig, ISC_SHA1_DIGESTLENGTH * 2 + 1); 415 pkcs11dsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 422 (CK_BYTE_PTR) sig->base + 1, 423 (CK_ULONG) sig->length - 1),
|
H A D | pkcs11ecdsa_link.c | 150 pkcs11ecdsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 193 isc_buffer_availableregion(sig, &r); 249 isc_buffer_add(sig, (unsigned int) siglen); 272 pkcs11ecdsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 350 (CK_BYTE_PTR) sig->base, (CK_ULONG) sig->length),
|
H A D | pkcs11eddsa_link.c | 122 pkcs11eddsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 173 isc_buffer_availableregion(sig, &r); 231 isc_buffer_add(sig, (unsigned int) siglen); 255 pkcs11eddsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 341 (CK_BYTE_PTR) sig->base, (CK_ULONG) sig->length),
|
H A D | pkcs11gost_link.c | 390 pkcs11gost_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 397 isc_buffer_availableregion(sig, &r); 407 isc_buffer_add(sig, ISC_GOST_SIGNATURELENGTH); 414 pkcs11gost_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 421 (CK_BYTE_PTR) sig->base, 422 (CK_ULONG) sig->length),
|
H A D | diff.c | 203 dns_rdata_rrsig_t sig; local 210 (void)dns_rdata_tostruct(&rdata, &sig, NULL); 214 when = dns_time64_from32(sig.timeexpire); 220 (void)dns_rdata_tostruct(&rdata, &sig, NULL); 224 if (when == 0 || dns_time64_from32(sig.timeexpire) < when) 225 when = dns_time64_from32(sig.timeexpire);
|
H A D | openssldsa_link.c | 102 DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps) { argument 103 *pr = sig->r; 104 *ps = sig->s; 108 DSA_SIG_set0(DSA_SIG *sig, BIGNUM *r, BIGNUM *s) { argument 112 BN_clear_free(sig->r); 113 BN_clear_free(sig->s); 114 sig->r = r; 115 sig->s = s; 204 openssldsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 222 isc_buffer_availableregion(sig, 303 openssldsa_verify(dst_context_t *dctx, const isc_region_t *sig) argument [all...] |
H A D | opensslrsa_link.c | 549 opensslrsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 582 isc_buffer_availableregion(sig, &r); 693 isc_buffer_add(sig, siglen); 699 opensslrsa_verify2(dst_context_t *dctx, int maxbits, const isc_region_t *sig) { argument 743 status = EVP_VerifyFinal(evp_md_ctx, sig->base, sig->length, pkey); 813 if (sig->length != (unsigned int) RSA_size(rsa)) 824 status = RSA_verify(type, digest, digestlen, sig->base, 843 status = RSA_public_decrypt(sig->length, sig 877 opensslrsa_verify(dst_context_t *dctx, const isc_region_t *sig) argument [all...] |
H A D | pkcs11rsa_link.c | 516 pkcs11rsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 527 isc_buffer_availableregion(sig, &r); 536 isc_buffer_add(sig, (unsigned int) siglen); 543 pkcs11rsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 550 (CK_BYTE_PTR) sig->base, 551 (CK_ULONG) sig->length), 709 pkcs11rsa_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 822 isc_buffer_availableregion(sig, &r); 947 isc_buffer_add(sig, (unsigned int) siglen); 969 pkcs11rsa_verify(dst_context_t *dctx, const isc_region_t *sig) { argument [all...] |
H A D | hmac_link.c | 102 hmacmd5_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 106 if (isc_buffer_availablelength(sig) < ISC_MD5_DIGESTLENGTH) 108 digest = isc_buffer_used(sig); 110 isc_buffer_add(sig, ISC_MD5_DIGESTLENGTH); 116 hmacmd5_verify(dst_context_t *dctx, const isc_region_t *sig) { argument 119 if (sig->length > ISC_MD5_DIGESTLENGTH) 122 if (isc_hmacmd5_verify2(hmacmd5ctx, sig->base, sig->length)) 410 hmacsha1_sign(dst_context_t *dctx, isc_buffer_t *sig) { argument 414 if (isc_buffer_availablelength(sig) < ISC_SHA1_DIGESTLENGT 424 hmacsha1_verify(dst_context_t *dctx, const isc_region_t *sig) argument 701 hmacsha224_sign(dst_context_t *dctx, isc_buffer_t *sig) argument 715 hmacsha224_verify(dst_context_t *dctx, const isc_region_t *sig) argument 988 hmacsha256_sign(dst_context_t *dctx, isc_buffer_t *sig) argument 1002 hmacsha256_verify(dst_context_t *dctx, const isc_region_t *sig) argument 1275 hmacsha384_sign(dst_context_t *dctx, isc_buffer_t *sig) argument 1289 hmacsha384_verify(dst_context_t *dctx, const isc_region_t *sig) argument 1562 hmacsha512_sign(dst_context_t *dctx, isc_buffer_t *sig) argument 1576 hmacsha512_verify(dst_context_t *dctx, const isc_region_t *sig) argument [all...] |
H A D | master.c | 1905 dns_rdata_rrsig_t sig; local 1906 result = dns_rdata_tostruct(&rdata[rdcount], &sig, 1909 if (isc_serial_lt(sig.timeexpire, lctx->now)) { 3063 dns_rdata_rrsig_t sig; local 3068 (void)dns_rdata_tostruct(rdata, &sig, NULL); 3069 if (isc_serial_gt(sig.timesigned, lctx->now)) 3072 when = sig.timeexpire - lctx->resign; 3076 (void)dns_rdata_tostruct(rdata, &sig, NULL); 3077 if (isc_serial_gt(sig.timesigned, lctx->now)) 3079 else if (sig [all...] |
/bind-9.11.3/lib/dns/tests/ |
H A D | gost_test.c | 321 CK_BYTE sig[64]; local 345 ATF_REQUIRE(pkcs_C_Sign(pk11_ctx.session, sig, 64, 348 ATF_REQUIRE(pkcs_C_Sign(pk11_ctx.session, sig, 64, 349 sig, &siglen) == CKR_OK);
|
/bind-9.11.3/bin/tests/dst/ |
H A D | dst_test.c | 39 unsigned char sig[512]; local 44 isc_buffer_init(&sigbuf, sig, sizeof(sig));
|
H A D | t_dst.c | 95 unsigned char sig[512]; local 100 isc_buffer_init(&sigbuf, sig, sizeof(sig)); 540 * Write a sig in buf to file at path. 614 * Read sig in file at path to buf. 713 unsigned char sig[T_SIGMAX]; local 801 memset(sig, 0, sizeof(sig)); 802 isc_buffer_init(&sigbuf, sig, sizeof(sig)); [all...] |
/bind-9.11.3/lib/isc/unix/ |
H A D | app.c | 183 handle_signal(int sig, void (*handler)(int)) { argument 191 sigaction(sig, &sa, NULL) < 0) { 197 sig, strbuf); 584 int sig; local 659 result = sigwait(&sset, &sig); 661 if (sig == SIGINT || sig == SIGTERM) 663 else if (sig == SIGHUP) 668 sig = sigwait(&sset); 669 if (sig > [all...] |
/bind-9.11.3/lib/tests/ |
H A D | t_api.c | 108 t_sighandler(int sig) { argument 109 T_int = sig;
|