/dports/emulators/qemu60/qemu-6.0.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; variable 117 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 156 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 234 DSA_free(dsakey); in cleanup_tests()
|
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; 117 if (!TEST_ptr(dsakey = load_dsa_params())) 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); 156 EVP_PKEY_set1_DSA(pkey, dsakey); 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { 234 DSA_free(dsakey);
|
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; variable 117 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 156 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 234 DSA_free(dsakey); in cleanup_tests()
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; variable 117 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 156 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 234 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/openssl/openssl-1.1.1n/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/openssl-devel/openssl-3.0.2/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; variable 117 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 156 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 234 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/openssl-static/openssl-1.1.1l/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/test/ |
H A D | dsa_no_digest_size_test.c | 28 static DSA *dsakey; variable 117 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 120 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 134 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 156 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 234 DSA_free(dsakey); in cleanup_tests()
|
/dports/sysutils/edk2/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 22 static DSA *dsakey; variable 111 if (!TEST_ptr(dsakey = load_dsa_params())) in genkeys() 114 if (!TEST_int_eq(DSA_generate_key(dsakey), 1)) in genkeys() 128 int digestlen = BN_num_bytes(DSA_get0_q(dsakey)); in sign_and_verify() 150 EVP_PKEY_set1_DSA(pkey, dsakey); in sign_and_verify() 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 228 DSA_free(dsakey); in cleanup_tests()
|
/dports/security/gnome-keyring/gnome-keyring-40.0/pkcs11/ssh-store/ |
H A D | test-private-key.c | 41 GkmSshPrivateKey *dsakey; member 77 test->dsakey = gkm_ssh_private_key_new (test->module, "my-unique"); in setup() 78 g_assert (GKM_IS_SSH_PRIVATE_KEY (test->dsakey)); in setup() 80 …ret = gkm_ssh_private_key_parse (test->dsakey, SRCDIR "/pkcs11/ssh-store/fixtures/id_dsa_encrypted… in setup() 96 g_object_unref (test->dsakey); in teardown() 164 rv = gkm_credential_create (test->module, NULL, GKM_OBJECT (test->dsakey), in test_unlock() 185 data = gkm_object_get_attribute_data (GKM_OBJECT (test->dsakey), test->session, in test_internal_sha1_compat()
|
/dports/security/libressl/libressl-3.4.3/apps/openssl/ |
H A D | dsaparam.c | 319 DSA *dsakey; in dsaparam_main() local 321 if ((dsakey = DSAparams_dup(dsa)) == NULL) in dsaparam_main() 323 if (!DSA_generate_key(dsakey)) { in dsaparam_main() 325 DSA_free(dsakey); in dsaparam_main() 329 i = i2d_DSAPrivateKey_bio(out, dsakey); in dsaparam_main() 331 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, NULL); in dsaparam_main() 334 DSA_free(dsakey); in dsaparam_main() 337 DSA_free(dsakey); in dsaparam_main()
|
/dports/security/libressl-static/libressl-3.3.5/apps/openssl/ |
H A D | dsaparam.c | 319 DSA *dsakey; in dsaparam_main() local 321 if ((dsakey = DSAparams_dup(dsa)) == NULL) in dsaparam_main() 323 if (!DSA_generate_key(dsakey)) { in dsaparam_main() 325 DSA_free(dsakey); in dsaparam_main() 329 i = i2d_DSAPrivateKey_bio(out, dsakey); in dsaparam_main() 331 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, NULL); in dsaparam_main() 334 DSA_free(dsakey); in dsaparam_main() 337 DSA_free(dsakey); in dsaparam_main()
|
/dports/www/obhttpd/libressl-3.4.1/apps/openssl/ |
H A D | dsaparam.c | 319 DSA *dsakey; in dsaparam_main() local 321 if ((dsakey = DSAparams_dup(dsa)) == NULL) in dsaparam_main() 323 if (!DSA_generate_key(dsakey)) { in dsaparam_main() 325 DSA_free(dsakey); in dsaparam_main() 329 i = i2d_DSAPrivateKey_bio(out, dsakey); in dsaparam_main() 331 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, NULL); in dsaparam_main() 334 DSA_free(dsakey); in dsaparam_main() 337 DSA_free(dsakey); in dsaparam_main()
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/apps/ |
H A D | dsaparam.c | 218 DSA *dsakey; in dsaparam_main() local 220 if ((dsakey = DSAparams_dup(dsa)) == NULL) in dsaparam_main() 222 if (!DSA_generate_key(dsakey)) { in dsaparam_main() 224 DSA_free(dsakey); in dsaparam_main() 229 i = i2d_DSAPrivateKey_bio(out, dsakey); in dsaparam_main() 231 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, in dsaparam_main() 233 DSA_free(dsakey); in dsaparam_main()
|
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/apps/ |
H A D | dsaparam.c | 222 DSA *dsakey; 224 if ((dsakey = DSAparams_dup(dsa)) == NULL) 226 if (!DSA_generate_key(dsakey)) { 228 DSA_free(dsakey); 233 i = i2d_DSAPrivateKey_bio(out, dsakey); 235 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, 237 DSA_free(dsakey);
|
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/apps/ |
H A D | dsaparam.c | 218 DSA *dsakey; in dsaparam_main() local 220 if ((dsakey = DSAparams_dup(dsa)) == NULL) in dsaparam_main() 222 if (!DSA_generate_key(dsakey)) { in dsaparam_main() 224 DSA_free(dsakey); in dsaparam_main() 229 i = i2d_DSAPrivateKey_bio(out, dsakey); in dsaparam_main() 231 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, in dsaparam_main() 233 DSA_free(dsakey); in dsaparam_main()
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/apps/ |
H A D | dsaparam.c | 222 DSA *dsakey; 224 if ((dsakey = DSAparams_dup(dsa)) == NULL) 226 if (!DSA_generate_key(dsakey)) { 228 DSA_free(dsakey); 233 i = i2d_DSAPrivateKey_bio(out, dsakey); 235 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, 237 DSA_free(dsakey);
|