/dragonfly/crypto/openssh/ |
H A D | ssh-ecdsa.c | 124 struct sshbuf *b = NULL, *sigbuf = NULL; in ssh_ecdsa_verify() local 140 sshbuf_froms(b, &sigbuf) != 0) { in ssh_ecdsa_verify() 154 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_verify() 155 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_verify() 169 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify() 191 sshbuf_free(sigbuf); in ssh_ecdsa_verify()
|
H A D | ssh-ecdsa-sk.c | 153 struct sshbuf *b = NULL, *sigbuf = NULL, *original_signed = NULL; in ssh_ecdsa_sk_verify() local 188 if (sshbuf_froms(b, &sigbuf) != 0 || in ssh_ecdsa_sk_verify() 208 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_sk_verify() 209 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_sk_verify() 213 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify() 315 sshbuf_free(sigbuf); in ssh_ecdsa_sk_verify()
|
H A D | serverloop.c | 684 struct sshbuf *sigbuf = NULL; in server_input_hostkeys_prove() local 692 if ((resp = sshbuf_new()) == NULL || (sigbuf = sshbuf_new()) == NULL) in server_input_hostkeys_prove() 722 sshbuf_reset(sigbuf); in server_input_hostkeys_prove() 740 if ((r = sshbuf_put_cstring(sigbuf, in server_input_hostkeys_prove() 742 (r = sshbuf_put_stringb(sigbuf, in server_input_hostkeys_prove() 744 (r = sshkey_puts(key, sigbuf)) != 0 || in server_input_hostkeys_prove() 746 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove() 759 sshbuf_free(sigbuf); in server_input_hostkeys_prove()
|
H A D | monitor.c | 610 struct sshbuf *sigbuf = NULL; in mm_answer_sign() local 648 if ((sigbuf = sshbuf_new()) == NULL) in mm_answer_sign() 650 if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 || in mm_answer_sign() 651 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 653 (r = sshkey_puts(key, sigbuf)) != 0) in mm_answer_sign() 655 if (datlen != sshbuf_len(sigbuf) || in mm_answer_sign() 656 memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) in mm_answer_sign() 658 datlen, sshbuf_len(sigbuf)); in mm_answer_sign() 659 sshbuf_free(sigbuf); in mm_answer_sign()
|
H A D | ssh-rsa.c | 404 u_char *sigbuf, size_t siglen, RSA *rsa) in openssh_RSA_verify() argument 429 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
|
H A D | ssh-keygen.c | 2556 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sign_one() local 2585 fd, sig_namespace, &sigbuf, signer, signer_ctx)) != 0) { in sign_one() 2589 if ((r = sshsig_armor(sigbuf, &abuf)) != 0) { in sign_one() 2638 sshbuf_free(sigbuf); in sign_one() 2776 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sig_verify() local 2792 if ((r = sshsig_dearmor(abuf, &sigbuf)) != 0) { in sig_verify() 2853 sshbuf_free(sigbuf); in sig_verify() 2866 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sig_find_principals() local 2878 if ((r = sshsig_dearmor(abuf, &sigbuf)) != 0) { in sig_find_principals() 2882 if ((r = sshsig_get_pubkey(sigbuf, &sign_key)) != 0) { in sig_find_principals() [all …]
|
/dragonfly/usr.bin/tip/ |
H A D | tipout.c | 42 static jmp_buf sigbuf; variable 54 longjmp(sigbuf, 1); in intIOT() 88 longjmp(sigbuf, 1); in intEMT() 105 longjmp(sigbuf, 1); in intSYS() 126 (void) setjmp(sigbuf); in tipout()
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_sign.c | 180 unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, in int_rsa_verify() argument 196 if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, in int_rsa_verify() 271 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 274 return rsa->meth->rsa_verify(dtype, m, m_len, sigbuf, siglen, in RSA_verify() 277 return int_rsa_verify(dtype, m, m_len, NULL, NULL, sigbuf, siglen, rsa); in RSA_verify()
|
H A D | rsa_locl.h | 39 unsigned int m_length, const unsigned char *sigbuf, 92 const unsigned char *sigbuf, size_t siglen, RSA *rsa);
|
H A D | rsa_meth.c | 265 const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf, in RSA_meth_get_verify() 273 const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf, in RSA_meth_set_verify() argument
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | dgst.c | 337 unsigned char *sigbuf = NULL; in dgst_main() local 522 sigbuf = malloc(siglen); in dgst_main() 523 if (sigbuf == NULL) { in dgst_main() 535 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 554 dgst_config.out_bin, sigkey, sigbuf, siglen, NULL, NULL, in dgst_main() 577 dgst_config.out_bin, sigkey, sigbuf, siglen, in dgst_main() 594 free(sigbuf); in dgst_main()
|
/dragonfly/crypto/libressl/crypto/ecdsa/ |
H A D | ecs_vrf.c | 95 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() argument 99 sigbuf, sig_len, eckey); in ECDSA_verify()
|
H A D | ecs_ossl.c | 421 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ossl_ecdsa_verify() argument 425 const unsigned char *p = sigbuf; in ossl_ecdsa_verify() 435 if (derlen != sig_len || memcmp(sigbuf, der, derlen)) in ossl_ecdsa_verify()
|
/dragonfly/crypto/libressl/crypto/evp/ |
H A D | p_verify.c | 69 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, in EVP_VerifyFinal() argument 92 ret = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal()
|
H A D | evp_locl.h | 74 unsigned int m_length, const unsigned char *sigbuf, unsigned int siglen,
|
/dragonfly/sys/netproto/smb/ |
H A D | smb_crypt.c | 269 u_char sigbuf[8]; in smb_rq_verify() local 293 *(u_int32_t *)sigbuf = htole32(rqp->sr_rseqno); in smb_rq_verify() 294 *(u_int32_t *)(sigbuf + 4) = 0; in smb_rq_verify() 295 MD5Update(&md5, sigbuf, 8); in smb_rq_verify()
|
/dragonfly/libexec/dma/ |
H A D | util.c | 253 static sigjmp_buf sigbuf; variable 261 siglongjmp(sigbuf, 1); in sigalrm_handler() 278 ret = sigsetjmp(sigbuf, 1); in do_timeout()
|
/dragonfly/contrib/less/ |
H A D | os.c | 383 static char sigbuf[sizeof("Signal ") + INT_STRLEN_BOUND(sig) + 1]; in signal_message() local 389 sprintf(sigbuf, "Signal %d", sig); in signal_message() 390 return sigbuf; in signal_message()
|
/dragonfly/crypto/libressl/crypto/dsa/ |
H A D | dsa_asn1.c | 425 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument 429 const unsigned char *p = sigbuf; in DSA_verify() 440 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | ecdsa.h | 278 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), 292 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey),
|
H A D | rsa.h | 310 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 318 unsigned int m_length, unsigned char *sigbuf, unsigned int siglen, 471 const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf, 474 const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf,
|
H A D | dsa.h | 149 const unsigned char *sigbuf, int siglen, DSA *dsa);
|
/dragonfly/crypto/libressl/crypto/ec/ |
H A D | ec_kmeth.c | 257 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_set_verify() argument 328 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_get_verify() argument
|
H A D | ec_lcl.h | 473 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey); 484 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_srvr.c | 2089 unsigned char sigbuf[128]; in ssl3_get_cert_verify() local 2090 unsigned int siglen = sizeof(sigbuf); in ssl3_get_cert_verify() 2113 !EVP_DigestFinal(mctx, sigbuf, &siglen) || in ssl3_get_cert_verify() 2125 CBS_len(&signature), sigbuf, siglen) <= 0) { in ssl3_get_cert_verify()
|