/external/openssh/ |
D | ssh-ecdsa-sk.c | 66 struct sshbuf *b = NULL, *sigbuf = NULL, *original_signed = NULL; in ssh_ecdsa_sk_verify() local 87 sshbuf_froms(b, &sigbuf) != 0 || in ssh_ecdsa_sk_verify() 103 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_sk_verify() 104 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_sk_verify() 128 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify() 199 sshbuf_free(sigbuf); in ssh_ecdsa_sk_verify()
|
D | ssh-ecdsa.c | 124 struct sshbuf *b = NULL, *sigbuf = NULL; in ssh_ecdsa_verify() local 140 sshbuf_froms(b, &sigbuf) != 0) { in ssh_ecdsa_verify() 154 if (sshbuf_get_bignum2(sigbuf, &sig_r) != 0 || in ssh_ecdsa_verify() 155 sshbuf_get_bignum2(sigbuf, &sig_s) != 0) { in ssh_ecdsa_verify() 169 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify() 191 sshbuf_free(sigbuf); in ssh_ecdsa_verify()
|
D | serverloop.c | 736 struct sshbuf *sigbuf = NULL; in server_input_hostkeys_prove() local 743 if ((resp = sshbuf_new()) == NULL || (sigbuf = sshbuf_new()) == NULL) in server_input_hostkeys_prove() 775 sshbuf_reset(sigbuf); in server_input_hostkeys_prove() 784 if ((r = sshbuf_put_cstring(sigbuf, in server_input_hostkeys_prove() 786 (r = sshbuf_put_string(sigbuf, in server_input_hostkeys_prove() 788 (r = sshkey_puts(key, sigbuf)) != 0 || in server_input_hostkeys_prove() 790 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), in server_input_hostkeys_prove() 805 sshbuf_free(sigbuf); in server_input_hostkeys_prove()
|
D | monitor.c | 619 struct sshbuf *sigbuf = NULL; in mm_answer_sign() local 657 if ((sigbuf = sshbuf_new()) == NULL) in mm_answer_sign() 659 if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 || in mm_answer_sign() 660 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 662 (r = sshkey_puts(key, sigbuf)) != 0) in mm_answer_sign() 665 if (datlen != sshbuf_len(sigbuf) || in mm_answer_sign() 666 memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) in mm_answer_sign() 668 __func__, datlen, sshbuf_len(sigbuf)); in mm_answer_sign() 669 sshbuf_free(sigbuf); in mm_answer_sign()
|
D | ssh-rsa.c | 406 u_char *sigbuf, size_t siglen, RSA *rsa) in openssh_RSA_verify() argument 431 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
|
D | ssh-keygen.c | 2504 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sign_one() local 2524 &sigbuf, signer, signer_ctx)) != 0) { in sign_one() 2528 if ((r = sshsig_armor(sigbuf, &abuf)) != 0) { in sign_one() 2574 sshbuf_free(sigbuf); in sign_one() 2656 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sig_verify() local 2667 if ((r = sshsig_dearmor(abuf, &sigbuf)) != 0) { in sig_verify() 2671 if ((r = sshsig_verify_fd(sigbuf, STDIN_FILENO, sig_namespace, in sig_verify() 2722 sshbuf_free(sigbuf); in sig_verify() 2733 struct sshbuf *sigbuf = NULL, *abuf = NULL; in sig_find_principals() local 2741 if ((r = sshsig_dearmor(abuf, &sigbuf)) != 0) { in sig_find_principals() [all …]
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | ec.py | 74 sigbuf = backend._ffi.new("unsigned char[]", max_size) 77 0, data, len(data), sigbuf, siglen_ptr, private_key._ec_key 80 return backend._ffi.buffer(sigbuf)[:siglen_ptr[0]]
|
/external/linux-kselftest/tools/testing/selftests/vm/ |
D | userfaultfd.c | 679 sigjmp_buf jbuf, *sigbuf; variable 684 if (sigbuf) in sighndl() 685 siglongjmp(*sigbuf, 1); in sighndl() 726 sigbuf = &jbuf; in faulting_process() 739 if (sigsetjmp(*sigbuf, 1) != 0) { in faulting_process()
|
/external/error_prone/javac/ |
D | javac-9+181-r4173-1.jar | META-INF/
META-INF/MANIFEST.MF
META-INF/services/
META- ... |
/external/dagger2/java/dagger/internal/codegen/bootstrap/ |
D | bootstrap_compiler_deploy.jar | META-INF/
META-INF/MANIFEST.MF
build-data.properties
META-INF ... |
/external/dagger2/java/dagger/internal/codegen/kythe/ |
D | kythe_plugin_deploy.jar | META-INF/
META-INF/MANIFEST.MF
build-data.properties
com/
com ... |