/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
H A D | daa_debug.c | 13 save_DAA_PK_PROOF_internal( file, key_pair_with_proof->proof); in save_KEY_PAIR_WITH_PROOF() 26 key_pair_with_proof->proof = load_DAA_PK_PROOF_internal(file); in load_KEY_PAIR_WITH_PROOF() 98 save_DAA_PK_PROOF_internal(FILE *file, TSS_DAA_PK_PROOF_internal *proof) in save_DAA_PK_PROOF_internal() argument 105 fprintf(file, "%d # %s.length\n", proof->length_challenge, "challenge"); in save_DAA_PK_PROOF_internal() 106 fprintf(file, "%s\n", dump_byte_array( proof->length_challenge, in save_DAA_PK_PROOF_internal() 107 proof->challenge)); in save_DAA_PK_PROOF_internal() 108 fprintf(file, "%d # %s.length\n", proof->length_response, "response"); in save_DAA_PK_PROOF_internal() 109 for (i = 0; i < proof->length_response; i++) { in save_DAA_PK_PROOF_internal() 110 BI_SAVE_ARRAY( proof->response[i], file); in save_DAA_PK_PROOF_internal() 123 TSS_DAA_PK_PROOF_internal *proof = in load_DAA_PK_PROOF_internal() local [all …]
|
H A D | daa_structs.c | 363 save_DAA_PK_PROOF_internal( file, key_pair_with_proof->proof); 376 key_pair_with_proof->proof = load_DAA_PK_PROOF_internal(file); 942 save_DAA_PK_PROOF_internal(FILE *file, TSS_DAA_PK_PROOF_internal *proof) 949 fprintf(file, "%d # %s.length\n", proof->length_challenge, "challenge"); 950 fprintf(file, "%s\n", dump_byte_array( proof->length_challenge, 951 proof->challenge)); 952 fprintf(file, "%d # %s.length\n", proof->length_response, "response"); 953 for (i = 0; i < proof->length_response; i++) { 954 BI_SAVE_ARRAY( proof->response[i], file); 967 TSS_DAA_PK_PROOF_internal *proof = [all …]
|
H A D | daa_debug.h | 9 TSS_DAA_PK_PROOF_internal *proof; member
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/trspi/ |
H A D | trousers.c | 1023 Trspi_UnloadBlob_IDENTITY_PROOF(UINT64 *offset, BYTE *blob, TCPA_IDENTITY_PROOF *proof) in Trspi_UnloadBlob_IDENTITY_PROOF() argument 1027 if (!proof) { in Trspi_UnloadBlob_IDENTITY_PROOF() 1050 memset(proof, 0, sizeof(TCPA_IDENTITY_PROOF)); in Trspi_UnloadBlob_IDENTITY_PROOF() 1052 Trspi_UnloadBlob_VERSION(offset, blob, (TCPA_VERSION *)&proof->ver); in Trspi_UnloadBlob_IDENTITY_PROOF() 1053 Trspi_UnloadBlob_UINT32(offset, &proof->labelSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF() 1054 Trspi_UnloadBlob_UINT32(offset, &proof->identityBindingSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF() 1055 Trspi_UnloadBlob_UINT32(offset, &proof->endorsementSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF() 1056 Trspi_UnloadBlob_UINT32(offset, &proof->platformSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF() 1057 Trspi_UnloadBlob_UINT32(offset, &proof->conformanceSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF() 1060 &proof->identityKey))) { in Trspi_UnloadBlob_IDENTITY_PROOF() [all …]
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | key_correctness_proof.c | 165 TSS_DAA_PK_PROOF_internal *proof, in is_pk_correct() argument 340 i, j, test_bit( j, proof->challenge, proof->length_challenge)); in is_pk_correct() 344 proof->response[i]->array[j], n); in is_pk_correct() 345 if( test_bit( j, proof->challenge, proof->length_challenge)) { in is_pk_correct() 364 DUMP_BI( proof->response[i]->array[j]); in is_pk_correct() 380 dump_byte_array( proof->length_challenge, proof->challenge)); in is_pk_correct() 381 if( length_challenge != proof->length_challenge) { in is_pk_correct() 386 if( verifiable_challenge[i] != proof->challenge[i]) { in is_pk_correct() 391 *isCorrect = ( memcmp( verifiable_challenge, proof->challenge, length_challenge) == 0); in is_pk_correct()
|
H A D | key_verification.c | 141 isCorrect( hDAA, key_pair_with_proof->pk, key_pair_with_proof->proof); in main()
|
H A D | issuer_setup.c | 138 key_pair_with_proof->proof = public_keyproof_internal; in main()
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tspi_daa.c | 213 key_proof->proof->length_challenge, key_proof->proof->length_response); 215 *publicKeyProof = i_2_e_TSS_DAA_PK_PROOF( key_proof->proof, &tss_alloc, hContext); 265 key_proof->proof->length_challenge, key_proof->proof->length_response); in Tspi_DAA_Issuer_GenerateKey() 268 *publicKeyProof = i_2_e_TSS_DAA_PK_PROOF( key_proof->proof, &tss_alloc, tspContext); in Tspi_DAA_Issuer_GenerateKey()
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/wildcard/ns1/ |
H A D | named.conf.in | 45 * have separate NSEC3 records for the "no qname proof" and the 46 * "closest encloser proof".
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/ |
H A D | rfc3706.txt | 162 must send a HELLO to the other. This HELLO serves as proof of 166 using the peer's ACK as proof of liveliness. Receipt of either a 191 Receives ACK as proof of 237 By contrast, consider a proof-of-liveliness scheme involving 252 Receives HELLO as proof of A's 257 Receives HELLO as proof 308 request proof of liveliness when it needs it -- not at mandated 315 proof of liveliness. The IPSec traffic itself serves as the proof of 325 proof of liveliness. Peer A, for example, may require rapid 474 two peers, either peer SHOULD use this traffic as proof of [all …]
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/include/daa/ |
H A D | key_correct.h | 27 TSS_DAA_PK_PROOF_internal *proof,
|
H A D | daa_structs.h | 229 TSS_DAA_PK_PROOF_internal *proof 266 TSS_DAA_PK_PROOF_internal *proof; member
|
/netbsd-src/external/bsd/unbound/dist/testdata/ |
H A D | val_nsec3_nods_negcache.rpl | 135 ; proof that there is no DS here. 146 ; get DS proof from neg cache 154 ; ; proof that there is no DS here.
|
H A D | val_nsec3_optout_cache.rpl | 135 ; proof that there is no DS here. 161 ; proof that there is no DS here. 191 ; proof that there is no DS here.
|
H A D | val_nsec3_nods.rpl | 135 ; proof that there is no DS here. 153 ; proof that there is no DS here.
|
H A D | val_nsec3_nods_soa.rpl | 151 ; proof that there is no DS here. 168 ; proof that there is no DS here.
|
H A D | val_nsec3_nods_badsig.rpl | 153 ; proof that there is no DS here. 172 ; proof that there is no DS here.
|
H A D | val_nsec3_nods_badopt.rpl | 149 ; proof that there is no DS here. 169 ; proof that there is no DS here.
|
H A D | val_cnametoposnowc.rpl | 19 SCENARIO_BEGIN Test validator with a cname to positive wildcard without proof 225 ; missing proof
|
H A D | val_nx_failwc.rpl | 19 … with wildcard expanded NSEC record, original NSEC owner does not provide proof for QNAME. CVE-201…
|
H A D | val_nodata_failwc.rpl | 19 … with wildcard expanded NSEC record, original NSEC owner does not provide proof for QNAME. CVE-201…
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | ntlm_err.et | 56 error_code INVALID_PROOF, "Invalid SCRAM proof"
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | TS_VERIFY_CTX_set_certs.pod | 20 provide long term proof of the existence of a certain datum before a particular
|
/netbsd-src/external/mpl/bind/dist/doc/notes/ |
H A D | notes-9.18.24.rst |
|
/netbsd-src/external/mpl/bind/dist/doc/dnssec-guide/ |
H A D | introduction.rst | 143 - NSEC (proof of nonexistence) 145 - NSEC3 (proof of nonexistence) 147 - NSEC3PARAM (proof of nonexistence) 208 respond with more than just the answer to the query, but some proof to
|