Home
last modified time | relevance | path

Searched refs:proof (Results 1 – 25 of 115) sorted by relevance

12345

/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/
H A Ddaa_debug.c13 save_DAA_PK_PROOF_internal( file, key_pair_with_proof->proof); in save_KEY_PAIR_WITH_PROOF()
26 key_pair_with_proof->proof = load_DAA_PK_PROOF_internal(file); in load_KEY_PAIR_WITH_PROOF()
98 save_DAA_PK_PROOF_internal(FILE *file, TSS_DAA_PK_PROOF_internal *proof) in save_DAA_PK_PROOF_internal() argument
105 fprintf(file, "%d # %s.length\n", proof->length_challenge, "challenge"); in save_DAA_PK_PROOF_internal()
106 fprintf(file, "%s\n", dump_byte_array( proof->length_challenge, in save_DAA_PK_PROOF_internal()
107 proof->challenge)); in save_DAA_PK_PROOF_internal()
108 fprintf(file, "%d # %s.length\n", proof->length_response, "response"); in save_DAA_PK_PROOF_internal()
109 for (i = 0; i < proof->length_response; i++) { in save_DAA_PK_PROOF_internal()
110 BI_SAVE_ARRAY( proof->response[i], file); in save_DAA_PK_PROOF_internal()
123 TSS_DAA_PK_PROOF_internal *proof = in load_DAA_PK_PROOF_internal() local
[all …]
H A Ddaa_structs.c363 save_DAA_PK_PROOF_internal( file, key_pair_with_proof->proof);
376 key_pair_with_proof->proof = load_DAA_PK_PROOF_internal(file);
942 save_DAA_PK_PROOF_internal(FILE *file, TSS_DAA_PK_PROOF_internal *proof)
949 fprintf(file, "%d # %s.length\n", proof->length_challenge, "challenge");
950 fprintf(file, "%s\n", dump_byte_array( proof->length_challenge,
951 proof->challenge));
952 fprintf(file, "%d # %s.length\n", proof->length_response, "response");
953 for (i = 0; i < proof->length_response; i++) {
954 BI_SAVE_ARRAY( proof->response[i], file);
967 TSS_DAA_PK_PROOF_internal *proof =
[all …]
H A Ddaa_debug.h9 TSS_DAA_PK_PROOF_internal *proof; member
/netbsd-src/crypto/external/cpl/trousers/dist/src/trspi/
H A Dtrousers.c1023 Trspi_UnloadBlob_IDENTITY_PROOF(UINT64 *offset, BYTE *blob, TCPA_IDENTITY_PROOF *proof) in Trspi_UnloadBlob_IDENTITY_PROOF() argument
1027 if (!proof) { in Trspi_UnloadBlob_IDENTITY_PROOF()
1050 memset(proof, 0, sizeof(TCPA_IDENTITY_PROOF)); in Trspi_UnloadBlob_IDENTITY_PROOF()
1052 Trspi_UnloadBlob_VERSION(offset, blob, (TCPA_VERSION *)&proof->ver); in Trspi_UnloadBlob_IDENTITY_PROOF()
1053 Trspi_UnloadBlob_UINT32(offset, &proof->labelSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF()
1054 Trspi_UnloadBlob_UINT32(offset, &proof->identityBindingSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF()
1055 Trspi_UnloadBlob_UINT32(offset, &proof->endorsementSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF()
1056 Trspi_UnloadBlob_UINT32(offset, &proof->platformSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF()
1057 Trspi_UnloadBlob_UINT32(offset, &proof->conformanceSize, blob); in Trspi_UnloadBlob_IDENTITY_PROOF()
1060 &proof->identityKey))) { in Trspi_UnloadBlob_IDENTITY_PROOF()
[all …]
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
H A Dkey_correctness_proof.c165 TSS_DAA_PK_PROOF_internal *proof, in is_pk_correct() argument
340 i, j, test_bit( j, proof->challenge, proof->length_challenge)); in is_pk_correct()
344 proof->response[i]->array[j], n); in is_pk_correct()
345 if( test_bit( j, proof->challenge, proof->length_challenge)) { in is_pk_correct()
364 DUMP_BI( proof->response[i]->array[j]); in is_pk_correct()
380 dump_byte_array( proof->length_challenge, proof->challenge)); in is_pk_correct()
381 if( length_challenge != proof->length_challenge) { in is_pk_correct()
386 if( verifiable_challenge[i] != proof->challenge[i]) { in is_pk_correct()
391 *isCorrect = ( memcmp( verifiable_challenge, proof->challenge, length_challenge) == 0); in is_pk_correct()
H A Dkey_verification.c141 isCorrect( hDAA, key_pair_with_proof->pk, key_pair_with_proof->proof); in main()
H A Dissuer_setup.c138 key_pair_with_proof->proof = public_keyproof_internal; in main()
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/
H A Dtspi_daa.c213 key_proof->proof->length_challenge, key_proof->proof->length_response);
215 *publicKeyProof = i_2_e_TSS_DAA_PK_PROOF( key_proof->proof, &tss_alloc, hContext);
265 key_proof->proof->length_challenge, key_proof->proof->length_response); in Tspi_DAA_Issuer_GenerateKey()
268 *publicKeyProof = i_2_e_TSS_DAA_PK_PROOF( key_proof->proof, &tss_alloc, tspContext); in Tspi_DAA_Issuer_GenerateKey()
/netbsd-src/external/mpl/bind/dist/bin/tests/system/wildcard/ns1/
H A Dnamed.conf.in45 * have separate NSEC3 records for the "no qname proof" and the
46 * "closest encloser proof".
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/
H A Drfc3706.txt162 must send a HELLO to the other. This HELLO serves as proof of
166 using the peer's ACK as proof of liveliness. Receipt of either a
191 Receives ACK as proof of
237 By contrast, consider a proof-of-liveliness scheme involving
252 Receives HELLO as proof of A's
257 Receives HELLO as proof
308 request proof of liveliness when it needs it -- not at mandated
315 proof of liveliness. The IPSec traffic itself serves as the proof of
325 proof of liveliness. Peer A, for example, may require rapid
474 two peers, either peer SHOULD use this traffic as proof of
[all …]
/netbsd-src/crypto/external/cpl/trousers/dist/src/include/daa/
H A Dkey_correct.h27 TSS_DAA_PK_PROOF_internal *proof,
H A Ddaa_structs.h229 TSS_DAA_PK_PROOF_internal *proof
266 TSS_DAA_PK_PROOF_internal *proof; member
/netbsd-src/external/bsd/unbound/dist/testdata/
H A Dval_nsec3_nods_negcache.rpl135 ; proof that there is no DS here.
146 ; get DS proof from neg cache
154 ; ; proof that there is no DS here.
H A Dval_nsec3_optout_cache.rpl135 ; proof that there is no DS here.
161 ; proof that there is no DS here.
191 ; proof that there is no DS here.
H A Dval_nsec3_nods.rpl135 ; proof that there is no DS here.
153 ; proof that there is no DS here.
H A Dval_nsec3_nods_soa.rpl151 ; proof that there is no DS here.
168 ; proof that there is no DS here.
H A Dval_nsec3_nods_badsig.rpl153 ; proof that there is no DS here.
172 ; proof that there is no DS here.
H A Dval_nsec3_nods_badopt.rpl149 ; proof that there is no DS here.
169 ; proof that there is no DS here.
H A Dval_cnametoposnowc.rpl19 SCENARIO_BEGIN Test validator with a cname to positive wildcard without proof
225 ; missing proof
H A Dval_nx_failwc.rpl19 … with wildcard expanded NSEC record, original NSEC owner does not provide proof for QNAME. CVE-201…
H A Dval_nodata_failwc.rpl19 … with wildcard expanded NSEC record, original NSEC owner does not provide proof for QNAME. CVE-201…
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/
H A Dntlm_err.et56 error_code INVALID_PROOF, "Invalid SCRAM proof"
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DTS_VERIFY_CTX_set_certs.pod20 provide long term proof of the existence of a certain datum before a particular
/netbsd-src/external/mpl/bind/dist/doc/notes/
H A Dnotes-9.18.24.rst
/netbsd-src/external/mpl/bind/dist/doc/dnssec-guide/
H A Dintroduction.rst143 - NSEC (proof of nonexistence)
145 - NSEC3 (proof of nonexistence)
147 - NSEC3PARAM (proof of nonexistence)
208 respond with more than just the answer to the query, but some proof to

12345