Searched refs:siglen (Results 26 - 50 of 97) sorted by relevance

1234

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dsa/
H A Ddsa_asn1.c155 unsigned char *sig, unsigned int *siglen, DSA *dsa)
161 *siglen = 0;
164 *siglen = i2d_DSA_SIG(s, &sig);
177 const unsigned char *sigbuf, int siglen, DSA *dsa)
188 if (d2i_DSA_SIG(&s, &p, siglen) == NULL)
192 if (derlen != siglen || memcmp(sigbuf, der, derlen))
H A Ddsatest.c150 unsigned int siglen; local
211 DSA_sign(0, str1, 20, sig, &siglen, dsa);
212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
217 DSA_sign(0, str1, 20, sig, &siglen, dsa);
218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Decdsa.h198 * \param siglen pointer to the length of the returned signature
203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
213 * \param siglen pointer to the length of the returned signature
221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
231 * \param siglen length of the DER encoded signature
236 const unsigned char *sig, int siglen, EC_KEY *eckey);
H A Drsa.h117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa);
120 unsigned char *sigbuf, unsigned int siglen, const RSA *rsa);
287 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
289 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
295 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
298 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/
H A Decdsa.h198 * \param siglen pointer to the length of the returned signature
203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
213 * \param siglen pointer to the length of the returned signature
221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
231 * \param siglen length of the DER encoded signature
236 const unsigned char *sig, int siglen, EC_KEY *eckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/
H A Dgost_pmeth.c317 size_t *siglen, const unsigned char *tbs,
322 if (!siglen)
325 *siglen = 64; /* better to check size of pkey->pkey.dsa-q */
332 return pack_sign_cp(unpacked_sig, 32, sig, siglen);
336 size_t *siglen, const unsigned char *tbs,
341 if (!siglen)
344 *siglen = 64; /* better to check size of curve order */
351 return pack_sign_cp(unpacked_sig, 32, sig, siglen);
357 size_t siglen, const unsigned char *tbs,
362 DSA_SIG *s = unpack_cp_signature(sig, siglen);
316 pkey_gost94_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument
335 pkey_gost01_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument
356 pkey_gost94_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument
371 pkey_gost01_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument
546 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx) argument
[all...]
H A Dgost_sign.c131 int pack_sign_cc(DSA_SIG *s,int order,unsigned char *sig, size_t *siglen)
133 *siglen = 2*order;
134 memset(sig,0,*siglen);
137 dump_signature("serialized",sig,*siglen);
146 int pack_sign_cp(DSA_SIG *s, int order, unsigned char *sig, size_t *siglen) argument
148 *siglen = 2 * order;
149 memset(sig, 0, *siglen);
152 dump_signature("serialized", sig, *siglen);
305 DSA_SIG *unpack_cc_signature(const unsigned char *sig,size_t siglen)
314 s->r = getbnfrombuf(sig, siglen/
320 unpack_cp_signature(const unsigned char *sig, size_t siglen) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/
H A Dgost_pmeth.c317 size_t *siglen, const unsigned char *tbs,
322 if (!siglen)
325 *siglen = 64; /* better to check size of pkey->pkey.dsa-q */
332 return pack_sign_cp(unpacked_sig, 32, sig, siglen);
336 size_t *siglen, const unsigned char *tbs,
341 if (!siglen)
344 *siglen = 64; /* better to check size of curve order */
351 return pack_sign_cp(unpacked_sig, 32, sig, siglen);
357 size_t siglen, const unsigned char *tbs,
362 DSA_SIG *s = unpack_cp_signature(sig, siglen);
316 pkey_gost94_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument
335 pkey_gost01_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument
356 pkey_gost94_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument
371 pkey_gost01_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument
546 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx) argument
[all...]
H A Dgost_sign.c131 int pack_sign_cc(DSA_SIG *s,int order,unsigned char *sig, size_t *siglen)
133 *siglen = 2*order;
134 memset(sig,0,*siglen);
137 dump_signature("serialized",sig,*siglen);
146 int pack_sign_cp(DSA_SIG *s, int order, unsigned char *sig, size_t *siglen) argument
148 *siglen = 2 * order;
149 memset(sig, 0, *siglen);
152 dump_signature("serialized", sig, *siglen);
305 DSA_SIG *unpack_cc_signature(const unsigned char *sig,size_t siglen)
314 s->r = getbnfrombuf(sig, siglen/
320 unpack_cp_signature(const unsigned char *sig, size_t siglen) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Dpmeth_fn.c101 unsigned char *sig, size_t *siglen,
113 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN)
114 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen);
135 const unsigned char *sig, size_t siglen,
147 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen);
169 const unsigned char *sig, size_t siglen)
181 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen);
100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument
134 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
167 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Dpmeth_fn.c101 unsigned char *sig, size_t *siglen,
113 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN)
114 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen);
135 const unsigned char *sig, size_t siglen,
147 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen);
169 const unsigned char *sig, size_t siglen)
181 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen);
100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument
134 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
167 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/
H A Decdsa.h186 * \param siglen pointer to the length of the returned signature
191 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
199 * \param siglen pointer to the length of the returned signature
207 unsigned char *sig, unsigned int *siglen,
216 * \param siglen length of the DER encoded signature
222 const unsigned char *sig, int siglen, EC_KEY *eckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/
H A Decdsa.h186 * \param siglen pointer to the length of the returned signature
191 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
199 * \param siglen pointer to the length of the returned signature
207 unsigned char *sig, unsigned int *siglen,
216 * \param siglen length of the DER encoded signature
222 const unsigned char *sig, int siglen, EC_KEY *eckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Ddgst.c78 EVP_PKEY *key, unsigned char *sigin, int siglen,
123 int siglen = 0; local
456 siglen = EVP_PKEY_size(sigkey);
457 sigbuf = OPENSSL_malloc(siglen);
468 siglen = BIO_read(sigbio, sigbuf, siglen);
470 if (siglen <= 0) {
487 siglen, NULL, NULL, "stdin", bmd);
510 siglen, sig_name, md_name, argv[i], bmd);
540 EVP_PKEY *key, unsigned char *sigin, int siglen,
539 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file, BIO *bmd) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Ddgst.c78 EVP_PKEY *key, unsigned char *sigin, int siglen,
123 int siglen = 0; local
456 siglen = EVP_PKEY_size(sigkey);
457 sigbuf = OPENSSL_malloc(siglen);
468 siglen = BIO_read(sigbio, sigbuf, siglen);
470 if (siglen <= 0) {
487 siglen, NULL, NULL, "stdin", bmd);
510 siglen, sig_name, md_name, argv[i], bmd);
540 EVP_PKEY *key, unsigned char *sigin, int siglen,
539 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file, BIO *bmd) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Ddgst.c78 EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
103 int siglen = 0; local
335 siglen = EVP_PKEY_size(sigkey);
336 sigbuf = OPENSSL_malloc(siglen);
343 siglen = BIO_read(sigbio, sigbuf, siglen);
345 if(siglen <= 0) {
369 siglen,"","(stdin)",bmd,hmac_key);
395 siglen,tmp,argv[i],bmd,hmac_key);
421 EVP_PKEY *key, unsigned char *sigin, int siglen, cons
420 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title, const char *file,BIO *bmd,const char *hmac_key) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/
H A Drsa_pmeth.c211 size_t *siglen, const unsigned char *tbs,
239 *siglen = slen;
241 *siglen = 0;
293 *siglen = ret;
299 const unsigned char *sig, size_t siglen)
308 ret = RSA_public_decrypt(siglen, sig,
330 sig, siglen, ctx->pkey->pkey.rsa);
337 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa,
346 const unsigned char *sig, size_t siglen,
369 rctx->mgf1md, sig, siglen);
210 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument
297 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
345 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/
H A Drsa_pmeth.c211 size_t *siglen, const unsigned char *tbs,
239 *siglen = slen;
241 *siglen = 0;
293 *siglen = ret;
299 const unsigned char *sig, size_t siglen)
308 ret = RSA_public_decrypt(siglen, sig,
330 sig, siglen, ctx->pkey->pkey.rsa);
337 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa,
346 const unsigned char *sig, size_t siglen,
369 rctx->mgf1md, sig, siglen);
210 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument
297 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
345 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Ddsatest.c145 unsigned int siglen; local
211 DSA_sign(0, str1, 20, sig, &siglen, dsa);
212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
217 DSA_sign(0, str1, 20, sig, &siglen, dsa);
218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/dsa/
H A Ddsatest.c145 unsigned int siglen; local
211 DSA_sign(0, str1, 20, sig, &siglen, dsa);
212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
217 DSA_sign(0, str1, 20, sig, &siglen, dsa);
218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dsa/
H A Ddsatest.c150 unsigned int siglen; local
211 DSA_sign(0, str1, 20, sig, &siglen, dsa);
212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
217 DSA_sign(0, str1, 20, sig, &siglen, dsa);
218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/
H A Dhm_pmeth.c157 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument
166 *siglen = l;
172 *siglen = (size_t)hlen;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/
H A Dhm_pmeth.c157 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument
166 *siglen = l;
172 *siglen = (size_t)hlen;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/
H A Drsa.h117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa);
120 unsigned char *sigbuf, unsigned int siglen, const RSA *rsa);
287 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
289 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
295 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
298 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cmac/
H A Dcm_pmeth.c116 static int cmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument
119 return CMAC_Final(ctx->data, sig, siglen);

Completed in 198 milliseconds

1234