/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dsa/ |
H A D | dsa_asn1.c | 155 unsigned char *sig, unsigned int *siglen, DSA *dsa) 161 *siglen = 0; 164 *siglen = i2d_DSA_SIG(s, &sig); 177 const unsigned char *sigbuf, int siglen, DSA *dsa) 188 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) 192 if (derlen != siglen || memcmp(sigbuf, der, derlen))
|
H A D | dsatest.c | 150 unsigned int siglen; local 211 DSA_sign(0, str1, 20, sig, &siglen, dsa); 212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 217 DSA_sign(0, str1, 20, sig, &siglen, dsa); 218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ecdsa.h | 198 * \param siglen pointer to the length of the returned signature 203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 213 * \param siglen pointer to the length of the returned signature 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 231 * \param siglen length of the DER encoded signature 236 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
H A D | rsa.h | 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); 120 unsigned char *sigbuf, unsigned int siglen, const RSA *rsa); 287 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 289 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 295 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 298 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/ |
H A D | ecdsa.h | 198 * \param siglen pointer to the length of the returned signature 203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 213 * \param siglen pointer to the length of the returned signature 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 231 * \param siglen length of the DER encoded signature 236 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_pmeth.c | 317 size_t *siglen, const unsigned char *tbs, 322 if (!siglen) 325 *siglen = 64; /* better to check size of pkey->pkey.dsa-q */ 332 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 336 size_t *siglen, const unsigned char *tbs, 341 if (!siglen) 344 *siglen = 64; /* better to check size of curve order */ 351 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 357 size_t siglen, const unsigned char *tbs, 362 DSA_SIG *s = unpack_cp_signature(sig, siglen); 316 pkey_gost94_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 335 pkey_gost01_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 356 pkey_gost94_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 371 pkey_gost01_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 546 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx) argument [all...] |
H A D | gost_sign.c | 131 int pack_sign_cc(DSA_SIG *s,int order,unsigned char *sig, size_t *siglen) 133 *siglen = 2*order; 134 memset(sig,0,*siglen); 137 dump_signature("serialized",sig,*siglen); 146 int pack_sign_cp(DSA_SIG *s, int order, unsigned char *sig, size_t *siglen) argument 148 *siglen = 2 * order; 149 memset(sig, 0, *siglen); 152 dump_signature("serialized", sig, *siglen); 305 DSA_SIG *unpack_cc_signature(const unsigned char *sig,size_t siglen) 314 s->r = getbnfrombuf(sig, siglen/ 320 unpack_cp_signature(const unsigned char *sig, size_t siglen) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_pmeth.c | 317 size_t *siglen, const unsigned char *tbs, 322 if (!siglen) 325 *siglen = 64; /* better to check size of pkey->pkey.dsa-q */ 332 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 336 size_t *siglen, const unsigned char *tbs, 341 if (!siglen) 344 *siglen = 64; /* better to check size of curve order */ 351 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 357 size_t siglen, const unsigned char *tbs, 362 DSA_SIG *s = unpack_cp_signature(sig, siglen); 316 pkey_gost94_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 335 pkey_gost01_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 356 pkey_gost94_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 371 pkey_gost01_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 546 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx) argument [all...] |
H A D | gost_sign.c | 131 int pack_sign_cc(DSA_SIG *s,int order,unsigned char *sig, size_t *siglen) 133 *siglen = 2*order; 134 memset(sig,0,*siglen); 137 dump_signature("serialized",sig,*siglen); 146 int pack_sign_cp(DSA_SIG *s, int order, unsigned char *sig, size_t *siglen) argument 148 *siglen = 2 * order; 149 memset(sig, 0, *siglen); 152 dump_signature("serialized", sig, *siglen); 305 DSA_SIG *unpack_cc_signature(const unsigned char *sig,size_t siglen) 314 s->r = getbnfrombuf(sig, siglen/ 320 unpack_cp_signature(const unsigned char *sig, size_t siglen) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 101 unsigned char *sig, size_t *siglen, 113 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) 114 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 135 const unsigned char *sig, size_t siglen, 147 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); 169 const unsigned char *sig, size_t siglen) 181 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 134 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument 167 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | pmeth_fn.c | 101 unsigned char *sig, size_t *siglen, 113 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) 114 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 135 const unsigned char *sig, size_t siglen, 147 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); 169 const unsigned char *sig, size_t siglen) 181 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 134 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument 167 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/ |
H A D | ecdsa.h | 186 * \param siglen pointer to the length of the returned signature 191 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 199 * \param siglen pointer to the length of the returned signature 207 unsigned char *sig, unsigned int *siglen, 216 * \param siglen length of the DER encoded signature 222 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/ |
H A D | ecdsa.h | 186 * \param siglen pointer to the length of the returned signature 191 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 199 * \param siglen pointer to the length of the returned signature 207 unsigned char *sig, unsigned int *siglen, 216 * \param siglen length of the DER encoded signature 222 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, 123 int siglen = 0; local 456 siglen = EVP_PKEY_size(sigkey); 457 sigbuf = OPENSSL_malloc(siglen); 468 siglen = BIO_read(sigbio, sigbuf, siglen); 470 if (siglen <= 0) { 487 siglen, NULL, NULL, "stdin", bmd); 510 siglen, sig_name, md_name, argv[i], bmd); 540 EVP_PKEY *key, unsigned char *sigin, int siglen, 539 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file, BIO *bmd) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, 123 int siglen = 0; local 456 siglen = EVP_PKEY_size(sigkey); 457 sigbuf = OPENSSL_malloc(siglen); 468 siglen = BIO_read(sigbio, sigbuf, siglen); 470 if (siglen <= 0) { 487 siglen, NULL, NULL, "stdin", bmd); 510 siglen, sig_name, md_name, argv[i], bmd); 540 EVP_PKEY *key, unsigned char *sigin, int siglen, 539 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file, BIO *bmd) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title, 103 int siglen = 0; local 335 siglen = EVP_PKEY_size(sigkey); 336 sigbuf = OPENSSL_malloc(siglen); 343 siglen = BIO_read(sigbio, sigbuf, siglen); 345 if(siglen <= 0) { 369 siglen,"","(stdin)",bmd,hmac_key); 395 siglen,tmp,argv[i],bmd,hmac_key); 421 EVP_PKEY *key, unsigned char *sigin, int siglen, cons 420 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title, const char *file,BIO *bmd,const char *hmac_key) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/ |
H A D | rsa_pmeth.c | 211 size_t *siglen, const unsigned char *tbs, 239 *siglen = slen; 241 *siglen = 0; 293 *siglen = ret; 299 const unsigned char *sig, size_t siglen) 308 ret = RSA_public_decrypt(siglen, sig, 330 sig, siglen, ctx->pkey->pkey.rsa); 337 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, 346 const unsigned char *sig, size_t siglen, 369 rctx->mgf1md, sig, siglen); 210 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 297 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument 345 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 211 size_t *siglen, const unsigned char *tbs, 239 *siglen = slen; 241 *siglen = 0; 293 *siglen = ret; 299 const unsigned char *sig, size_t siglen) 308 ret = RSA_public_decrypt(siglen, sig, 330 sig, siglen, ctx->pkey->pkey.rsa); 337 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, 346 const unsigned char *sig, size_t siglen, 369 rctx->mgf1md, sig, siglen); 210 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 297 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument 345 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | dsatest.c | 145 unsigned int siglen; local 211 DSA_sign(0, str1, 20, sig, &siglen, dsa); 212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 217 DSA_sign(0, str1, 20, sig, &siglen, dsa); 218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/dsa/ |
H A D | dsatest.c | 145 unsigned int siglen; local 211 DSA_sign(0, str1, 20, sig, &siglen, dsa); 212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 217 DSA_sign(0, str1, 20, sig, &siglen, dsa); 218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dsa/ |
H A D | dsatest.c | 150 unsigned int siglen; local 211 DSA_sign(0, str1, 20, sig, &siglen, dsa); 212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 217 DSA_sign(0, str1, 20, sig, &siglen, dsa); 218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/ |
H A D | hm_pmeth.c | 157 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 166 *siglen = l; 172 *siglen = (size_t)hlen;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/ |
H A D | hm_pmeth.c | 157 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 166 *siglen = l; 172 *siglen = (size_t)hlen;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/ |
H A D | rsa.h | 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); 120 unsigned char *sigbuf, unsigned int siglen, const RSA *rsa); 287 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 289 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 295 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 298 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cmac/ |
H A D | cm_pmeth.c | 116 static int cmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 119 return CMAC_Final(ctx->data, sig, siglen);
|