/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dsa/ |
H A D | dsa.h | 212 unsigned char *sig, unsigned int *siglen, DSA *dsa); 214 const unsigned char *sigbuf, int siglen, DSA *dsa);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 510 unsigned char *sig, size_t *siglen, 522 size_t siglen, 537 size_t *siglen, 551 size_t *siglen, 563 int siglen, 507 EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, int (*sign_init) (EVP_PKEY_CTX *ctx), int (*sign) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 518 EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, int (*verify_init) (EVP_PKEY_CTX *ctx), int (*verify) (EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen)) argument 530 EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, int (*verify_recover_init) (EVP_PKEY_CTX *ctx), int (*verify_recover) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 546 EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, int (*signctx_init) (EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*signctx) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx)) argument 558 EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, int (*verifyctx_init) (EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*verifyctx) (EVP_PKEY_CTX *ctx, const unsigned char *sig, int siglen, EVP_MD_CTX *mctx)) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | pmeth_lib.c | 510 unsigned char *sig, size_t *siglen, 522 size_t siglen, 537 size_t *siglen, 551 size_t *siglen, 563 int siglen, 507 EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, int (*sign_init) (EVP_PKEY_CTX *ctx), int (*sign) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 518 EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, int (*verify_init) (EVP_PKEY_CTX *ctx), int (*verify) (EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen)) argument 530 EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, int (*verify_recover_init) (EVP_PKEY_CTX *ctx), int (*verify_recover) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 546 EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, int (*signctx_init) (EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*signctx) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx)) argument 558 EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, int (*verifyctx_init) (EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*verifyctx) (EVP_PKEY_CTX *ctx, const unsigned char *sig, int siglen, EVP_MD_CTX *mctx)) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsse2api.c | 1518 int siglen; local 1549 || soap_smd_end(soap, sig, &siglen)) 1554 signature->SignatureValue = soap_s2base64(soap, (unsigned char*)sig, NULL, siglen); 1589 int method, siglen, sigvallen; local 1620 siglen = sigvallen; 1624 || soap_smd_end(soap, sig, &siglen)) 1627 { if (siglen != sigvallen || memcmp(sig, sigval, siglen)) 1651 siglen = sigvallen; 1655 || soap_smd_end(soap, sig, &siglen)) [all...] |
H A D | wsseapi.c | 1583 int siglen; local 1611 || soap_smd_end(soap, sig, &siglen)) 1614 signature->SignatureValue = soap_s2base64(soap, (unsigned char*)sig, NULL, siglen); 1649 int method, siglen, sigvallen; local 1678 siglen = sigvallen; 1718 || soap_smd_end(soap, sig, &siglen)) 1721 { if (siglen != sigvallen || memcmp(sig, sigval, siglen)) 1745 siglen = sigvallen; 1749 || soap_smd_end(soap, sig, &siglen)) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsse2api.c | 1518 int siglen; local 1549 || soap_smd_end(soap, sig, &siglen)) 1554 signature->SignatureValue = soap_s2base64(soap, (unsigned char*)sig, NULL, siglen); 1589 int method, siglen, sigvallen; local 1620 siglen = sigvallen; 1624 || soap_smd_end(soap, sig, &siglen)) 1627 { if (siglen != sigvallen || memcmp(sig, sigval, siglen)) 1651 siglen = sigvallen; 1655 || soap_smd_end(soap, sig, &siglen)) [all...] |
H A D | wsseapi.c | 1583 int siglen; local 1611 || soap_smd_end(soap, sig, &siglen)) 1614 signature->SignatureValue = soap_s2base64(soap, (unsigned char*)sig, NULL, siglen); 1649 int method, siglen, sigvallen; local 1678 siglen = sigvallen; 1718 || soap_smd_end(soap, sig, &siglen)) 1721 { if (siglen != sigvallen || memcmp(sig, sigval, siglen)) 1745 siglen = sigvallen; 1749 || soap_smd_end(soap, sig, &siglen)) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | evp.h | 237 unsigned char *sigret, unsigned int *siglen, void *key); 239 const unsigned char *sigbuf, unsigned int siglen, 248 unsigned int *siglen, void *key); 251 unsigned int siglen, void *key); 560 unsigned int siglen,EVP_PKEY *pkey);
|
H A D | pem.h | 624 unsigned int *siglen, EVP_PKEY *pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp.h | 237 unsigned char *sigret, unsigned int *siglen, void *key); 239 const unsigned char *sigbuf, unsigned int siglen, 248 unsigned int *siglen, void *key); 251 unsigned int siglen, void *key); 560 unsigned int siglen,EVP_PKEY *pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | authdata.c | 454 uint32 siglen = length - sizeof(uint32); local 467 if (siglen) { 468 data->signature.buffer = PRS_ALLOC_MEM(ps, uint8, siglen); 478 data->signature.buf_len = siglen;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_doit.c | 917 size_t siglen; local 942 if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) 944 abuf = OPENSSL_malloc(siglen); 947 if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) 958 ASN1_STRING_set0(si->enc_digest, abuf, siglen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 917 size_t siglen; local 942 if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) 944 abuf = OPENSSL_malloc(siglen); 947 if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) 958 ASN1_STRING_set0(si->enc_digest, abuf, siglen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ |
H A D | e_capi.c | 169 unsigned int *siglen, const RSA *rsa); 802 unsigned char *sigret, unsigned int *siglen, const RSA *rsa) 885 *siglen = slen; 801 capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, const RSA *rsa) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ |
H A D | e_capi.c | 169 unsigned int *siglen, const RSA *rsa); 802 unsigned char *sigret, unsigned int *siglen, const RSA *rsa) 885 *siglen = slen; 801 capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, const RSA *rsa) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pem.h | 443 unsigned int *siglen, EVP_PKEY *pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/ |
H A D | BaseClient.cpp | 2118 uint8 siglen = theApp->clientcredits->CreateSignature(credits, achBuffer, 250, ChallengeIP, byChaIPKind ); local 2119 if (siglen == 0){ 2124 data.WriteUInt8(siglen); 2125 data.Write(achBuffer, siglen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pem.h | 443 unsigned int *siglen, EVP_PKEY *pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_lib.c | 4226 size_t i, siglen; local 4240 siglen = tls12_get_psigalgs(s, &sig); 4243 for (i = 0; i < siglen; i += 2, sig += 2) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_lib.c | 4226 size_t i, siglen; local 4240 siglen = tls12_get_psigalgs(s, &sig); 4243 for (i = 0; i < siglen; i += 2, sig += 2) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem.h | 624 unsigned int *siglen, EVP_PKEY *pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/tulip/ |
H A D | de4x5.c | 3895 int i, status = 0, siglen = ARRAY_SIZE(de4x5_signatures); local 3902 if (i >= 0 && i < siglen) { 3916 int i, status = 0, siglen = ARRAY_SIZE(de4x5_signatures); local 3926 for (i=0; i<siglen; i++) { 3929 if (i == siglen) {
|