/macosx-10.10/OpenSSL098-52/src/crypto/rsa/ |
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 97 *siglen=i; 106 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 114 if (siglen != (unsigned int)RSA_size(rsa)) 120 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 126 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 145 OPENSSL_cleanse(s,(unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 82 sigret, siglen, rsa); 149 *siglen=i; 159 unsigned char *sigbuf, unsigned int siglen, RSA *rsa) 165 if (siglen != (unsigned int)RSA_size(rsa)) 174 sigbuf, siglen, rsa); 177 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 199 i=rsa->meth->rsa_pub_dec((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 201 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 272 OPENSSL_cleanse(s,(unsigned int)siglen); 69 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 158 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/rsa/ |
H A D | rsa_saos.c | 85 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 114 *siglen=i; 122 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 129 if (siglen != (unsigned int)RSA_size(rsa)) 135 s=(unsigned char *)Malloc((unsigned int)siglen); 141 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 158 memset(s,0,(unsigned int)siglen); 84 RSA_sign_ASN1_OCTET_STRING(int type, unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 121 RSA_verify_ASN1_OCTET_STRING(int dtype, unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 88 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 97 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); 149 *siglen=i; 159 unsigned char *sigbuf, unsigned int siglen, RSA *rsa) 165 if (siglen != (unsigned int)RSA_size(rsa)) 172 return rsa->meth->rsa_verify(dtype, m, m_len, sigbuf, siglen, rsa); 174 s=(unsigned char *)Malloc((unsigned int)siglen); 184 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 235 memset(s,0,(unsigned int)siglen); 87 RSA_sign(int type, unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 158 RSA_verify(int dtype, unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
/macosx-10.10/OpenSSL098-52/src/crypto/ecdsa/ |
H A D | ecs_sign.c | 77 *sig, unsigned int *siglen, EC_KEY *eckey) 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 83 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, 91 *siglen=0; 94 *siglen = i2d_ECDSA_SIG(s, &sig); 76 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 82 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
H A D | ecdsa.h | 198 * \param siglen pointer to the length of the returned signature 203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 213 * \param siglen pointer to the length of the returned signature 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 231 * \param siglen length of the DER encoded signature 236 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/dsa/ |
H A D | dsa_sign.c | 93 unsigned int *siglen, DSA *dsa) 99 *siglen=0; 102 *siglen=i2d_DSA_SIG(s,&sig); 92 DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, DSA *dsa) argument
|
H A D | dsa_vrf.c | 101 unsigned char *sigbuf, int siglen, DSA *dsa) 108 if (d2i_DSA_SIG(&s,&sigbuf,siglen) == NULL) goto err; 100 DSA_verify(int type, const unsigned char *dgst, int dgst_len, unsigned char *sigbuf, int siglen, DSA *dsa) argument
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | p_sign.c | 78 int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 86 *siglen=0; 115 NULL, -1, sigret, siglen, &sctmp); 120 i = ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 102 NULL, -1, sigbuf, siglen, &sctmp); 108 sigbuf,siglen,pkey->pkey.ptr); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/any_255/ |
H A D | tsig_250.h | 30 isc_uint16_t siglen; member in struct:dns_rdata_any_tsig
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 36 isc_uint16_t siglen; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 37 isc_uint16_t siglen; member in struct:dns_rdata_sig_t
|
/macosx-10.10/libresolv-57/ |
H A D | ns_sign.c | 74 * siglen input - length of signature buffer 84 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 88 querysig, querysiglen, sig, siglen, 94 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 106 if (msg == NULL || msglen == NULL || sig == NULL || siglen == NULL) 206 sig, *siglen); 209 *siglen = n; 211 *siglen = 0; 214 BOUNDS_CHECK(cp, NS_INT16SZ + (*siglen)); 215 NS_PUT16(*siglen, c 83 ns_sign(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned) argument 93 ns_sign2(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned, u_char **dnptrs, u_char **lastdnptr) argument [all...] |
H A D | ns_verify.c | 126 * siglen (query), input - length of signature buffer 143 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 298 if (sig != NULL && siglen != NULL) { 299 if (*siglen < sigfieldlen) 302 *siglen = sigfieldlen; 307 if (sig != NULL && siglen != NULL) 308 *siglen = 0; 343 state->siglen = querysiglen; 366 state->sig, state->siglen, 367 state->sig, &state->siglen, 142 ns_verify(u_char *msg, int *msglen, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t *timesigned, int nostrip) argument [all...] |
H A D | res_sendsigned.c | 43 int newmsglen, bufsize, siglen; local 83 siglen = sizeof(sig); 85 sig, &siglen, 0); 115 ret = ns_verify(answer, &anslen, dstkey, sig, siglen,
|
/macosx-10.10/OpenSSL098-52/src/crypto/pem/ |
H A D | pem_sign.c | 78 int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 95 *siglen=i;
|
/macosx-10.10/OpenSSL098-52/src/fips/dsa/ |
H A D | fips_dsa_sign.c | 184 unsigned char *sig, unsigned int *siglen, EVP_MD_SVCTX *sv) 195 *siglen=0; 198 *siglen= FIPS_dsa_sig_encode(sig, s); 200 if (*siglen < 0) 206 const unsigned char *sigbuf, unsigned int siglen, EVP_MD_SVCTX *sv) 217 if (!FIPS_dsa_sig_decode(s,sigbuf,siglen)) 183 fips_dsa_sign(int type, const unsigned char *x, int y, unsigned char *sig, unsigned int *siglen, EVP_MD_SVCTX *sv) argument 205 fips_dsa_verify(int type, const unsigned char *x, int y, const unsigned char *sigbuf, unsigned int siglen, EVP_MD_SVCTX *sv) argument
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | ecdsa.h | 198 * \param siglen pointer to the length of the returned signature 203 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 213 * \param siglen pointer to the length of the returned signature 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 231 * \param siglen length of the DER encoded signature 236 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | schnorr.h | 52 u_char **sig, u_int *siglen); 61 const u_char *sig, u_int siglen);
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSCore/ |
H A D | CryptoAlg.h | 40 // Verify the ctx using the key and compare it against signature/siglen 41 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 57 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
|
/macosx-10.10/OpenSSL098-52/src/crypto/dsa/ |
H A D | dsa_asn1.c | 149 unsigned int *siglen, DSA *dsa) 163 *siglen=0; 166 *siglen=i2d_DSA_SIG(s,&sig); 200 const unsigned char *sigbuf, int siglen, DSA *dsa) 214 if (d2i_DSA_SIG(&s,&sigbuf,siglen) == NULL) goto err;
|
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title, 103 int siglen = 0; local 367 siglen = EVP_PKEY_size(sigkey); 368 sigbuf = OPENSSL_malloc(siglen); 375 siglen = BIO_read(sigbio, sigbuf, siglen); 377 if(siglen <= 0) { 413 siglen,"","(stdin)",bmd,hmac_key,non_fips_allow); 440 siglen,tmp,argv[i],bmd,hmac_key,non_fips_allow); 466 EVP_PKEY *key, unsigned char *sigin, int siglen, cons 465 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title, const char *file,BIO *bmd,const char *hmac_key,int non_fips_allow) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | rsa.h | 120 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 122 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 247 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 249 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 254 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 256 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
/macosx-10.10/OpenSSL098-52/src/fips/rsa/ |
H A D | fips_rsa_sign.c | 192 unsigned char *sigret, unsigned int *siglen, EVP_MD_SVCTX *sv) 210 sigret, siglen, rsa); 268 *siglen=j; 288 *siglen=j; 299 unsigned char *sigbuf, unsigned int siglen, EVP_MD_SVCTX *sv) 310 if (siglen != (unsigned int)RSA_size(sv->key)) 321 sigbuf, siglen, rsa); 325 s= OPENSSL_malloc((unsigned int)siglen); 339 i=rsa->meth->rsa_pub_dec((int)siglen,sigbuf,s, rsa, rsa_pad_mode); 413 OPENSSL_cleanse(s, siglen); 191 fips_rsa_sign(int type, const unsigned char *x, unsigned int y, unsigned char *sigret, unsigned int *siglen, EVP_MD_SVCTX *sv) argument 297 fips_rsa_verify(int dtype, const unsigned char *x, unsigned int y, unsigned char *sigbuf, unsigned int siglen, EVP_MD_SVCTX *sv) argument [all...] |