/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/ |
H A D | ecs_vrf.c | 87 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 98 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) 102 if (derlen != sig_len || memcmp(sigbuf, der, derlen)) 86 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
|
H A D | ecdsatest.c | 295 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 380 sig_len = ECDSA_size(eckey); 381 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 383 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) { 390 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) { 397 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) { 404 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) { 411 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) { 424 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL) { 455 sig_len [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/ |
H A D | ecs_vrf.c | 87 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 98 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) 102 if (derlen != sig_len || memcmp(sigbuf, der, derlen)) 86 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
|
H A D | ecdsatest.c | 295 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 380 sig_len = ECDSA_size(eckey); 381 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 383 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) { 390 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) { 397 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) { 404 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) { 411 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) { 424 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL) { 455 sig_len [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/ |
H A D | ecs_vrf.c | 84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err; 83 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
|
H A D | ecdsatest.c | 292 unsigned int sig_len; local 382 sig_len = ECDSA_size(eckey); 383 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 393 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 401 if (ECDSA_verify(0, digest, 20, signature, sig_len, 410 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 419 offset = signature[10] % sig_len; 422 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/sign/ |
H A D | sign.c | 83 int sig_len; local 117 sig_len = sizeof(sig_buf); 118 err = EVP_SignFinal(&md_ctx, sig_buf, &sig_len, pkey); 151 err = EVP_VerifyFinal(&md_ctx, sig_buf, sig_len, pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/sign/ |
H A D | sign.c | 80 int sig_len; local 111 sig_len = sizeof(sig_buf); 112 err = EVP_SignFinal (&md_ctx, sig_buf, &sig_len, pkey); 144 err = EVP_VerifyFinal (&md_ctx, sig_buf, sig_len, pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/sign/ |
H A D | sign.c | 83 int sig_len; local 117 sig_len = sizeof(sig_buf); 118 err = EVP_SignFinal(&md_ctx, sig_buf, &sig_len, pkey); 151 err = EVP_VerifyFinal(&md_ctx, sig_buf, sig_len, pkey);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-marshal-byteswap.c | 147 dbus_uint32_t sig_len; local 149 sig_len = *p; 151 p += (sig_len + 2); /* +2 for len and nul */ 160 dbus_uint32_t sig_len; local 165 sig_len = *p; 168 _dbus_string_init_const_len (&sig, p, sig_len); 170 p += (sig_len + 1); /* 1 for nul */
|
H A D | dbus-marshal-recursive.c | 277 int sig_len; local 286 sig_len = _dbus_string_get_byte (sub->value_str, sub->value_pos); 291 sub->value_pos = sub->type_pos + sig_len + 1; 2461 int sig_len; local 2496 &sig_start, &sig_len); 2513 sig_str, sig_start, sig_len,
|
H A D | dbus-marshal-recursive-util.c | 1154 int sig_len; local 1162 sig_len = _dbus_string_get_length (nid->signature); 1185 _dbus_assert (sig_len == _dbus_string_get_length (nid->signature));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ecdsatest.c | 292 unsigned int sig_len; local 382 sig_len = ECDSA_size(eckey); 383 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 393 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 401 if (ECDSA_verify(0, digest, 20, signature, sig_len, 410 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 419 offset = signature[10] % sig_len; 422 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | evp_extra_test.c | 283 size_t sig_len = 0; local 296 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) { 300 if (sig_len != (size_t)EVP_PKEY_size(pkey)) { 301 fprintf(stderr, "sig_len mismatch\n"); 305 sig = OPENSSL_malloc(sig_len); 306 if (sig == NULL || !EVP_DigestSignFinal(&md_ctx, sig, &sig_len)) { 313 || !EVP_DigestVerifyFinal(&md_ctx_verify, sig, sig_len)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | evp_extra_test.c | 283 size_t sig_len = 0; local 296 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) { 300 if (sig_len != (size_t)EVP_PKEY_size(pkey)) { 301 fprintf(stderr, "sig_len mismatch\n"); 305 sig = OPENSSL_malloc(sig_len); 306 if (sig == NULL || !EVP_DigestSignFinal(&md_ctx, sig, &sig_len)) { 313 || !EVP_DigestVerifyFinal(&md_ctx_verify, sig, sig_len)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | sm_statefuns.c | 3845 unsigned int sig_len; local 3872 sig_len = ntohs(chunk->chunk_hdr->length) - sizeof(sctp_auth_chunk_t); 3874 if (sig_len != hmac->hmac_len) 3885 skb_pull(chunk->skb, sig_len); 3887 save_digest = kmemdup(digest, sig_len, GFP_ATOMIC); 3891 memset(digest, 0, sig_len); 3898 if (memcmp(save_digest, digest, sig_len)) {
|