/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/evp/ |
H A D | p_verify.c | 69 unsigned int m_len; local 90 EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); 98 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
H A D | p_sign.c | 82 unsigned int m_len; local 89 EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); 111 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pem/ |
H A D | pem_sign.c | 83 unsigned int m_len; local 92 if (EVP_SignFinal(ctx,m,&m_len,pkey) <= 0) goto err; 94 i=EVP_EncodeBlock(sigret,m,m_len);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p_verify.c | 69 unsigned int m_len; local 90 EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); 98 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
H A D | p_sign.c | 82 unsigned int m_len; local 89 EVP_DigestFinal_ex(&tmp_ctx,&(m[0]),&m_len); 111 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_sign.c | 83 unsigned int m_len; local 92 if (EVP_SignFinal(ctx,m,&m_len,pkey) <= 0) goto err; 94 i=EVP_EncodeBlock(sigret,m,m_len);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_saos.c | 67 const unsigned char *m, unsigned int m_len, 75 sig.length=m_len; 106 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 133 if ( ((unsigned int)sig->length != m_len) || 134 (memcmp(m,sig->data,m_len) != 0)) 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 69 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, argument 81 return rsa->meth->rsa_sign(type, m, m_len, 86 if(m_len != SSL_SIG_LENGTH) { 111 sig.digest->length=m_len; 145 int RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, argument 160 return rsa->meth->rsa_verify(dtype, m, m_len, 170 if((dtype == NID_md5_sha1) && (m_len != SSL_SIG_LENGTH) ) { 215 if ( ((unsigned int)sig->digest->length != m_len) || 216 (memcmp(m,sig->digest->data,m_len) != 0))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/ |
H A D | rsa_saos.c | 67 const unsigned char *m, unsigned int m_len, 75 sig.length=m_len; 106 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 134 if ( ((unsigned int)sig->length != m_len) || 135 (memcmp(m,sig->data,m_len) != 0)) 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 69 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, argument 81 return rsa->meth->rsa_sign(type, m, m_len, 86 if(m_len != SSL_SIG_LENGTH) { 111 sig.digest->length=m_len; 145 int RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, argument 160 return rsa->meth->rsa_verify(dtype, m, m_len, 170 if((dtype == NID_md5_sha1) && (m_len != SSL_SIG_LENGTH) ) { 232 if ( ((unsigned int)sig->digest->length != m_len) || 233 (memcmp(m,sig->digest->data,m_len) != 0))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/sys/ultrix/ |
H A D | at_ultrix.c | 74 if ( m->m_len < sizeof( struct llc )) { 170 m0->m_len = m->m_len; 171 bcopy( mtod( m, caddr_t ), mtod( m0, caddr_t ), m->m_len ); 174 m->m_len = sizeof( struct llc ); 188 *type += m->m_len;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/engine/vendor_defns/ |
H A D | hw_ubsec.h | 61 unsigned char *g, int g_len, unsigned char *m, int m_len, 66 unsigned char *m, int m_len, unsigned char *k, int *k_len); 69 unsigned char *x, int x_len, unsigned char *m, int m_len,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/engines/vendor_defns/ |
H A D | hw_ubsec.h | 61 unsigned char *g, int g_len, unsigned char *m, int m_len, 66 unsigned char *m, int m_len, unsigned char *k, int *k_len); 69 unsigned char *x, int x_len, unsigned char *m, int m_len,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/net/skfp/h/ |
H A D | mbuf.h | 31 #define sm_len m_len
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/sys/netatalk/ |
H A D | ddp_output.c | 52 len += m->m_len; 65 m->m_len = sizeof( struct ddpehdr ); 108 for ( data = mtod( m, u_char * ), end = data + m->m_len; data < end; 167 mlen += m0->m_len; 181 m->m_len += SZ_ELAPHDR; 192 m0->m_len = SZ_ELAPHDR; 238 m->m_len -= SZ_ELAPHDR;
|
H A D | ddp_input.c | 113 if ( m->m_len < SZ_ELAPHDR && 155 if ( m->m_len < sizeof( struct ddpshdr ) && 187 if ( m->m_len < sizeof( struct ddpehdr ) && 254 mlen += mp->m_len; 356 bprint( mtod( m, char * ), m->m_len );
|
H A D | aarp.c | 151 m->m_len = sizeof( *ea ); 158 m->m_len = sizeof( *ea ); 210 m->m_len += sizeof( struct llc ); 330 if ( m->m_len < sizeof( struct arphdr )) { 339 if ( m->m_len < sizeof( struct arphdr ) + 2 * ar->ar_hln + 590 m->m_len = sizeof ( struct llc ); 707 m->m_len = sizeof( *ea ); 714 m->m_len = sizeof( *ea ); 753 m->m_len += sizeof( struct llc );
|
H A D | ddp_usrreq.c | 56 if ( rights && rights->m_len ) { 192 addr->m_len = sizeof( struct sockaddr_at ); 211 if ( addr->m_len != sizeof( *sat )) { 308 if ( addr->m_len != sizeof( *sat ))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/sys/sunos/ |
H A D | at_sun.c | 236 if ( m->m_len == sizeof( struct ifnet * )) { 247 if ( m->m_len < sizeof( struct llc )) { 267 if ( m->m_len < sizeof( struct ifnet * )) { 347 if (( m0 = m_copy( m, 0, m->m_len )) == 0 ) { 361 m->m_len = sizeof( struct llc ); 364 m->m_len += sizeof( struct llc );
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/engine/ |
H A D | hw_4758_cca.c | 88 static int cca_rsa_sign(int type, const unsigned char *m, unsigned int m_len, 90 static int cca_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, 606 static int cca_rsa_verify(int type, const unsigned char *m, unsigned int m_len, argument 654 sig.digest->length = m_len; 671 if (m_len != SSL_SIG_LEN) 679 length = m_len; 729 static int cca_rsa_sign(int type, const unsigned char *m, unsigned int m_len, argument 778 sig.digest->length = m_len; 795 if (m_len != SSL_SIG_LEN) 802 length = m_len; [all...] |
H A D | hw_ubsec.c | 624 m_len, local 627 m_len = BN_num_bytes(p) + BN_num_bytes(q) + 1;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/engines/ |
H A D | e_4758cca.c | 92 static int cca_rsa_sign(int type, const unsigned char *m, unsigned int m_len, 94 static int cca_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, 628 static int cca_rsa_verify(int type, const unsigned char *m, unsigned int m_len, argument 676 sig.digest->length = m_len; 693 if (m_len != SSL_SIG_LEN) 701 length = m_len; 751 static int cca_rsa_sign(int type, const unsigned char *m, unsigned int m_len, argument 800 sig.digest->length = m_len; 817 if (m_len != SSL_SIG_LEN) 824 length = m_len; [all...] |
H A D | e_ubsec.c | 634 m_len, local 637 m_len = BN_num_bytes(p) + BN_num_bytes(q) + 1;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/modules/ |
H A D | if_ppp.c | 457 mb->m_len += sizeof(struct ifnet *); 547 len += m->m_len; 678 m->m_len = 0; 717 m->m_len = 0; 729 m->m_len += n; 750 len += nm->m_len; 754 nb = m->m_len; 763 nb = m->m_len;
|