/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/ |
H A D | rsa_locl.h | 4 size_t siglen, RSA *rsa);
|
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, 97 *siglen = i; 107 unsigned int siglen, RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) { 120 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 125 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 144 OPENSSL_cleanse(s, (unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 88 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); 139 *siglen = i; 171 const unsigned char *sigbuf, size_t siglen, RSA *rsa) 185 if (siglen != (unsigned int)RSA_size(rsa)) { 191 i = RSA_public_decrypt((int)siglen, 199 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 208 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 286 OPENSSL_cleanse(s, (unsigned int)siglen); 293 const unsigned char *sigbuf, unsigned int siglen, RS 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 168 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 292 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_locl.h | 4 size_t siglen, RSA *rsa);
|
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, 97 *siglen = i; 107 unsigned int siglen, RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) { 120 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 125 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 144 OPENSSL_cleanse(s, (unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 88 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); 139 *siglen = i; 171 const unsigned char *sigbuf, size_t siglen, RSA *rsa) 185 if (siglen != (unsigned int)RSA_size(rsa)) { 191 i = RSA_public_decrypt((int)siglen, 199 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 208 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 286 OPENSSL_cleanse(s, (unsigned int)siglen); 293 const unsigned char *sigbuf, unsigned int siglen, RS 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 168 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 292 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/ |
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 97 *siglen=i; 106 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 114 if (siglen != (unsigned int)RSA_size(rsa)) 120 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 126 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 145 OPENSSL_cleanse(s,(unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 82 sigret, siglen, rsa); 136 *siglen=i; 146 unsigned char *sigbuf, unsigned int siglen, RSA *rsa) 152 if (siglen != (unsigned int)RSA_size(rsa)) 161 sigbuf, siglen, rsa); 164 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 174 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 244 OPENSSL_cleanse(s,(unsigned int)siglen); 69 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 145 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/ |
H A D | ecs_sign.c | 76 *sig, unsigned int *siglen, EC_KEY *eckey) 78 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, 89 *siglen=0; 92 *siglen = i2d_ECDSA_SIG(s, &sig); 75 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 81 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 78 *sig, unsigned int *siglen, EC_KEY *eckey) 80 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, 91 *siglen = 0; 94 *siglen = i2d_ECDSA_SIG(s, &sig); 77 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/ |
H A D | ecs_sign.c | 78 *sig, unsigned int *siglen, EC_KEY *eckey) 80 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, 91 *siglen = 0; 94 *siglen = i2d_ECDSA_SIG(s, &sig); 77 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/dsa/ |
H A D | dsa_sign.c | 74 unsigned int *siglen, DSA *dsa) 80 *siglen=0; 83 *siglen=i2d_DSA_SIG(s,&sig); 73 DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, DSA *dsa) argument
|
H A D | dsa_vrf.c | 82 const unsigned char *sigbuf, int siglen, DSA *dsa) 89 if (d2i_DSA_SIG(&s,&sigbuf,siglen) == NULL) goto err; 81 DSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int siglen, DSA *dsa) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | m_sigver.c | 129 size_t *siglen) 136 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); 140 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); 157 sigret, siglen, &tmp_ctx); 163 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 167 if (pctx->pmeth->signctx(pctx, sigret, siglen, ctx) <= 0) 171 if (s < 0 || EVP_PKEY_sign(pctx, sigret, siglen, NULL, s) <= 0) 179 size_t siglen) 196 sig, siglen, &tmp_ctx); 202 return EVP_PKEY_verify(ctx->pctx, sig, siglen, m 128 EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) argument 178 EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, size_t siglen) argument [all...] |
H A D | p_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 86 *siglen = 0; 106 *siglen = sltmp; 131 return (ctx->digest->sign(ctx->digest->type, m, m_len, sigret, siglen, 77 EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 90 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 115 sigbuf, siglen, pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | m_sigver.c | 129 size_t *siglen) 136 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); 140 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); 157 sigret, siglen, &tmp_ctx); 163 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 167 if (pctx->pmeth->signctx(pctx, sigret, siglen, ctx) <= 0) 171 if (s < 0 || EVP_PKEY_sign(pctx, sigret, siglen, NULL, s) <= 0) 179 size_t siglen) 196 sig, siglen, &tmp_ctx); 202 return EVP_PKEY_verify(ctx->pctx, sig, siglen, m 128 EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) argument 178 EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, size_t siglen) argument [all...] |
H A D | p_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 86 *siglen = 0; 106 *siglen = sltmp; 131 return (ctx->digest->sign(ctx->digest->type, m, m_len, sigret, siglen, 77 EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 90 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 115 sigbuf, siglen, pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pem_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 94 *siglen = i; 77 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 99 sigbuf,siglen,pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
H A D | p_sign.c | 78 int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 86 *siglen=0; 111 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_sign.c | 78 int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 95 *siglen=i;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pem_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 94 *siglen = i; 77 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dsa/ |
H A D | dsa_asn1.c | 155 unsigned char *sig, unsigned int *siglen, DSA *dsa) 161 *siglen = 0; 164 *siglen = i2d_DSA_SIG(s, &sig); 177 const unsigned char *sigbuf, int siglen, DSA *dsa) 188 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) 192 if (derlen != siglen || memcmp(sigbuf, der, derlen))
|