Searched refs:signatureLength (Results 1 - 5 of 5) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | pubkey.cpp | 84 size_t signatureLength = SignatureLength(); local 85 GetTrapdoorFunctionInterface().CalculateRandomizedInverse(rng, r).Encode(signature, signatureLength); 86 return signatureLength; 89 void TF_VerifierBase::InputSignature(PK_MessageAccumulator &messageAccumulator, const byte *signature, size_t signatureLength) const 99 Integer x = GetTrapdoorFunctionInterface().ApplyFunction(Integer(signature, signatureLength));
|
H A D | validat2.cpp | 117 size_t signatureLength = priv.SignMessage(GlobalRNG(), message, messageLen, signature); local 118 fail = !pub.VerifyMessage(message, messageLen, signature, signatureLength); 125 fail = pub.VerifyMessage(message, messageLen, signature, signatureLength); 133 signatureLength = priv.SignMessageWithRecovery(GlobalRNG(), message, messageLen, NULL, 0, signature); 134 SecByteBlock recovered(priv.MaxRecoverableLengthFromSignatureLength(signatureLength)); 135 DecodingResult result = pub.RecoverMessage(recovered, NULL, 0, signature, signatureLength); 143 result = pub.RecoverMessage(recovered, NULL, 0, signature, signatureLength); 275 size_t signatureLength = rsaPriv.SignMessage(GlobalRNG(), (byte *)plain, strlen(plain), out); local 282 fail = !rsaPub.VerifyMessage((byte *)plain, strlen(plain), out, signatureLength); 289 fail = rsaPub.VerifyMessage((byte *)plain, strlen(plain), out, signatureLength); [all...] |
H A D | cryptlib.cpp | 777 bool PK_Verifier::VerifyMessage(const byte *message, size_t messageLen, const byte *signature, size_t signatureLength) const 780 InputSignature(*m, signature, signatureLength); 793 const byte *signature, size_t signatureLength) const 796 InputSignature(*m, signature, signatureLength);
|
H A D | cryptlib.h | 1327 virtual size_t MaxRecoverableLengthFromSignatureLength(size_t signatureLength) const =0; 1408 virtual void InputSignature(PK_MessageAccumulator &messageAccumulator, const byte *signature, size_t signatureLength) const =0; 1418 const byte *signature, size_t signatureLength) const; 1421 /*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength) 1426 /*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength) 1431 /*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength) 1435 const byte *signature, size_t signatureLength) const;
|
H A D | pubkey.h | 317 size_t MaxRecoverableLengthFromSignatureLength(size_t signatureLength) const 346 void InputSignature(PK_MessageAccumulator &messageAccumulator, const byte *signature, size_t signatureLength) const; 972 size_t MaxRecoverableLengthFromSignatureLength(size_t signatureLength) const 1086 void InputSignature(PK_MessageAccumulator &messageAccumulator, const byte *signature, size_t signatureLength) const
|
Completed in 110 milliseconds