| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_saos.c | 25 unsigned char *sigret, unsigned int *siglen, 51 *siglen = i; 60 unsigned int siglen, RSA *rsa) 67 if (siglen != (unsigned int)RSA_size(rsa)) { 72 s = OPENSSL_malloc((unsigned int)siglen); 75 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 92 OPENSSL_clear_free(s, (unsigned int)siglen);
|
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_saos.c | 25 unsigned char *sigret, unsigned int *siglen, 53 *siglen = i; 62 unsigned int siglen, RSA *rsa) 69 if (siglen != (unsigned int)RSA_size(rsa)) { 74 s = OPENSSL_malloc((unsigned int)siglen); 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 97 OPENSSL_clear_free(s, (unsigned int)siglen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_saos.c | 19 unsigned char *sigret, unsigned int *siglen, 48 *siglen = i; 57 unsigned int siglen, RSA *rsa) 64 if (siglen != (unsigned int)RSA_size(rsa)) { 70 s = OPENSSL_malloc((unsigned int)siglen); 75 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 93 OPENSSL_clear_free(s, (unsigned int)siglen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, 27 *siglen = 0; 60 *siglen = sltmp; 68 unsigned int *siglen, EVP_PKEY *pkey) 70 return EVP_SignFinal_ex(ctx, sigret, siglen, pkey, NULL, NULL);
|
| p_verify.c | 18 unsigned int siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, 55 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 62 unsigned int siglen, EVP_PKEY *pkey) 64 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL);
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, 27 *siglen = 0; 58 *siglen = sltmp; 66 unsigned int *siglen, EVP_PKEY *pkey) 68 return EVP_SignFinal_ex(ctx, sigret, siglen, pkey, NULL, NULL);
|
| p_verify.c | 18 unsigned int siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 60 unsigned int siglen, EVP_PKEY *pkey) 62 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| m_sigver.c | 101 size_t *siglen) 107 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); 109 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); 114 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); 128 r = ctx->pctx->pmeth->signctx(ctx->pctx, sigret, siglen, ctx); 141 sigret, siglen, tmp_ctx); 148 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 152 if (pctx->pmeth->signctx(pctx, sigret, siglen, ctx) <= 0) 156 if (s < 0 || EVP_PKEY_sign(pctx, sigret, siglen, NULL, s) <= 0) 163 int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, [all...] |
| p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey) 26 *siglen = 0; 56 *siglen = sltmp;
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecdsa_sign.c | 35 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) 37 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 41 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 45 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecdsa_sign.c | 36 *sig, unsigned int *siglen, EC_KEY *eckey) 38 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 42 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ecdsa_sign.c | 30 *sig, unsigned int *siglen, EC_KEY *eckey) 32 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 36 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, 40 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey);
|
| /src/external/mpl/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 25 uint16_t siglen; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 31 uint16_t siglen; member in struct:dns_rdata_rrsig
|
| sig_24.h | 32 uint16_t siglen; member in struct:dns_rdata_sig_t
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 26 uint16_t siglen; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 32 uint16_t siglen; member in struct:dns_rdata_rrsig
|
| sig_24.h | 33 uint16_t siglen; member in struct:dns_rdata_sig_t
|
| /src/lib/libresolv/ |
| ns_sign.c | 73 *\li siglen input - length of signature buffer 83 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 87 querysig, querysiglen, sig, siglen, 93 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 106 if (msg == NULL || msglen == NULL || sig == NULL || siglen == NULL) 219 sig, *siglen); 222 *siglen = nn; 224 *siglen = 0; 227 BOUNDS_CHECK(cp, INT16SZ + (*siglen)); 228 PUTSHORT(*siglen, cp) [all...] |
| /src/external/bsd/libbind/dist/nameser/ |
| ns_sign.c | 71 *\li siglen input - length of signature buffer 81 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 85 querysig, querysiglen, sig, siglen, 91 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 104 if (msg == NULL || msglen == NULL || sig == NULL || siglen == NULL) 216 sig, *siglen); 219 *siglen = n; 221 *siglen = 0; 224 BOUNDS_CHECK(cp, INT16SZ + (*siglen)); 225 PUTSHORT(*siglen, cp) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pem/ |
| pem_sign.c | 29 unsigned int *siglen, EVP_PKEY *pkey) 43 *siglen = i;
|
| /src/crypto/external/bsd/openssl/dist/crypto/pem/ |
| pem_sign.c | 29 unsigned int *siglen, EVP_PKEY *pkey) 45 *siglen = i;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pem/ |
| pem_sign.c | 28 unsigned int *siglen, EVP_PKEY *pkey) 44 *siglen = i;
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 61 my $siglen = unpack('n', substr($remdata, 0, 2)); 64 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 67 print " Signature Len:".$siglen."\n";
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 52 my $siglen = unpack('n', substr($remdata, 0, 2)); 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n";
|