Home
last modified time | relevance | path

Searched refs:sigLen (Results 76 – 100 of 572) sorted by relevance

12345678910>>...23

/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/openssl/
H A Drsa.h124 unsigned int* sigLen, WOLFSSL_RSA*);
127 unsigned int* sigLen, WOLFSSL_RSA*, int);
130 unsigned int* sigLen, WOLFSSL_RSA*, int, int);
133 unsigned int sigLen, WOLFSSL_RSA*);
136 unsigned int sigLen, WOLFSSL_RSA* rsa,
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/openssl/
H A Drsa.h124 unsigned int* sigLen, WOLFSSL_RSA*);
127 unsigned int* sigLen, WOLFSSL_RSA*, int);
130 unsigned int* sigLen, WOLFSSL_RSA*, int, int);
133 unsigned int sigLen, WOLFSSL_RSA*);
136 unsigned int sigLen, WOLFSSL_RSA* rsa,
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/cryptohi/
H A Dsecvfy.c170 unsigned int sigLen = SECKEY_SignatureLen(pubk);
171 if (sigLen == 0) {
173 return sigLen;
191 if (sigLen > maxSigLen) {
195 return sigLen;
467 unsigned int sigLen;
508 sigLen = checkedSignatureLen(key);
510 if (sigLen == 0) {
515 if (sigLen > sizeof(cx->u)) {
522 if (sig->len != sigLen) {
[all …]
/dports/www/firefox/firefox-99.0/security/nss/lib/cryptohi/
H A Dsecvfy.c170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local
171 if (sigLen == 0) { in checkedSignatureLen()
173 return sigLen; in checkedSignatureLen()
191 if (sigLen > maxSigLen) { in checkedSignatureLen()
195 return sigLen; in checkedSignatureLen()
467 unsigned int sigLen; in vfy_CreateContext() local
508 sigLen = checkedSignatureLen(key); in vfy_CreateContext()
510 if (sigLen == 0) { in vfy_CreateContext()
515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext()
522 if (sig->len != sigLen) { in vfy_CreateContext()
[all …]
/dports/security/nss/nss-3.76.1/nss/lib/cryptohi/
H A Dsecvfy.c170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local
171 if (sigLen == 0) { in checkedSignatureLen()
173 return sigLen; in checkedSignatureLen()
191 if (sigLen > maxSigLen) { in checkedSignatureLen()
195 return sigLen; in checkedSignatureLen()
467 unsigned int sigLen; in vfy_CreateContext() local
508 sigLen = checkedSignatureLen(key); in vfy_CreateContext()
510 if (sigLen == 0) { in vfy_CreateContext()
515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext()
522 if (sig->len != sigLen) { in vfy_CreateContext()
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/cryptohi/
H A Dsecvfy.c170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local
171 if (sigLen == 0) { in checkedSignatureLen()
173 return sigLen; in checkedSignatureLen()
191 if (sigLen > maxSigLen) { in checkedSignatureLen()
195 return sigLen; in checkedSignatureLen()
467 unsigned int sigLen; in vfy_CreateContext() local
508 sigLen = checkedSignatureLen(key); in vfy_CreateContext()
510 if (sigLen == 0) { in vfy_CreateContext()
515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext()
522 if (sig->len != sigLen) { in vfy_CreateContext()
[all …]
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/net-p2p/bitmark/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/btcsuite/btcd/txscript/
H A Dengine.go676 sigLen := len(sig)
677 if sigLen < minSigLen {
678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen,
682 if sigLen > maxSigLen {
683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen,
697 if int(sig[dataLenOffset]) != sigLen-2 {
699 sig[dataLenOffset], sigLen-2)
717 if sTypeOffset >= sigLen {
721 if sLenOffset >= sigLen {
732 if sOffset+sLen != sigLen {
/dports/graphics/dcmtk/dcmtk-DCMTK-3.6.6/dcmsign/libsrc/
H A Dsiecdsa.cc83 unsigned int sigLen = 0; in sign() local
84 … = ECDSA_sign(openSSLmac, inputHash, (unsigned int)inputHashSize, outputSignature, &sigLen, ecdsa); in sign()
85 outputSignatureSize = sigLen; in sign()
/dports/security/cryptlib/cryptlib-3.4.3/mechs/
H A Dmech_sig.c310 IN_BUFFER( sigLen ) const void *signature, in checkRecoveredSignature()
311 IN_LENGTH_PKC const int sigLen ) in checkRecoveredSignature() argument
317 assert( isReadPtr( signature, sigLen ) ); in checkRecoveredSignature()
320 REQUIRES( sigLen >= MIN_PKCSIZE && sigLen <= CRYPT_MAX_PKCSIZE ); in checkRecoveredSignature()
324 memcpy( recoveredSignature, signature, sigLen ); in checkRecoveredSignature()
326 recoveredSignature, sigLen ); in checkRecoveredSignature()
337 if( sigDataLen != sigLen || \ in checkRecoveredSignature()
338 !compareDataConstTime( sigData, recoveredSignature, sigLen ) ) in checkRecoveredSignature()
/dports/graphics/libzmf/libzmf-0.0.2/src/lib/
H A DBMIHeader.cpp36 unsigned sigLen = 9; in load() local
37 m_signature.assign(reinterpret_cast<const char *>(readNBytes(input, sigLen)), sigLen); in load()
/dports/sysutils/nix/nix-2.3.10/src/libstore/
H A Dcrypto.cc52 unsigned long long sigLen; in signDetached() local
53 crypto_sign_detached(sig, &sigLen, (unsigned char *) data.data(), data.size(), in signDetached()
55 return name + ":" + base64Encode(std::string((char *) sig, sigLen)); in signDetached()
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/port/kcapi/
H A Dkcapi_ecc.h46 word32* sigLen);
48 word32 sigLen);
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/
H A Dkcapi_ecc.h46 word32* sigLen);
48 word32 sigLen);
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/
H A Dkcapi_ecc.h46 word32* sigLen);
48 word32 sigLen);
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/
H A Dkcapi_ecc.h46 word32* sigLen);
48 word32 sigLen);
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/
H A Dkcapi_ecc.h46 word32* sigLen);
48 word32 sigLen);
/dports/security/yafic/yafic-1.2.2/
H A Dcrypto.c130 unsigned int sigLen; in SignFile() local
179 if (EVP_SignFinal (ctx, sig, &sigLen, pkey)) { in SignFile()
181 if (write (f, sig, sigLen) != sigLen) in SignFile()
/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/
H A DOSSLRSA.cpp113 if (sigLen == -1) in sign()
120 signature.resize(sigLen); in sign()
215 …int sigLen = RSA_private_encrypt(osslKey->getN().size(), &em[0], &signature[0], rsa, RSA_NO_PADDIN… in sign() local
219 if (sigLen == -1) in sign()
226 signature.resize(sigLen); in sign()
268 if (sigLen == -1) in sign()
275 signature.resize(sigLen); in sign()
611 unsigned int sigLen = signature.size(); in signFinal() local
643 sigLen = result; in signFinal()
656 &sigLen, pk->getOSSLKey()); in signFinal()
[all …]
/dports/graphics/libpgf/PGF/Codec/src/
H A DEncoder.cpp484 UINT32 sigLen, codeLen = 0, wordPos, refLen, signLen; in BitplaneEncode() local
527sigLen = DecomposeBitplane(bufferSize, planeMask, m_codePos + RLblockSizeLen + 1, sigBits, refBits… in BitplaneEncode()
529 …if (sigLen > 0 && codeLen <= MaxCodeLen && codeLen < AlignWordPos(sigLen) + AlignWordPos(signLen) … in BitplaneEncode()
553 ASSERT(sigLen <= MaxCodeLen); in BitplaneEncode()
554 SetValueBlock(m_codeBuffer, m_codePos, sigLen, RLblockSizeLen); in BitplaneEncode()
601 refLen = NumberOfWords(sigLen); in BitplaneEncode()
613 refLen = NumberOfWords(bufferSize - sigLen); in BitplaneEncode()
/dports/print/scribus-devel/scribus-1.5.7/scribus/third_party/pgf/
H A DEncoder.cpp484 UINT32 sigLen, codeLen = 0, wordPos, refLen, signLen; in BitplaneEncode() local
527sigLen = DecomposeBitplane(bufferSize, planeMask, m_codePos + RLblockSizeLen + 1, sigBits, refBits… in BitplaneEncode()
529 …if (sigLen > 0 && codeLen <= MaxCodeLen && codeLen < AlignWordPos(sigLen) + AlignWordPos(signLen) … in BitplaneEncode()
553 ASSERT(sigLen <= MaxCodeLen); in BitplaneEncode()
554 SetValueBlock(m_codeBuffer, m_codePos, sigLen, RLblockSizeLen); in BitplaneEncode()
601 refLen = NumberOfWords(sigLen); in BitplaneEncode()
613 refLen = NumberOfWords(bufferSize - sigLen); in BitplaneEncode()

12345678910>>...23