/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/openssl/ |
H A D | rsa.h | 124 unsigned int* sigLen, WOLFSSL_RSA*); 127 unsigned int* sigLen, WOLFSSL_RSA*, int); 130 unsigned int* sigLen, WOLFSSL_RSA*, int, int); 133 unsigned int sigLen, WOLFSSL_RSA*); 136 unsigned int sigLen, WOLFSSL_RSA* rsa,
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/openssl/ |
H A D | rsa.h | 124 unsigned int* sigLen, WOLFSSL_RSA*); 127 unsigned int* sigLen, WOLFSSL_RSA*, int); 130 unsigned int* sigLen, WOLFSSL_RSA*, int, int); 133 unsigned int sigLen, WOLFSSL_RSA*); 136 unsigned int sigLen, WOLFSSL_RSA* rsa,
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/cryptohi/ |
H A D | secvfy.c | 170 unsigned int sigLen = SECKEY_SignatureLen(pubk); 171 if (sigLen == 0) { 173 return sigLen; 191 if (sigLen > maxSigLen) { 195 return sigLen; 467 unsigned int sigLen; 508 sigLen = checkedSignatureLen(key); 510 if (sigLen == 0) { 515 if (sigLen > sizeof(cx->u)) { 522 if (sig->len != sigLen) { [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/lib/cryptohi/ |
H A D | secvfy.c | 170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local 171 if (sigLen == 0) { in checkedSignatureLen() 173 return sigLen; in checkedSignatureLen() 191 if (sigLen > maxSigLen) { in checkedSignatureLen() 195 return sigLen; in checkedSignatureLen() 467 unsigned int sigLen; in vfy_CreateContext() local 508 sigLen = checkedSignatureLen(key); in vfy_CreateContext() 510 if (sigLen == 0) { in vfy_CreateContext() 515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext() 522 if (sig->len != sigLen) { in vfy_CreateContext() [all …]
|
/dports/security/nss/nss-3.76.1/nss/lib/cryptohi/ |
H A D | secvfy.c | 170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local 171 if (sigLen == 0) { in checkedSignatureLen() 173 return sigLen; in checkedSignatureLen() 191 if (sigLen > maxSigLen) { in checkedSignatureLen() 195 return sigLen; in checkedSignatureLen() 467 unsigned int sigLen; in vfy_CreateContext() local 508 sigLen = checkedSignatureLen(key); in vfy_CreateContext() 510 if (sigLen == 0) { in vfy_CreateContext() 515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext() 522 if (sig->len != sigLen) { in vfy_CreateContext() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/cryptohi/ |
H A D | secvfy.c | 170 unsigned int sigLen = SECKEY_SignatureLen(pubk); in checkedSignatureLen() local 171 if (sigLen == 0) { in checkedSignatureLen() 173 return sigLen; in checkedSignatureLen() 191 if (sigLen > maxSigLen) { in checkedSignatureLen() 195 return sigLen; in checkedSignatureLen() 467 unsigned int sigLen; in vfy_CreateContext() local 508 sigLen = checkedSignatureLen(key); in vfy_CreateContext() 510 if (sigLen == 0) { in vfy_CreateContext() 515 if (sigLen > sizeof(cx->u)) { in vfy_CreateContext() 522 if (sig->len != sigLen) { in vfy_CreateContext() [all …]
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/btcsuite/btcd/txscript/ |
H A D | engine.go | 676 sigLen := len(sig) 677 if sigLen < minSigLen { 678 str := fmt.Sprintf("malformed signature: too short: %d < %d", sigLen, 682 if sigLen > maxSigLen { 683 str := fmt.Sprintf("malformed signature: too long: %d > %d", sigLen, 697 if int(sig[dataLenOffset]) != sigLen-2 { 699 sig[dataLenOffset], sigLen-2) 717 if sTypeOffset >= sigLen { 721 if sLenOffset >= sigLen { 732 if sOffset+sLen != sigLen {
|
/dports/graphics/dcmtk/dcmtk-DCMTK-3.6.6/dcmsign/libsrc/ |
H A D | siecdsa.cc | 83 unsigned int sigLen = 0; in sign() local 84 … = ECDSA_sign(openSSLmac, inputHash, (unsigned int)inputHashSize, outputSignature, &sigLen, ecdsa); in sign() 85 outputSignatureSize = sigLen; in sign()
|
/dports/security/cryptlib/cryptlib-3.4.3/mechs/ |
H A D | mech_sig.c | 310 IN_BUFFER( sigLen ) const void *signature, in checkRecoveredSignature() 311 IN_LENGTH_PKC const int sigLen ) in checkRecoveredSignature() argument 317 assert( isReadPtr( signature, sigLen ) ); in checkRecoveredSignature() 320 REQUIRES( sigLen >= MIN_PKCSIZE && sigLen <= CRYPT_MAX_PKCSIZE ); in checkRecoveredSignature() 324 memcpy( recoveredSignature, signature, sigLen ); in checkRecoveredSignature() 326 recoveredSignature, sigLen ); in checkRecoveredSignature() 337 if( sigDataLen != sigLen || \ in checkRecoveredSignature() 338 !compareDataConstTime( sigData, recoveredSignature, sigLen ) ) in checkRecoveredSignature()
|
/dports/graphics/libzmf/libzmf-0.0.2/src/lib/ |
H A D | BMIHeader.cpp | 36 unsigned sigLen = 9; in load() local 37 m_signature.assign(reinterpret_cast<const char *>(readNBytes(input, sigLen)), sigLen); in load()
|
/dports/sysutils/nix/nix-2.3.10/src/libstore/ |
H A D | crypto.cc | 52 unsigned long long sigLen; in signDetached() local 53 crypto_sign_detached(sig, &sigLen, (unsigned char *) data.data(), data.size(), in signDetached() 55 return name + ":" + base64Encode(std::string((char *) sig, sigLen)); in signDetached()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/port/kcapi/ |
H A D | kcapi_ecc.h | 46 word32* sigLen); 48 word32 sigLen);
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/ |
H A D | kcapi_ecc.h | 46 word32* sigLen); 48 word32 sigLen);
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/ |
H A D | kcapi_ecc.h | 46 word32* sigLen); 48 word32 sigLen);
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/ |
H A D | kcapi_ecc.h | 46 word32* sigLen); 48 word32 sigLen);
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/port/kcapi/ |
H A D | kcapi_ecc.h | 46 word32* sigLen); 48 word32 sigLen);
|
/dports/security/yafic/yafic-1.2.2/ |
H A D | crypto.c | 130 unsigned int sigLen; in SignFile() local 179 if (EVP_SignFinal (ctx, sig, &sigLen, pkey)) { in SignFile() 181 if (write (f, sig, sigLen) != sigLen) in SignFile()
|
/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/ |
H A D | OSSLRSA.cpp | 113 if (sigLen == -1) in sign() 120 signature.resize(sigLen); in sign() 215 …int sigLen = RSA_private_encrypt(osslKey->getN().size(), &em[0], &signature[0], rsa, RSA_NO_PADDIN… in sign() local 219 if (sigLen == -1) in sign() 226 signature.resize(sigLen); in sign() 268 if (sigLen == -1) in sign() 275 signature.resize(sigLen); in sign() 611 unsigned int sigLen = signature.size(); in signFinal() local 643 sigLen = result; in signFinal() 656 &sigLen, pk->getOSSLKey()); in signFinal() [all …]
|
/dports/graphics/libpgf/PGF/Codec/src/ |
H A D | Encoder.cpp | 484 UINT32 sigLen, codeLen = 0, wordPos, refLen, signLen; in BitplaneEncode() local 527 …sigLen = DecomposeBitplane(bufferSize, planeMask, m_codePos + RLblockSizeLen + 1, sigBits, refBits… in BitplaneEncode() 529 …if (sigLen > 0 && codeLen <= MaxCodeLen && codeLen < AlignWordPos(sigLen) + AlignWordPos(signLen) … in BitplaneEncode() 553 ASSERT(sigLen <= MaxCodeLen); in BitplaneEncode() 554 SetValueBlock(m_codeBuffer, m_codePos, sigLen, RLblockSizeLen); in BitplaneEncode() 601 refLen = NumberOfWords(sigLen); in BitplaneEncode() 613 refLen = NumberOfWords(bufferSize - sigLen); in BitplaneEncode()
|
/dports/print/scribus-devel/scribus-1.5.7/scribus/third_party/pgf/ |
H A D | Encoder.cpp | 484 UINT32 sigLen, codeLen = 0, wordPos, refLen, signLen; in BitplaneEncode() local 527 …sigLen = DecomposeBitplane(bufferSize, planeMask, m_codePos + RLblockSizeLen + 1, sigBits, refBits… in BitplaneEncode() 529 …if (sigLen > 0 && codeLen <= MaxCodeLen && codeLen < AlignWordPos(sigLen) + AlignWordPos(signLen) … in BitplaneEncode() 553 ASSERT(sigLen <= MaxCodeLen); in BitplaneEncode() 554 SetValueBlock(m_codeBuffer, m_codePos, sigLen, RLblockSizeLen); in BitplaneEncode() 601 refLen = NumberOfWords(sigLen); in BitplaneEncode() 613 refLen = NumberOfWords(bufferSize - sigLen); in BitplaneEncode()
|