/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/openssl-src-111.9.0+1.1.1g/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.14.0+1.1.1j/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/www/websocat/websocat-1.9.0/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/lang/rust/rustc-1.58.1-src/vendor/openssl-src/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/openssl/openssl-1.1.1n/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/openssl-static/openssl-1.1.1l/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/sysutils/edk2/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; 137 decrypt_buf = OPENSSL_malloc(siglen); 138 if (decrypt_buf == NULL) { 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { 180 memcpy(rm, decrypt_buf + 2, 16); 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { 211 m = decrypt_buf + decrypt_len - m_len; 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { [all …]
|
/dports/sysutils/exa/exa-0.10.1/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; 137 decrypt_buf = OPENSSL_malloc(siglen); 138 if (decrypt_buf == NULL) { 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { 180 memcpy(rm, decrypt_buf + 2, 16); 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { 211 m = decrypt_buf + decrypt_len - m_len; 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { [all …]
|
/dports/www/node10/node-v10.24.1/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/emulators/qemu60/qemu-6.0.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 138 if (decrypt_buf == NULL) { in int_rsa_verify() 160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify() 168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify() 174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify() 180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify() 188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() [all …]
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 346 if (decrypt_buf == NULL) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify() 378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify() 384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify() 390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify() 398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() [all …]
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 346 if (decrypt_buf == NULL) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify() 378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify() 384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify() 390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify() 398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() [all …]
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 346 if (decrypt_buf == NULL) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify() 378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify() 384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify() 390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify() 398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() [all …]
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 346 if (decrypt_buf == NULL) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify() 378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify() 384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify() 390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify() 398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() [all …]
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/crypto/rsa/ |
H A D | rsa_sign.c | 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 346 if (decrypt_buf == NULL) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify() 378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify() 384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify() 390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify() 398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() [all …]
|