Home
last modified time | relevance | path

Searched refs:decrypt_buf (Results 1 – 25 of 64) sorted by relevance

123

/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/sysutils/vector/vector-0.10.0/cargo-crates/openssl-src-111.9.0+1.1.1g/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.14.0+1.1.1j/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/www/websocat/websocat-1.9.0/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/lang/rust/rustc-1.58.1-src/vendor/openssl-src/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/openssl/openssl-1.1.1n/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/openssl-static/openssl-1.1.1l/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/sysutils/edk2/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL;
137 decrypt_buf = OPENSSL_malloc(siglen);
138 if (decrypt_buf == NULL) {
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH);
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) {
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) {
180 memcpy(rm, decrypt_buf + 2, 16);
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) {
211 m = decrypt_buf + decrypt_len - m_len;
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) {
[all …]
/dports/sysutils/exa/exa-0.10.1/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL;
137 decrypt_buf = OPENSSL_malloc(siglen);
138 if (decrypt_buf == NULL) {
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH);
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) {
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) {
180 memcpy(rm, decrypt_buf + 2, 16);
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) {
211 m = decrypt_buf + decrypt_len - m_len;
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) {
[all …]
/dports/www/node10/node-v10.24.1/deps/openssl/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/emulators/qemu60/qemu-6.0.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/crypto/rsa/
H A Drsa_sign.c129 unsigned char *decrypt_buf = NULL, *encoded = NULL; in int_rsa_verify() local
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
138 if (decrypt_buf == NULL) { in int_rsa_verify()
160 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in int_rsa_verify()
168 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in int_rsa_verify()
174 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in int_rsa_verify()
180 memcpy(rm, decrypt_buf + 2, 16); in int_rsa_verify()
188 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
219 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
[all …]
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/
H A Drsa_sign.c337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify()
346 if (decrypt_buf == NULL) { in ossl_rsa_verify()
351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify()
370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify()
378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify()
384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify()
390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify()
398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify()
421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify()
[all …]
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/
H A Drsa_sign.c337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify()
346 if (decrypt_buf == NULL) { in ossl_rsa_verify()
351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify()
370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify()
378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify()
384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify()
390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify()
398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify()
421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify()
[all …]
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/
H A Drsa_sign.c337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify()
346 if (decrypt_buf == NULL) { in ossl_rsa_verify()
351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify()
370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify()
378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify()
384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify()
390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify()
398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify()
421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify()
[all …]
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/crypto/rsa/
H A Drsa_sign.c337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify()
346 if (decrypt_buf == NULL) { in ossl_rsa_verify()
351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify()
370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify()
378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify()
384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify()
390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify()
398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify()
421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify()
[all …]
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/crypto/rsa/
H A Drsa_sign.c337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify()
346 if (decrypt_buf == NULL) { in ossl_rsa_verify()
351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify()
370 memcpy(rm, decrypt_buf, SSL_SIG_LENGTH); in ossl_rsa_verify()
378 if (memcmp(decrypt_buf, m, SSL_SIG_LENGTH) != 0) { in ossl_rsa_verify()
384 && decrypt_buf[0] == 0x04 && decrypt_buf[1] == 0x10) { in ossl_rsa_verify()
390 memcpy(rm, decrypt_buf + 2, 16); in ossl_rsa_verify()
398 if (memcmp(m, decrypt_buf + 2, 16) != 0) { in ossl_rsa_verify()
421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify()
[all …]

123