/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_verify_recover.pod | 17 unsigned char *rout, size_t *routlen, 34 I<siglen> parameters. If I<rout> is NULL then the maximum size of the output 35 buffer is written to the I<routlen> parameter. If I<rout> is not NULL then 37 I<rout> buffer, if the call is successful recovered data is written to 38 I<rout> and the amount of data written to I<routlen>. 71 unsigned char *rout, *sig; 93 rout = OPENSSL_malloc(routlen); 95 if (!rout) 98 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0) 101 /* Recovered data is routlen bytes written to buffer rout */
|
H A D | EVP_PKEY_meth_new.pod | 310 unsigned char *rout, size_t *routlen,
|
/freebsd/sys/contrib/ck/include/ |
H A D | ck_pflock.h | 43 uint32_t rout; member 62 pf->rout = 0; in ck_pflock_init() 103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock() 115 ck_pr_faa_32(&pf->rout, CK_PFLOCK_RINC); in ck_pflock_read_unlock()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | signature.c | 728 unsigned char *rout, size_t *routlen, in EVP_PKEY_verify_recover() 751 ret = ctx->op.sig.signature->verify_recover(ctx->op.sig.algctx, rout, 753 (rout == NULL ? 0 : *routlen), 761 M_check_autoarg(ctx, rout, routlen, EVP_F_EVP_PKEY_VERIFY_RECOVER) 762 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 718 EVP_PKEY_verify_recover(EVP_PKEY_CTX * ctx,unsigned char * rout,size_t * routlen,const unsigned char * sig,size_t siglen) EVP_PKEY_verify_recover() argument
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 204 unsigned char *rout, size_t *routlen, in pkey_rsa_verifyrecover() argument 233 if (rout) in pkey_rsa_verifyrecover() 234 memcpy(rout, rctx->tbuf, ret); in pkey_rsa_verifyrecover() 238 NULL, 0, rout, &sltmp, in pkey_rsa_verifyrecover() 247 ret = RSA_public_decrypt(siglen, sig, rout, rsa, rctx->pad_mode); in pkey_rsa_verifyrecover()
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 670 unsigned char *rout, in rsa_verify_recover() argument 682 if (rout == NULL) { in rsa_verify_recover() 711 if (rout != prsactx->tbuf) { in rsa_verify_recover() 718 memcpy(rout, prsactx->tbuf, ret); in rsa_verify_recover() 726 ret = ossl_rsa_verify(prsactx->mdnid, NULL, 0, rout, &sltmp, in rsa_verify_recover() 742 ret = RSA_public_decrypt(siglen, sig, rout, prsactx->rsa, in rsa_verify_recover()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 40 int OSSL_FUNC_signature_verify_recover(void *ctx, unsigned char *rout, 252 Unless I<rout> is NULL, the recovered data should be written to the location 253 pointed to by I<rout> which should not exceed I<routsize> bytes in length. 255 If I<rout> is NULL then the maximum size of the output buffer is written to
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | core_dispatch.h | 723 (void *ctx, unsigned char *rout, size_t *routlen,
|
H A D | evp.h | 1906 unsigned char *rout, size_t *routlen,
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | evp.h | 154 unsigned char *rout, size_t *routlen,
|
/freebsd/sys/contrib/device-tree/src/arm64/rockchip/ |
H A D | rk3568-pinctrl.dtsi | 58 audiopwm_rout: audiopwm-rout {
|
/freebsd/share/dict/ |
H A D | web2a | 48438 rout cake 48439 rout chair 48446 rout seat
|
H A D | web2 | 171353 rout
|