| /src/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_verify_recover.pod | 19 unsigned char *rout, size_t *routlen, 44 I<siglen> parameters. If I<rout> is NULL then the maximum size of the output 45 buffer is written to the I<routlen> parameter. If I<rout> is not NULL then 47 I<rout> buffer, if the call is successful recovered data is written to 48 I<rout> and the amount of data written to I<routlen>. 85 unsigned char *rout, *sig; 107 rout = OPENSSL_malloc(routlen); 109 if (!rout) 112 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0) 115 /* Recovered data is routlen bytes written to buffer rout */
|
| H A D | EVP_PKEY_meth_new.pod | 310 unsigned char *rout, size_t *routlen,
|
| /src/sys/contrib/ck/include/ |
| H A D | ck_pflock.h | 43 uint32_t rout; member 62 pf->rout = 0; in ck_pflock_init() 103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock() 115 ck_pr_faa_32(&pf->rout, CK_PFLOCK_RINC); in ck_pflock_read_unlock()
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_pmeth.c | 212 unsigned char *rout, size_t *routlen, in pkey_rsa_verifyrecover() argument 241 if (rout) in pkey_rsa_verifyrecover() 242 memcpy(rout, rctx->tbuf, ret); in pkey_rsa_verifyrecover() 246 NULL, 0, rout, &sltmp, in pkey_rsa_verifyrecover() 255 ret = RSA_public_decrypt(siglen, sig, rout, rsa, rctx->pad_mode); in pkey_rsa_verifyrecover()
|
| /src/crypto/openssl/crypto/evp/ |
| H A D | signature.c | 1205 unsigned char *rout, size_t *routlen, in EVP_PKEY_verify_recover() argument 1233 ret = signature->verify_recover(ctx->op.sig.algctx, rout, routlen, in EVP_PKEY_verify_recover() 1234 (rout == NULL ? 0 : *routlen), sig, siglen); in EVP_PKEY_verify_recover() 1244 …M_check_autoarg(ctx, rout, routlen, EVP_F_EVP_PKEY_VERIFY_RECOVER) return ctx->pmeth->verify_recov… in EVP_PKEY_verify_recover()
|
| /src/crypto/openssl/providers/implementations/signature/ |
| H A D | rsa_sig.c | 929 unsigned char *rout, size_t *routlen, in rsa_verify_recover() argument 939 if (rout == NULL) { in rsa_verify_recover() 968 if (rout != prsactx->tbuf) { in rsa_verify_recover() 975 memcpy(rout, prsactx->tbuf, ret); in rsa_verify_recover() 982 ret = ossl_rsa_verify(prsactx->mdnid, NULL, 0, rout, &sltmp, in rsa_verify_recover() 997 ret = RSA_public_decrypt(siglen, sig, rout, prsactx->rsa, in rsa_verify_recover()
|
| /src/crypto/openssl/doc/man7/ |
| H A D | provider-signature.pod | 59 int OSSL_FUNC_signature_verify_recover(void *ctx, unsigned char *rout, 418 Unless I<rout> is NULL, the recovered data should be written to the location 419 pointed to by I<rout> which should not exceed I<routsize> bytes in length. 421 If I<rout> is NULL then the maximum size of the output buffer is written to
|
| /src/crypto/openssl/include/crypto/ |
| H A D | evp.h | 164 unsigned char *rout, size_t *routlen,
|
| /src/crypto/openssl/include/openssl/ |
| H A D | core_dispatch.h | 795 (void *ctx, unsigned char *rout, size_t *routlen,
|
| H A D | evp.h | 2011 unsigned char *rout, size_t *routlen,
|
| /src/sys/contrib/device-tree/src/arm64/rockchip/ |
| H A D | rk3568-pinctrl.dtsi | 58 audiopwm_rout: audiopwm-rout {
|
| /src/share/dict/ |
| H A D | web2a | 48438 rout cake 48439 rout chair 48446 rout seat
|
| H A D | web2 | 171353 rout
|