/third_party/openssl/crypto/ec/ |
D | ecdsa_sign.c | 14 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) in ECDSA_do_sign() argument 16 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); in ECDSA_do_sign() 19 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, in ECDSA_do_sign_ex() argument 24 return eckey->meth->sign_sig(dgst, dlen, kinv, rp, eckey); in ECDSA_do_sign_ex() 29 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char in ECDSA_sign() argument 32 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign() 35 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, in ECDSA_sign_ex() argument 40 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
D | ecdsa_vrf.c | 20 int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, in ECDSA_do_verify() argument 24 return eckey->meth->verify_sig(dgst, dgst_len, sig, eckey); in ECDSA_do_verify() 35 int ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, in ECDSA_verify() argument 39 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
D | ecdsa_ossl.c | 17 int ossl_ecdsa_sign(int type, const unsigned char *dgst, int dlen, in ossl_ecdsa_sign() argument 23 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); in ossl_ecdsa_sign() 35 const unsigned char *dgst, int dlen) in ecdsa_sign_setup() argument 90 if (dgst != NULL) { in ecdsa_sign_setup() 92 dgst, dlen, ctx)) { in ecdsa_sign_setup() 154 ECDSA_SIG *ossl_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len, in ossl_ecdsa_sign_sig() argument 209 if (!BN_bin2bn(dgst, dgst_len, m)) { in ossl_ecdsa_sign_sig() 220 if (!ecdsa_sign_setup(eckey, ctx, &kinv, &ret->r, dgst, dgst_len)) { in ossl_ecdsa_sign_sig() 292 int ossl_ecdsa_verify(int type, const unsigned char *dgst, int dgst_len, in ossl_ecdsa_verify() argument 310 ret = ECDSA_do_verify(dgst, dgst_len, s, eckey); in ossl_ecdsa_verify() [all …]
|
D | ec_kmeth.c | 207 int (*sign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_set_sign() argument 214 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, in EC_KEY_METHOD_set_sign() argument 227 char *dgst, int dgst_len, in EC_KEY_METHOD_set_verify() argument 230 int (*verify_sig)(const unsigned char *dgst, in EC_KEY_METHOD_set_verify() argument 282 int (**psign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_get_sign() argument 289 ECDSA_SIG *(**psign_sig)(const unsigned char *dgst, in EC_KEY_METHOD_get_sign() argument 305 char *dgst, int dgst_len, in EC_KEY_METHOD_get_verify() argument 308 int (**pverify_sig)(const unsigned char *dgst, in EC_KEY_METHOD_get_verify() argument
|
D | ec_local.h | 616 int (*sign)(int type, const unsigned char *dgst, int dlen, unsigned char 621 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, int dgst_len, 625 int (*verify)(int type, const unsigned char *dgst, int dgst_len, 627 int (*verify_sig)(const unsigned char *dgst, int dgst_len, 646 int ossl_ecdsa_sign(int type, const unsigned char *dgst, int dlen, 649 ECDSA_SIG *ossl_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len, 652 int ossl_ecdsa_verify(int type, const unsigned char *dgst, int dgst_len, 654 int ossl_ecdsa_verify_sig(const unsigned char *dgst, int dgst_len,
|
/third_party/openssl/crypto/ocsp/ |
D | ocsp_lib.c | 22 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, in OCSP_cert_to_id() argument 28 if (!dgst) in OCSP_cert_to_id() 29 dgst = EVP_sha1(); in OCSP_cert_to_id() 38 return OCSP_cert_id_new(dgst, iname, ikey, serial); in OCSP_cert_to_id() 41 OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, in OCSP_cert_id_new() argument 57 if ((nid = EVP_MD_type(dgst)) == NID_undef) { in OCSP_cert_id_new() 67 if (!X509_NAME_digest(issuerName, dgst, md, &i)) in OCSP_cert_id_new() 73 if (!EVP_Digest(issuerKey->data, issuerKey->length, md, &i, dgst, NULL)) in OCSP_cert_id_new()
|
D | ocsp_vfy.c | 281 const EVP_MD *dgst; in ocsp_match_issuerid() local 285 if ((dgst = EVP_get_digestbyobj(cid->hashAlgorithm.algorithm)) in ocsp_match_issuerid() 292 mdlen = EVP_MD_size(dgst); in ocsp_match_issuerid() 299 if (!X509_NAME_digest(iname, dgst, md, NULL)) in ocsp_match_issuerid() 303 X509_pubkey_digest(cert, dgst, md, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_ossl.c | 18 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 22 BIGNUM **rp, const unsigned char *dgst, int dlen); 23 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, 62 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) in dsa_do_sign() argument 99 if (!dsa_sign_setup(dsa, ctx, &kinv, &ret->r, dgst, dlen)) in dsa_do_sign() 109 if (BN_bin2bn(dgst, dlen, m) == NULL) in dsa_do_sign() 184 const unsigned char *dgst, int dlen) in dsa_sign_setup() argument 227 if (dgst != NULL) { in dsa_sign_setup() 232 if (!BN_generate_dsa_nonce(k, dsa->q, dsa->priv_key, dgst, in dsa_sign_setup() 299 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, in dsa_do_verify() argument [all …]
|
D | dsa_asn1.c | 110 int DSA_sign(int type, const unsigned char *dgst, int dlen, in DSA_sign() argument 115 s = DSA_do_sign(dgst, dlen, dsa); in DSA_sign() 132 int DSA_verify(int type, const unsigned char *dgst, int dgst_len, in DSA_verify() argument 150 ret = DSA_do_verify(dgst, dgst_len, s, dsa); in DSA_verify()
|
D | dsa_vrf.c | 13 int DSA_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, in DSA_do_verify() argument 16 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa); in DSA_do_verify()
|
D | dsa_sign.c | 14 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) in DSA_do_sign() argument 16 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); in DSA_do_sign()
|
D | dsa_local.h | 43 DSA_SIG *(*dsa_do_sign) (const unsigned char *dgst, int dlen, DSA *dsa); 46 int (*dsa_do_verify) (const unsigned char *dgst, int dgst_len,
|
/third_party/openssl/doc/man3/ |
D | DSA_do_sign.pod | 11 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 13 int DSA_do_verify(const unsigned char *dgst, int dgst_len, 19 digest B<dgst> using the private key B<dsa> and returns it in a 27 message digest B<dgst> of size B<len>. B<dsa> is the signer's public
|
D | OCSP_cert_to_id.pod | 12 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, 15 OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, 33 message digest B<dgst> for certificate B<subject> with issuer B<issuer>. If 34 B<dgst> is B<NULL> then SHA1 is used. 36 OCSP_cert_id_new() creates and returns a new B<OCSP_CERTID> using B<dgst> and
|
D | ECDSA_SIG_new.pod | 23 int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, 25 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dgst_len, 28 int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen, 30 int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, 33 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen, 37 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen, 76 B<dgst> using the private EC key B<eckey>. The DER encoded signatures is 88 valid ECDSA signature of the hash value B<dgst> of size B<dgstlen> using the 105 B<dgst> using the private EC key B<eckey> and the optional pre-computed values 167 if (ECDSA_sign(0, dgst, dgstlen, pp, &buf_len, eckey) == 0)
|
D | DSA_sign.pod | 11 int DSA_sign(int type, const unsigned char *dgst, int len, 16 int DSA_verify(int type, const unsigned char *dgst, int len, 22 digest B<dgst> using the private key B<dsa> and places its ASN.1 DER 34 matches a given message digest B<dgst> of size B<len>.
|
/third_party/openssl/include/openssl/ |
D | ec.h | 1191 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dgst_len, 1204 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen, 1217 int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, 1239 int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, 1255 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen, 1270 int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen, 1305 int (*sign)(int type, const unsigned char *dgst, 1312 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, 1320 char *dgst, int dgst_len, 1323 int (*verify_sig)(const unsigned char *dgst, [all …]
|
D | dsa.h | 82 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 83 int DSA_do_verify(const unsigned char *dgst, int dgst_len, 103 int DSA_sign(int type, const unsigned char *dgst, int dlen, 105 int DSA_verify(int type, const unsigned char *dgst, int dgst_len,
|
D | ocsp.h | 169 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, 172 OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, 190 const EVP_MD *dgst, 251 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/third_party/openssl/doc/man1/ |
D | dgst.pod | 5 openssl-dgst, 6 dgst - perform digest operations 10 B<openssl dgst> 42 The generic name, B<dgst>, may be used with an option specifying the 200 openssl dgst -md5 -hex file.txt 203 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt 206 openssl dgst -sha256 -verify publickey.pem \ 221 When signing a file, B<dgst> will automatically determine the algorithm
|
/third_party/openssl/crypto/pkcs7/ |
D | pk7_lib.c | 304 const EVP_MD *dgst) in PKCS7_SIGNER_INFO_set() argument 330 X509_ALGOR_set0(p7i->digest_alg, OBJ_nid2obj(EVP_MD_type(dgst)), in PKCS7_SIGNER_INFO_set() 350 const EVP_MD *dgst) in PKCS7_add_signature() argument 354 if (dgst == NULL) { in PKCS7_add_signature() 358 dgst = EVP_get_digestbynid(def_nid); in PKCS7_add_signature() 359 if (dgst == NULL) { in PKCS7_add_signature() 367 if (!PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst)) in PKCS7_add_signature()
|
/third_party/openssl/include/crypto/ |
D | sm2.h | 48 int sm2_sign(const unsigned char *dgst, int dgstlen, 54 int sm2_verify(const unsigned char *dgst, int dgstlen,
|
/third_party/openssl/apps/ |
D | enc.c | 101 const EVP_MD *dgst = NULL; in enc_main() local 255 if (!opt_md(opt_arg(), &dgst)) in enc_main() 297 if (dgst == NULL) in enc_main() 298 dgst = EVP_sha256(); in enc_main() 474 iter, dgst, iklen+ivlen, tmpkeyiv)) { in enc_main() 485 if (!EVP_BytesToKey(cipher, dgst, sptr, in enc_main()
|
D | ca.c | 92 const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, 101 const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, 109 X509 *x509, const EVP_MD *dgst, 118 const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, 239 const EVP_MD *dgst = NULL; in ca_main() local 738 dgst = EVP_md_null(); in ca_main() 751 if (!opt_md(md, &dgst)) in ca_main() 765 OBJ_nid2ln(EVP_MD_type(dgst))); in ca_main() 872 j = certify_spkac(&x, spkac_file, pkey, x509, dgst, sigopts, in ca_main() 892 j = certify_cert(&x, ss_cert_file, pkey, x509, dgst, sigopts, in ca_main() [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_oaep.c | 274 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument 285 mdlen = EVP_MD_size(dgst); in PKCS1_MGF1() 293 if (!EVP_DigestInit_ex(c, dgst, NULL) in PKCS1_MGF1()
|