Home
last modified time | relevance | path

Searched refs:siglen (Results 1 – 25 of 70) sorted by relevance

123

/third_party/openssl/crypto/evp/
Dm_sigver.c101 size_t *siglen) in EVP_DigestSignFinal() argument
107 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal()
109 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal()
114 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); in EVP_DigestSignFinal()
128 r = ctx->pctx->pmeth->signctx(ctx->pctx, sigret, siglen, ctx); in EVP_DigestSignFinal()
141 sigret, siglen, tmp_ctx); in EVP_DigestSignFinal()
148 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) in EVP_DigestSignFinal()
152 if (pctx->pmeth->signctx(pctx, sigret, siglen, ctx) <= 0) in EVP_DigestSignFinal()
156 if (s < 0 || EVP_PKEY_sign(pctx, sigret, siglen, NULL, s) <= 0) in EVP_DigestSignFinal()
163 int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, in EVP_DigestSign() argument
[all …]
Dpmeth_fn.c53 unsigned char *sig, size_t *siglen, in EVP_PKEY_sign() argument
65 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) in EVP_PKEY_sign()
66 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
87 const unsigned char *sig, size_t siglen, in EVP_PKEY_verify() argument
99 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
121 const unsigned char *sig, size_t siglen) in EVP_PKEY_verify_recover() argument
133 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); in EVP_PKEY_verify_recover()
Dp_sign.c18 unsigned int *siglen, EVP_PKEY *pkey) in EVP_SignFinal() argument
26 *siglen = 0; in EVP_SignFinal()
56 *siglen = sltmp; in EVP_SignFinal()
Dpmeth_lib.c540 unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_sign() argument
552 size_t siglen, in EVP_PKEY_meth_set_verify() argument
567 size_t *siglen, in EVP_PKEY_meth_set_verify_recover() argument
581 size_t *siglen, in EVP_PKEY_meth_set_signctx() argument
593 int siglen, in EVP_PKEY_meth_set_verifyctx() argument
646 int (*digestsign) (EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_digestsign() argument
654 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument
729 unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_get_sign() argument
743 size_t siglen, in EVP_PKEY_meth_get_verify() argument
760 size_t *siglen, in EVP_PKEY_meth_get_verify_recover() argument
[all …]
/third_party/ffmpeg/tests/
Daudiomatch.c40 int siglen, datlen; in main() local
80 siglen = fsize(f[1]) - ftell(f[1]); in main()
82 signal = malloc(siglen * sizeof(*signal)); in main()
86 if (fread(signal, 1, siglen, f[1]) != siglen) in main()
89 siglen /= 2; in main()
91 for (i = 0; i < siglen; i++) { in main()
100 int testlen = FFMIN(siglen, datlen-pos); in main()
112 … postsig:%d c:%7.4f lenerr:%d\n", bestpos, datlen - siglen - bestpos, bestc / sigamp, datlen - sig… in main()
/third_party/openssl/crypto/rsa/
Drsa_sign.c70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument
77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign()
108 *siglen = encrypt_len; in RSA_sign()
126 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in int_rsa_verify() argument
131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify()
137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify()
143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify()
235 OPENSSL_clear_free(decrypt_buf, siglen); in int_rsa_verify()
240 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument
244 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify()
[all …]
Drsa_saos.c19 unsigned char *sigret, unsigned int *siglen, in RSA_sign_ASN1_OCTET_STRING() argument
48 *siglen = i; in RSA_sign_ASN1_OCTET_STRING()
57 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING() argument
64 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
70 s = OPENSSL_malloc((unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING()
75 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
93 OPENSSL_clear_free(s, (unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING()
Drsa_pmeth.c125 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument
187 *siglen = ret; in pkey_rsa_sign()
193 const unsigned char *sig, size_t siglen) in pkey_rsa_verifyrecover() argument
202 ret = RSA_public_decrypt(siglen, sig, in pkey_rsa_verifyrecover()
224 sig, siglen, ctx->pkey->pkey.rsa); in pkey_rsa_verifyrecover()
232 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, in pkey_rsa_verifyrecover()
242 const unsigned char *sig, size_t siglen, in pkey_rsa_verify() argument
252 sig, siglen, rsa); in pkey_rsa_verify()
258 if (pkey_rsa_verifyrecover(ctx, NULL, &rslen, sig, siglen) <= 0) in pkey_rsa_verify()
264 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, in pkey_rsa_verify()
[all …]
Drsa_local.h99 unsigned char *sigret, unsigned int *siglen,
103 unsigned int siglen, const RSA *rsa);
118 size_t siglen, RSA *rsa);
/third_party/openssl/doc/man3/
DEVP_PKEY_sign.pod13 unsigned char *sig, size_t *siglen,
24 buffer is written to the B<siglen> parameter. If B<sig> is not B<NULL> then
25 before the call the B<siglen> parameter should contain the length of the
27 B<sig> and the amount of data written to B<siglen>.
59 size_t mdlen = 32, siglen;
78 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0)
81 sig = OPENSSL_malloc(siglen);
86 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0)
89 /* Signature is siglen bytes written to buffer sig */
DEVP_PKEY_meth_new.pod59 unsigned char *sig, size_t *siglen,
66 size_t siglen,
76 size_t *siglen,
85 size_t *siglen,
92 int siglen,
122 size_t *siglen,
128 size_t siglen,
159 unsigned char *sig, size_t *siglen,
166 size_t siglen,
176 size_t *siglen,
[all …]
DEVP_PKEY_verify_recover.pod14 const unsigned char *sig, size_t siglen);
23 B<siglen> parameters. If B<rout> is B<NULL> then the maximum size of the output
61 size_t routlen, siglen;
65 * NB: assumes verify_key, sig and siglen are already set up
79 if (EVP_PKEY_verify_recover(ctx, NULL, &routlen, sig, siglen) <= 0)
87 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0)
DEVP_PKEY_verify.pod13 const unsigned char *sig, size_t siglen,
23 B<siglen> parameters. The verified data (i.e. the data believed originally
56 size_t mdlen, siglen;
60 * NB: assumes verify_key, sig, siglen md and mdlen are already set up
74 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
DRSA_sign_ASN1_OCTET_STRING.pod13 unsigned int *siglen, RSA *rsa);
17 unsigned int siglen, RSA *rsa);
24 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
35 of size B<siglen> is the DER representation of a given octet string
DRSA_sign.pod12 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
15 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
21 stores the signature in B<sigret> and the signature size in B<siglen>.
34 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
DDSA_sign.pod12 unsigned char *sigret, unsigned int *siglen, DSA *dsa);
17 unsigned char *sigbuf, int siglen, DSA *dsa);
24 *B<siglen>. B<sigret> must point to DSA_size(B<dsa>) bytes of memory.
33 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
/third_party/openssl/crypto/dsa/
Ddsa_asn1.c111 unsigned char *sig, unsigned int *siglen, DSA *dsa) in DSA_sign() argument
117 *siglen = 0; in DSA_sign()
120 *siglen = i2d_DSA_SIG(s, &sig); in DSA_sign()
133 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument
144 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) in DSA_verify()
148 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
/third_party/openssl/crypto/ec/
Decdsa_sign.c30 *sig, unsigned int *siglen, EC_KEY *eckey) in ECDSA_sign() argument
32 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign()
36 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, in ECDSA_sign_ex() argument
40 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
Decx_meth.c739 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign25519() argument
745 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519()
748 if (*siglen < ED25519_SIGSIZE) { in pkey_ecd_digestsign25519()
755 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519()
760 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument
766 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448()
769 if (*siglen < ED448_SIGSIZE) { in pkey_ecd_digestsign448()
777 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448()
782 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify25519() argument
787 if (siglen != ED25519_SIGSIZE) in pkey_ecd_digestverify25519()
[all …]
/third_party/openssl/apps/
Ddgst.c28 EVP_PKEY *key, unsigned char *sigin, int siglen,
98 int separator = 0, debug = 0, keyform = FORMAT_PEM, siglen = 0; in dgst_main() local
369 siglen = EVP_PKEY_size(sigkey); in dgst_main()
370 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main()
371 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main()
373 if (siglen <= 0) { in dgst_main()
390 siglen, NULL, NULL, "stdin"); in dgst_main()
413 siglen, sig_name, md_name, argv[i]); in dgst_main()
500 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() argument
521 i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen); in do_fp()
/third_party/openssl/util/perl/TLSProxy/
DCertificateVerify.pm52 my $siglen = unpack('n', substr($remdata, 0, 2));
55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen;
58 print " Signature Len:".$siglen."\n";
/third_party/openssl/crypto/sm2/
Dsm2_pmeth.c88 static int pkey_sm2_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, in pkey_sm2_sign() argument
101 *siglen = (size_t)sig_sz; in pkey_sm2_sign()
105 if (*siglen < (size_t)sig_sz) { in pkey_sm2_sign()
114 *siglen = (size_t)sltmp; in pkey_sm2_sign()
119 const unsigned char *sig, size_t siglen, in pkey_sm2_verify() argument
124 return sm2_verify(tbs, tbslen, sig, siglen, ec); in pkey_sm2_verify()
/third_party/openssl/test/
Ddsatest.c74 unsigned int siglen; in dsa_test() local
108 DSA_sign(0, str1, 20, sig, &siglen, dsa); in dsa_test()
109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa))) in dsa_test()
/third_party/openssl/crypto/cms/
Dcms_sd.c599 size_t siglen; in cms_SignerInfo_content_sign() local
605 siglen = EVP_PKEY_size(si->pkey); in cms_SignerInfo_content_sign()
606 sig = OPENSSL_malloc(siglen); in cms_SignerInfo_content_sign()
611 if (EVP_PKEY_sign(pctx, sig, &siglen, md, mdlen) <= 0) { in cms_SignerInfo_content_sign()
615 ASN1_STRING_set0(si->signature, sig, siglen); in cms_SignerInfo_content_sign()
618 unsigned int siglen; in cms_SignerInfo_content_sign() local
624 if (!EVP_SignFinal(mctx, sig, &siglen, si->pkey)) { in cms_SignerInfo_content_sign()
629 ASN1_STRING_set0(si->signature, sig, siglen); in cms_SignerInfo_content_sign()
662 size_t siglen; in CMS_SignerInfo_sign() local
698 if (EVP_DigestSignFinal(mctx, NULL, &siglen) <= 0) in CMS_SignerInfo_sign()
[all …]
/third_party/openssl/crypto/ct/
Dct_oct.c26 size_t siglen; in o2i_SCT_signature() local
55 n2s(p, siglen); in o2i_SCT_signature()
57 if (siglen > len_remaining) { in o2i_SCT_signature()
62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature()
64 len_remaining -= siglen; in o2i_SCT_signature()
65 *in = p + siglen; in o2i_SCT_signature()

123