/third_party/openssl/crypto/evp/ |
D | m_sigver.c | 101 size_t *siglen) in EVP_DigestSignFinal() argument 107 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 109 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 114 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 128 r = ctx->pctx->pmeth->signctx(ctx->pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 141 sigret, siglen, tmp_ctx); in EVP_DigestSignFinal() 148 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) in EVP_DigestSignFinal() 152 if (pctx->pmeth->signctx(pctx, sigret, siglen, ctx) <= 0) in EVP_DigestSignFinal() 156 if (s < 0 || EVP_PKEY_sign(pctx, sigret, siglen, NULL, s) <= 0) in EVP_DigestSignFinal() 163 int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, in EVP_DigestSign() argument [all …]
|
D | pmeth_fn.c | 53 unsigned char *sig, size_t *siglen, in EVP_PKEY_sign() argument 65 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) in EVP_PKEY_sign() 66 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 87 const unsigned char *sig, size_t siglen, in EVP_PKEY_verify() argument 99 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify() 121 const unsigned char *sig, size_t siglen) in EVP_PKEY_verify_recover() argument 133 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); in EVP_PKEY_verify_recover()
|
D | p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey) in EVP_SignFinal() argument 26 *siglen = 0; in EVP_SignFinal() 56 *siglen = sltmp; in EVP_SignFinal()
|
D | pmeth_lib.c | 540 unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_sign() argument 552 size_t siglen, in EVP_PKEY_meth_set_verify() argument 567 size_t *siglen, in EVP_PKEY_meth_set_verify_recover() argument 581 size_t *siglen, in EVP_PKEY_meth_set_signctx() argument 593 int siglen, in EVP_PKEY_meth_set_verifyctx() argument 646 int (*digestsign) (EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_digestsign() argument 654 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument 729 unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_get_sign() argument 743 size_t siglen, in EVP_PKEY_meth_get_verify() argument 760 size_t *siglen, in EVP_PKEY_meth_get_verify_recover() argument [all …]
|
/third_party/ffmpeg/tests/ |
D | audiomatch.c | 40 int siglen, datlen; in main() local 80 siglen = fsize(f[1]) - ftell(f[1]); in main() 82 signal = malloc(siglen * sizeof(*signal)); in main() 86 if (fread(signal, 1, siglen, f[1]) != siglen) in main() 89 siglen /= 2; in main() 91 for (i = 0; i < siglen; i++) { in main() 100 int testlen = FFMIN(siglen, datlen-pos); in main() 112 … postsig:%d c:%7.4f lenerr:%d\n", bestpos, datlen - siglen - bestpos, bestc / sigamp, datlen - sig… in main()
|
/third_party/openssl/crypto/rsa/ |
D | rsa_sign.c | 70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() 108 *siglen = encrypt_len; in RSA_sign() 126 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in int_rsa_verify() argument 131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify() 137 decrypt_buf = OPENSSL_malloc(siglen); in int_rsa_verify() 143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify() 235 OPENSSL_clear_free(decrypt_buf, siglen); in int_rsa_verify() 240 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 244 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() [all …]
|
D | rsa_saos.c | 19 unsigned char *sigret, unsigned int *siglen, in RSA_sign_ASN1_OCTET_STRING() argument 48 *siglen = i; in RSA_sign_ASN1_OCTET_STRING() 57 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING() argument 64 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING() 70 s = OPENSSL_malloc((unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING() 75 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING() 93 OPENSSL_clear_free(s, (unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING()
|
D | rsa_pmeth.c | 125 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument 187 *siglen = ret; in pkey_rsa_sign() 193 const unsigned char *sig, size_t siglen) in pkey_rsa_verifyrecover() argument 202 ret = RSA_public_decrypt(siglen, sig, in pkey_rsa_verifyrecover() 224 sig, siglen, ctx->pkey->pkey.rsa); in pkey_rsa_verifyrecover() 232 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, in pkey_rsa_verifyrecover() 242 const unsigned char *sig, size_t siglen, in pkey_rsa_verify() argument 252 sig, siglen, rsa); in pkey_rsa_verify() 258 if (pkey_rsa_verifyrecover(ctx, NULL, &rslen, sig, siglen) <= 0) in pkey_rsa_verify() 264 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, in pkey_rsa_verify() [all …]
|
D | rsa_local.h | 99 unsigned char *sigret, unsigned int *siglen, 103 unsigned int siglen, const RSA *rsa); 118 size_t siglen, RSA *rsa);
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_sign.pod | 13 unsigned char *sig, size_t *siglen, 24 buffer is written to the B<siglen> parameter. If B<sig> is not B<NULL> then 25 before the call the B<siglen> parameter should contain the length of the 27 B<sig> and the amount of data written to B<siglen>. 59 size_t mdlen = 32, siglen; 78 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 81 sig = OPENSSL_malloc(siglen); 86 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0) 89 /* Signature is siglen bytes written to buffer sig */
|
D | EVP_PKEY_meth_new.pod | 59 unsigned char *sig, size_t *siglen, 66 size_t siglen, 76 size_t *siglen, 85 size_t *siglen, 92 int siglen, 122 size_t *siglen, 128 size_t siglen, 159 unsigned char *sig, size_t *siglen, 166 size_t siglen, 176 size_t *siglen, [all …]
|
D | EVP_PKEY_verify_recover.pod | 14 const unsigned char *sig, size_t siglen); 23 B<siglen> parameters. If B<rout> is B<NULL> then the maximum size of the output 61 size_t routlen, siglen; 65 * NB: assumes verify_key, sig and siglen are already set up 79 if (EVP_PKEY_verify_recover(ctx, NULL, &routlen, sig, siglen) <= 0) 87 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0)
|
D | EVP_PKEY_verify.pod | 13 const unsigned char *sig, size_t siglen, 23 B<siglen> parameters. The verified data (i.e. the data believed originally 56 size_t mdlen, siglen; 60 * NB: assumes verify_key, sig, siglen md and mdlen are already set up 74 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
|
D | RSA_sign_ASN1_OCTET_STRING.pod | 13 unsigned int *siglen, RSA *rsa); 17 unsigned int siglen, RSA *rsa); 24 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of 35 of size B<siglen> is the DER representation of a given octet string
|
D | RSA_sign.pod | 12 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 15 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 21 stores the signature in B<sigret> and the signature size in B<siglen>. 34 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
D | DSA_sign.pod | 12 unsigned char *sigret, unsigned int *siglen, DSA *dsa); 17 unsigned char *sigbuf, int siglen, DSA *dsa); 24 *B<siglen>. B<sigret> must point to DSA_size(B<dsa>) bytes of memory. 33 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
/third_party/openssl/crypto/dsa/ |
D | dsa_asn1.c | 111 unsigned char *sig, unsigned int *siglen, DSA *dsa) in DSA_sign() argument 117 *siglen = 0; in DSA_sign() 120 *siglen = i2d_DSA_SIG(s, &sig); in DSA_sign() 133 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument 144 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) in DSA_verify() 148 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
|
/third_party/openssl/crypto/ec/ |
D | ecdsa_sign.c | 30 *sig, unsigned int *siglen, EC_KEY *eckey) in ECDSA_sign() argument 32 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign() 36 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, in ECDSA_sign_ex() argument 40 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
D | ecx_meth.c | 739 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign25519() argument 745 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 748 if (*siglen < ED25519_SIGSIZE) { in pkey_ecd_digestsign25519() 755 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 760 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 766 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 769 if (*siglen < ED448_SIGSIZE) { in pkey_ecd_digestsign448() 777 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 782 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify25519() argument 787 if (siglen != ED25519_SIGSIZE) in pkey_ecd_digestverify25519() [all …]
|
/third_party/openssl/apps/ |
D | dgst.c | 28 EVP_PKEY *key, unsigned char *sigin, int siglen, 98 int separator = 0, debug = 0, keyform = FORMAT_PEM, siglen = 0; in dgst_main() local 369 siglen = EVP_PKEY_size(sigkey); in dgst_main() 370 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 371 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 373 if (siglen <= 0) { in dgst_main() 390 siglen, NULL, NULL, "stdin"); in dgst_main() 413 siglen, sig_name, md_name, argv[i]); in dgst_main() 500 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() argument 521 i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen); in do_fp()
|
/third_party/openssl/util/perl/TLSProxy/ |
D | CertificateVerify.pm | 52 my $siglen = unpack('n', substr($remdata, 0, 2)); 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n";
|
/third_party/openssl/crypto/sm2/ |
D | sm2_pmeth.c | 88 static int pkey_sm2_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, in pkey_sm2_sign() argument 101 *siglen = (size_t)sig_sz; in pkey_sm2_sign() 105 if (*siglen < (size_t)sig_sz) { in pkey_sm2_sign() 114 *siglen = (size_t)sltmp; in pkey_sm2_sign() 119 const unsigned char *sig, size_t siglen, in pkey_sm2_verify() argument 124 return sm2_verify(tbs, tbslen, sig, siglen, ec); in pkey_sm2_verify()
|
/third_party/openssl/test/ |
D | dsatest.c | 74 unsigned int siglen; in dsa_test() local 108 DSA_sign(0, str1, 20, sig, &siglen, dsa); in dsa_test() 109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa))) in dsa_test()
|
/third_party/openssl/crypto/cms/ |
D | cms_sd.c | 599 size_t siglen; in cms_SignerInfo_content_sign() local 605 siglen = EVP_PKEY_size(si->pkey); in cms_SignerInfo_content_sign() 606 sig = OPENSSL_malloc(siglen); in cms_SignerInfo_content_sign() 611 if (EVP_PKEY_sign(pctx, sig, &siglen, md, mdlen) <= 0) { in cms_SignerInfo_content_sign() 615 ASN1_STRING_set0(si->signature, sig, siglen); in cms_SignerInfo_content_sign() 618 unsigned int siglen; in cms_SignerInfo_content_sign() local 624 if (!EVP_SignFinal(mctx, sig, &siglen, si->pkey)) { in cms_SignerInfo_content_sign() 629 ASN1_STRING_set0(si->signature, sig, siglen); in cms_SignerInfo_content_sign() 662 size_t siglen; in CMS_SignerInfo_sign() local 698 if (EVP_DigestSignFinal(mctx, NULL, &siglen) <= 0) in CMS_SignerInfo_sign() [all …]
|
/third_party/openssl/crypto/ct/ |
D | ct_oct.c | 26 size_t siglen; in o2i_SCT_signature() local 55 n2s(p, siglen); in o2i_SCT_signature() 57 if (siglen > len_remaining) { in o2i_SCT_signature() 62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature() 64 len_remaining -= siglen; in o2i_SCT_signature() 65 *in = p + siglen; in o2i_SCT_signature()
|