/third_party/mbedtls/library/ |
D | pk_wrap.c | 79 const unsigned char *sig, size_t sig_len ) in rsa_verify_wrap() argument 90 if( sig_len < rsa_len ) in rsa_verify_wrap() 103 if( sig_len > rsa_len ) in rsa_verify_wrap() 111 unsigned char *sig, size_t sig_size, size_t *sig_len, in rsa_sign_wrap() argument 121 *sig_len = mbedtls_rsa_get_len( rsa ); in rsa_sign_wrap() 122 if( sig_size < *sig_len ) in rsa_sign_wrap() 248 const unsigned char *sig, size_t sig_len ); 252 unsigned char *sig, size_t sig_size, size_t *sig_len, 257 const unsigned char *sig, size_t sig_len ) in eckey_verify_wrap() argument 265 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap() [all …]
|
D | pk.c | 278 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 302 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx ); in mbedtls_pk_verify_restartable() 317 sig, sig_len ) ); in mbedtls_pk_verify_restartable() 325 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument 328 sig, sig_len, NULL ) ); in mbedtls_pk_verify() 337 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument 366 if( sig_len < mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 377 if( sig_len > mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 390 return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); in mbedtls_pk_verify_ext() 399 unsigned char *sig, size_t sig_size, size_t *sig_len, in mbedtls_pk_sign_restartable() argument [all …]
|
D | pk_wrap.h | 47 const unsigned char *sig, size_t sig_len ); 52 unsigned char *sig, size_t sig_size, size_t *sig_len, 60 const unsigned char *sig, size_t sig_len, 66 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
D | x509write_csr.c | 148 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 239 sig, sig_size, &sig_len, in x509write_csr_der_internal() 272 sig, sig_len ) ); in x509write_csr_der_internal()
|
/third_party/openssl/demos/signature/ |
D | EVP_Signature_demo.c | 74 size_t sig_len; in demo_sign() local 117 if (!EVP_DigestSignFinal(sign_context, NULL, &sig_len)) { in demo_sign() 121 if (sig_len <= 0) { in demo_sign() 125 sig_value = OPENSSL_malloc(sig_len); in demo_sign() 130 if (!EVP_DigestSignFinal(sign_context, sig_value, &sig_len)) { in demo_sign() 134 *sig_out_len = sig_len; in demo_sign() 137 BIO_dump_indent_fp(stdout, sig_value, sig_len, 2); in demo_sign() 151 size_t sig_len, unsigned char *sig_value) in demo_verify() argument 191 if (EVP_DigestVerifyFinal(verify_context, sig_value, sig_len) <= 0) { in demo_verify() 209 size_t sig_len = 0; in main() local [all …]
|
D | rsa_pss_hash.c | 33 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 80 if (EVP_DigestSignFinal(mctx, NULL, sig_len) == 0) { in sign() 86 *sig = OPENSSL_malloc(*sig_len); in sign() 93 if (EVP_DigestSignFinal(mctx, *sig, sig_len) == 0) { in sign() 114 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 158 if (EVP_DigestVerifyFinal(mctx, sig, sig_len) == 0) { in verify() 176 size_t sig_len = 0; in main() local 178 if (sign(libctx, &sig, &sig_len) == 0) in main() 181 if (verify(libctx, sig, sig_len) == 0) in main()
|
D | rsa_pss_direct.c | 38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 88 if (EVP_PKEY_sign(ctx, NULL, sig_len, in sign() 95 *sig = OPENSSL_malloc(*sig_len); in sign() 102 if (EVP_PKEY_sign(ctx, *sig, sig_len, in sign() 124 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 171 if (EVP_PKEY_verify(ctx, sig, sig_len, in verify() 191 size_t sig_len = 0; in main() local 193 if (sign(libctx, &sig, &sig_len) == 0) in main() 196 if (verify(libctx, sig, sig_len) == 0) in main()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ecdsa.function | 193 size_t sig_len, i; 208 sig, sizeof( sig ), &sig_len, &mbedtls_test_rnd_pseudo_rand, 211 sig, sig_len ) == 0 ); 214 for( i = sig_len; i < sizeof( sig ); i++ ) 219 sig, sig_len - 1 ) != 0 ); 221 sig, sig_len + 1 ) != 0 ); 226 sig, sig_len ) != 0 ); 232 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED ); 236 sig[sig_len - 1]++; 238 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED ); [all …]
|
D | test_suite_pk.function | 624 size_t sig_len; 651 sig, sizeof sig, &sig_len, 655 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE ); 657 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; 660 hash, hash_len, sig, sig_len ) == verify_ret ); 666 hash, hash_len, sig, sig_len ) != 0 ); 671 hash, hash_len, sig, sig_len ) != 0 ); 676 sig, sizeof sig, &sig_len, 680 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE ); 682 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; [all …]
|
/third_party/openssl/crypto/ct/ |
D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() 260 sct->sig != NULL && sct->sig_len > 0; in SCT_signature_is_complete()
|
D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
/third_party/openssl/test/ |
D | ecdsatest.c | 195 size_t sig_len; in test_builtin() local 247 || !TEST_ptr(sig = OPENSSL_malloc(sig_len = (size_t)temp)) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 252 || !TEST_int_le(sig_len, ECDSA_size(eckey)) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 262 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len - 1, tbs, sizeof(tbs)), -1) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 312 offset = tbs[0] % sig_len; in test_builtin() [all …]
|
D | acvp_test.c | 94 size_t sig_len; in sig_gen() local 97 sig_len = sz; in sig_gen() 102 || !TEST_int_gt(EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len), 0)) in sig_gen() 105 *sig_out_len = sig_len; in sig_gen() 206 static int get_ecdsa_sig_rs_bytes(const unsigned char *sig, size_t sig_len, in get_ecdsa_sig_rs_bytes() argument 214 ECDSA_SIG *sign = d2i_ECDSA_SIG(NULL, &sig, sig_len); in get_ecdsa_sig_rs_bytes() 251 size_t sig_len = 0, rlen = 0, slen = 0; in ecdsa_siggen_test() local 260 &sig, &sig_len)) in ecdsa_siggen_test() 261 || !TEST_true(get_ecdsa_sig_rs_bytes(sig, sig_len, &r, &s, &rlen, &slen))) in ecdsa_siggen_test() 280 size_t sig_len; in ecdsa_sigver_test() local [all …]
|
/third_party/mbedtls/programs/pkey/ |
D | ecdsa.c | 108 size_t sig_len; in main() local 183 sig, sizeof( sig ), &sig_len, in main() 189 mbedtls_printf( " ok (signature length = %u)\n", (unsigned int) sig_len ); in main() 191 dump_buf( " + Signature: ", sig, sig_len ); in main() 223 sig, sig_len ) ) != 0 ) in main()
|
/third_party/openssl/util/perl/TLSProxy/ |
D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | lws-genec.c | 476 uint8_t *sig, size_t sig_len) 502 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 510 return (int)sig_len; 522 uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sign_jws() argument 538 if ((int)sig_len != (int)(keybytes * 2)) { in lws_genecdsa_hash_sign_jws() 540 (int)sig_len, (int)(hs * 2)); in lws_genecdsa_hash_sign_jws() 605 const uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sig_verify_jws() argument 619 if ((int)sig_len != keybytes * 2) { in lws_genecdsa_hash_sig_verify_jws() 621 (int)sig_len, keybytes * 2); in lws_genecdsa_hash_sig_verify_jws()
|
D | lws-genrsa.c | 286 size_t sig_len) argument 298 (unsigned int)sig_len, ctx->rsa); 311 (int)sig_len); 330 size_t sig_len) argument 382 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 388 used = (unsigned int)sig_len;
|
/third_party/mbedtls/include/mbedtls/ |
D | pk.h | 443 const unsigned char *sig, size_t sig_len ); 468 const unsigned char *sig, size_t sig_len, 503 const unsigned char *sig, size_t sig_len ); 535 unsigned char *sig, size_t sig_size, size_t *sig_len, 570 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
/third_party/openssl/crypto/ec/ |
D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() argument 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
/third_party/openssl/doc/man7/ |
D | EVP_SIGNATURE-ED25519.pod | 71 size_t sig_len; 77 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 78 sig = OPENSSL_zalloc(sig_len); 80 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
/third_party/fsverity-utils/lib/ |
D | sign_digest.c | 126 size_t pkcs7_data_len, sig_len; in sign_pkcs7() local 152 sig_len = EVP_PKEY_size(pkey); in sign_pkcs7() 153 sig = libfsverity_zalloc(sig_len); in sign_pkcs7() 158 if (!EVP_DigestSign(&md_ctx, sig, &sig_len, data_to_sign, data_size)) { in sign_pkcs7() 200 !CBB_add_bytes(&signature, sig, sig_len) || in sign_pkcs7()
|
/third_party/libwebsockets/include/libwebsockets/ |
D | lws-genec.h | 176 const uint8_t *sig, size_t sig_len); 199 uint8_t *sig, size_t sig_len);
|
D | lws-genrsa.h | 209 const uint8_t *sig, size_t sig_len); 230 uint8_t *sig, size_t sig_len);
|
/third_party/openssl/crypto/cmp/ |
D | cmp_protect.c | 56 size_t sig_len; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | lws-genec.c | 396 uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sign_jws() argument 401 size_t slen = sig_len; in lws_genecdsa_hash_sign_jws() 458 const uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sig_verify_jws() argument 467 if ((int)sig_len != keybytes * 2) in lws_genecdsa_hash_sig_verify_jws()
|