/third_party/ffmpeg/tests/ |
D | audiomatch.c | 40 int siglen, datlen; in main() local 80 siglen = fsize(f[1]) - ftell(f[1]); in main() 82 signal = malloc(siglen * sizeof(*signal)); in main() 86 if (fread(signal, 1, siglen, f[1]) != siglen) in main() 89 siglen /= 2; in main() 91 for (i = 0; i < siglen; i++) { in main() 100 int testlen = FFMIN(siglen, datlen-pos); in main() 112 … postsig:%d c:%7.4f lenerr:%d\n", bestpos, datlen - siglen - bestpos, bestc / sigamp, datlen - sig… in main()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
D | m_sigver.c | 469 size_t *siglen) in EVP_DigestSignFinal() argument 482 sigret, siglen, in EVP_DigestSignFinal() 483 sigret == NULL ? 0 : *siglen); in EVP_DigestSignFinal() 489 sigret, siglen, in EVP_DigestSignFinal() 490 *siglen); in EVP_DigestSignFinal() 508 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 510 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 515 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 530 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 544 sigret, siglen, tmp_ctx); in EVP_DigestSignFinal() [all …]
|
D | p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, in EVP_SignFinal_ex() argument 27 *siglen = 0; in EVP_SignFinal_ex() 58 *siglen = sltmp; in EVP_SignFinal_ex() 66 unsigned int *siglen, EVP_PKEY *pkey) in EVP_SignFinal() argument 68 return EVP_SignFinal_ex(ctx, sigret, siglen, pkey, NULL, NULL); in EVP_SignFinal()
|
D | p_verify.c | 18 unsigned int siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, in EVP_VerifyFinal_ex() argument 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex() 60 unsigned int siglen, EVP_PKEY *pkey) in EVP_VerifyFinal() argument 62 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL); in EVP_VerifyFinal()
|
/third_party/openssl/crypto/evp/ |
D | m_sigver.c | 469 size_t *siglen) in EVP_DigestSignFinal() argument 482 sigret, siglen, in EVP_DigestSignFinal() 483 sigret == NULL ? 0 : *siglen); in EVP_DigestSignFinal() 489 sigret, siglen, in EVP_DigestSignFinal() 490 *siglen); in EVP_DigestSignFinal() 508 return pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 510 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 515 r = dctx->pmeth->signctx(dctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 530 r = pctx->pmeth->signctx(pctx, sigret, siglen, ctx); in EVP_DigestSignFinal() 544 sigret, siglen, tmp_ctx); in EVP_DigestSignFinal() [all …]
|
D | p_sign.c | 18 unsigned int *siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, in EVP_SignFinal_ex() argument 27 *siglen = 0; in EVP_SignFinal_ex() 58 *siglen = sltmp; in EVP_SignFinal_ex() 66 unsigned int *siglen, EVP_PKEY *pkey) in EVP_SignFinal() argument 68 return EVP_SignFinal_ex(ctx, sigret, siglen, pkey, NULL, NULL); in EVP_SignFinal()
|
D | p_verify.c | 18 unsigned int siglen, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, in EVP_VerifyFinal_ex() argument 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex() 60 unsigned int siglen, EVP_PKEY *pkey) in EVP_VerifyFinal() argument 62 return EVP_VerifyFinal_ex(ctx, sigbuf, siglen, pkey, NULL, NULL); in EVP_VerifyFinal()
|
/third_party/openssl/crypto/rsa/ |
D | rsa_saos.c | 25 unsigned char *sigret, unsigned int *siglen, in RSA_sign_ASN1_OCTET_STRING() argument 53 *siglen = i; in RSA_sign_ASN1_OCTET_STRING() 62 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING() argument 69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING() 74 s = OPENSSL_malloc((unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING() 97 OPENSSL_clear_free(s, (unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING()
|
D | rsa_sign.c | 274 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 314 *siglen = encrypt_len; in RSA_sign() 333 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify() 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 445 OPENSSL_clear_free(decrypt_buf, siglen); in ossl_rsa_verify() 450 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 454 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_saos.c | 25 unsigned char *sigret, unsigned int *siglen, in RSA_sign_ASN1_OCTET_STRING() argument 53 *siglen = i; in RSA_sign_ASN1_OCTET_STRING() 62 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING() argument 69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING() 74 s = OPENSSL_malloc((unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING() 97 OPENSSL_clear_free(s, (unsigned int)siglen); in RSA_verify_ASN1_OCTET_STRING()
|
D | rsa_sign.c | 274 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 314 *siglen = encrypt_len; in RSA_sign() 333 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify() 345 decrypt_buf = OPENSSL_malloc(siglen); in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 445 OPENSSL_clear_free(decrypt_buf, siglen); in ossl_rsa_verify() 450 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 454 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
D | dsa_sign.c | 155 unsigned char *sig, unsigned int *siglen, DSA *dsa) in ossl_dsa_sign_int() argument 165 *siglen = 0; in ossl_dsa_sign_int() 168 *siglen = i2d_DSA_SIG(s, sig != NULL ? &sig : NULL); in ossl_dsa_sign_int() 174 unsigned char *sig, unsigned int *siglen, DSA *dsa) in DSA_sign() argument 176 return ossl_dsa_sign_int(type, dgst, dlen, sig, siglen, dsa); in DSA_sign() 187 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument 198 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) in DSA_verify() 202 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_sign.c | 155 unsigned char *sig, unsigned int *siglen, DSA *dsa) in ossl_dsa_sign_int() argument 165 *siglen = 0; in ossl_dsa_sign_int() 168 *siglen = i2d_DSA_SIG(s, sig != NULL ? &sig : NULL); in ossl_dsa_sign_int() 174 unsigned char *sig, unsigned int *siglen, DSA *dsa) in DSA_sign() argument 176 return ossl_dsa_sign_int(type, dgst, dlen, sig, siglen, dsa); in DSA_sign() 187 const unsigned char *sigbuf, int siglen, DSA *dsa) in DSA_verify() argument 198 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) in DSA_verify() 202 if (derlen != siglen || memcmp(sigbuf, der, derlen)) in DSA_verify()
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
D | eddsa_sig.c | 150 size_t *siglen, size_t sigsize, in ed25519_digest_sign() argument 160 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 177 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 186 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 191 size_t *siglen, size_t sigsize, in ed448_digest_sign() argument 201 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 218 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 227 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 232 size_t siglen, const unsigned char *tbs, in ed25519_digest_verify() argument 238 if (!ossl_prov_is_running() || siglen != ED25519_SIGSIZE) in ed25519_digest_verify() [all …]
|
D | sm2_sig.c | 157 static int sm2sig_sign(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_sign() argument 167 *siglen = ecsize; in sm2sig_sign() 181 *siglen = sltmp; in sm2sig_sign() 185 static int sm2sig_verify(void *vpsm2ctx, const unsigned char *sig, size_t siglen, in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify() 284 int sm2sig_digest_sign_final(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_digest_sign_final() argument 304 return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen); in sm2sig_digest_sign_final() 309 size_t siglen) in sm2sig_digest_verify_final() argument 324 return sm2sig_verify(vpsm2ctx, sig, siglen, digest, (size_t)dlen); in sm2sig_digest_verify_final()
|
/third_party/openssl/providers/implementations/signature/ |
D | eddsa_sig.c | 150 size_t *siglen, size_t sigsize, in ed25519_digest_sign() argument 160 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 177 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 186 *siglen = ED25519_SIGSIZE; in ed25519_digest_sign() 191 size_t *siglen, size_t sigsize, in ed448_digest_sign() argument 201 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 218 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 227 *siglen = ED448_SIGSIZE; in ed448_digest_sign() 232 size_t siglen, const unsigned char *tbs, in ed25519_digest_verify() argument 238 if (!ossl_prov_is_running() || siglen != ED25519_SIGSIZE) in ed25519_digest_verify() [all …]
|
D | sm2_sig.c | 157 static int sm2sig_sign(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_sign() argument 167 *siglen = ecsize; in sm2sig_sign() 181 *siglen = sltmp; in sm2sig_sign() 185 static int sm2sig_verify(void *vpsm2ctx, const unsigned char *sig, size_t siglen, in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify() 284 int sm2sig_digest_sign_final(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_digest_sign_final() argument 304 return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen); in sm2sig_digest_sign_final() 309 size_t siglen) in sm2sig_digest_verify_final() argument 324 return sm2sig_verify(vpsm2ctx, sig, siglen, digest, (size_t)dlen); in sm2sig_digest_verify_final()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_sign.pod | 15 unsigned char *sig, size_t *siglen, 32 buffer is written to the I<siglen> parameter. If I<sig> is not NULL then 33 before the call the I<siglen> parameter should contain the length of the 35 I<sig> and the amount of data written to I<siglen>. 67 size_t mdlen = 32, siglen; 86 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 89 sig = OPENSSL_malloc(siglen); 94 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0) 97 /* Signature is siglen bytes written to buffer sig */
|
D | EVP_PKEY_meth_new.pod | 63 unsigned char *sig, size_t *siglen, 70 size_t siglen, 80 size_t *siglen, 89 size_t *siglen, 96 int siglen, 126 size_t *siglen, 132 size_t siglen, 163 unsigned char *sig, size_t *siglen, 170 size_t siglen, 180 size_t *siglen, [all …]
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
D | ecx_meth.c | 806 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign25519() argument 817 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 820 if (*siglen < ED25519_SIGSIZE) { in pkey_ecd_digestsign25519() 828 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 833 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 844 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 847 if (*siglen < ED448_SIGSIZE) { in pkey_ecd_digestsign448() 855 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 860 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify25519() argument 870 if (siglen != ED25519_SIGSIZE) in pkey_ecd_digestverify25519() [all …]
|
D | ecdsa_sign.c | 36 *sig, unsigned int *siglen, EC_KEY *eckey) in ECDSA_sign() argument 38 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign() 42 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, in ECDSA_sign_ex() argument 46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
/third_party/openssl/crypto/ec/ |
D | ecx_meth.c | 806 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign25519() argument 817 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 820 if (*siglen < ED25519_SIGSIZE) { in pkey_ecd_digestsign25519() 828 *siglen = ED25519_SIGSIZE; in pkey_ecd_digestsign25519() 833 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 844 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 847 if (*siglen < ED448_SIGSIZE) { in pkey_ecd_digestsign448() 855 *siglen = ED448_SIGSIZE; in pkey_ecd_digestsign448() 860 size_t siglen, const unsigned char *tbs, in pkey_ecd_digestverify25519() argument 870 if (siglen != ED25519_SIGSIZE) in pkey_ecd_digestverify25519() [all …]
|
D | ecdsa_sign.c | 36 *sig, unsigned int *siglen, EC_KEY *eckey) in ECDSA_sign() argument 38 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign() 42 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, in ECDSA_sign_ex() argument 46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
/third_party/openssl/apps/ |
D | dgst.c | 28 EVP_PKEY *key, unsigned char *sigin, int siglen, 108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main() local 398 siglen = EVP_PKEY_get_size(sigkey); in dgst_main() 399 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 400 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 402 if (siglen <= 0) { in dgst_main() 437 siglen, NULL, md_name, "stdin"); in dgst_main() 453 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 545 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() argument 565 i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen); in do_fp()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | dgst.c | 28 EVP_PKEY *key, unsigned char *sigin, int siglen, 108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main() local 398 siglen = EVP_PKEY_get_size(sigkey); in dgst_main() 399 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 400 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 402 if (siglen <= 0) { in dgst_main() 437 siglen, NULL, md_name, "stdin"); in dgst_main() 453 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 545 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() argument 565 i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen); in do_fp()
|