Home
last modified time | relevance | path

Searched refs:tbslen (Results 1 – 25 of 49) sorted by relevance

12

/third_party/openssl/providers/implementations/signature/
Deddsa_sig.c35 const unsigned char *tbs, size_t tbslen);
37 const unsigned char *tbs, size_t tbslen);
40 const unsigned char *tbs, size_t tbslen);
43 const unsigned char *tbs, size_t tbslen);
151 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument
173 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign()
181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign()
192 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument
214 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed448_digest_sign()
222 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey, in ed448_digest_sign()
[all …]
Drsa_sig.c515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument
537 if (tbslen != mdsize) { in rsa_sign()
551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign()
564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign()
567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign()
574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign()
575 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign()
576 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign()
585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign()
644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign()
[all …]
Dsm2_sig.c158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
Ddsa_sig.c232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign()
254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign()
263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify()
271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
Decdsa_sig.c170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument
193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign()
196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign()
205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify()
212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
/third_party/node/deps/openssl/openssl/providers/implementations/signature/
Deddsa_sig.c35 const unsigned char *tbs, size_t tbslen);
37 const unsigned char *tbs, size_t tbslen);
40 const unsigned char *tbs, size_t tbslen);
43 const unsigned char *tbs, size_t tbslen);
151 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument
173 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign()
181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign()
192 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument
214 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed448_digest_sign()
222 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey, in ed448_digest_sign()
[all …]
Drsa_sig.c515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument
537 if (tbslen != mdsize) { in rsa_sign()
551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign()
564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign()
567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign()
574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign()
575 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign()
576 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign()
585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign()
644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign()
[all …]
Dsm2_sig.c158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
Ddsa_sig.c232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign()
254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign()
263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify()
271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
Decdsa_sig.c170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument
193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign()
196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign()
205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify()
212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
/third_party/openssl/crypto/rsa/
Drsa_pmeth.c135 size_t tbslen) in pkey_rsa_sign() argument
147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign()
156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign()
172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign()
177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
[all …]
/third_party/node/deps/openssl/openssl/crypto/rsa/
Drsa_pmeth.c135 size_t tbslen) in pkey_rsa_sign() argument
147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign()
156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign()
172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign()
177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
[all …]
/third_party/node/deps/openssl/openssl/crypto/dsa/
Ddsa_pmeth.c79 size_t tbslen) in pkey_dsa_sign() argument
91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign()
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify()
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/third_party/openssl/crypto/dsa/
Ddsa_pmeth.c79 size_t tbslen) in pkey_dsa_sign() argument
91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign()
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify()
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/third_party/node/deps/openssl/openssl/crypto/ec/
Decx_meth.c807 size_t tbslen) in pkey_ecd_digestsign25519() argument
825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, in pkey_ecd_digestsign25519()
834 size_t tbslen) in pkey_ecd_digestsign448() argument
852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448()
861 size_t tbslen) in pkey_ecd_digestverify25519() argument
873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
879 size_t tbslen) in pkey_ecd_digestverify448() argument
891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448()
1187 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument
1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519()
[all …]
Dec_pmeth.c107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/third_party/openssl/crypto/ec/
Decx_meth.c807 size_t tbslen) in pkey_ecd_digestsign25519() argument
825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, in pkey_ecd_digestsign25519()
834 size_t tbslen) in pkey_ecd_digestsign448() argument
852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448()
861 size_t tbslen) in pkey_ecd_digestverify25519() argument
873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
879 size_t tbslen) in pkey_ecd_digestverify448() argument
891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448()
1187 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument
1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519()
[all …]
Dec_pmeth.c107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/third_party/openssl/doc/man3/
DEVP_PKEY_meth_new.pod65 size_t tbslen));
72 size_t tbslen));
83 size_t tbslen));
128 size_t tbslen));
134 size_t tbslen));
165 size_t tbslen));
172 size_t tbslen));
183 size_t tbslen));
228 size_t tbslen));
234 size_t tbslen));
[all …]
/third_party/openssl/crypto/evp/
Dm_sigver.c568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
580 tbs, tbslen); in EVP_DigestSign()
584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
672 tbs, tbslen); in EVP_DigestVerify()
676 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
679 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
Dsignature.c632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
694 tbs, tbslen); in EVP_PKEY_verify()
703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
/third_party/node/deps/openssl/openssl/crypto/evp/
Dm_sigver.c568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
580 tbs, tbslen); in EVP_DigestSign()
584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
672 tbs, tbslen); in EVP_DigestVerify()
676 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
679 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
Dsignature.c632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
694 tbs, tbslen); in EVP_PKEY_verify()
703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
/third_party/openssl/ohos_lite/include/openssl/
Devp.h625 size_t tbslen);
632 size_t tbslen);
1386 const unsigned char *tbs, size_t tbslen);
1390 const unsigned char *tbs, size_t tbslen);
1448 size_t tbslen));
1456 size_t tbslen));
1468 size_t tbslen));
1520 size_t tbslen));
1527 size_t tbslen));
1567 size_t tbslen));
[all …]
/third_party/openssl/ohos_lite/include/crypto/
Devp.h55 const unsigned char *tbs, size_t tbslen);
59 const unsigned char *tbs, size_t tbslen);
81 const unsigned char *tbs, size_t tbslen);
84 size_t tbslen);

12