/third_party/openssl/providers/implementations/signature/ |
D | eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 151 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument 173 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign() 181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign() 192 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument 214 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed448_digest_sign() 222 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey, in ed448_digest_sign() [all …]
|
D | rsa_sig.c | 515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument 537 if (tbslen != mdsize) { in rsa_sign() 551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign() 564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign() 567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign() 574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign() 575 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign() 576 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign() 585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign() 644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign() [all …]
|
D | sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
D | dsa_sig.c | 232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign() 254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign() 263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify() 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
|
D | ecdsa_sig.c | 170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign() 196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign() 205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify() 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
D | eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 151 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument 173 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign() 181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign() 192 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument 214 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed448_digest_sign() 222 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey, in ed448_digest_sign() [all …]
|
D | rsa_sig.c | 515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument 537 if (tbslen != mdsize) { in rsa_sign() 551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign() 564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign() 567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign() 574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign() 575 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign() 576 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign() 585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign() 644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign() [all …]
|
D | sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
D | dsa_sig.c | 232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign() 254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign() 263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify() 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
|
D | ecdsa_sig.c | 170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign() 196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign() 205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify() 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
|
/third_party/openssl/crypto/rsa/ |
D | rsa_pmeth.c | 135 size_t tbslen) in pkey_rsa_sign() argument 147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign() 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign() 172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument [all …]
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_pmeth.c | 135 size_t tbslen) in pkey_rsa_sign() argument 147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign() 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign() 172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument [all …]
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
D | dsa_pmeth.c | 79 size_t tbslen) in pkey_dsa_sign() argument 91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign() 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify() 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_pmeth.c | 79 size_t tbslen) in pkey_dsa_sign() argument 91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign() 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify() 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
D | ecx_meth.c | 807 size_t tbslen) in pkey_ecd_digestsign25519() argument 825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, in pkey_ecd_digestsign25519() 834 size_t tbslen) in pkey_ecd_digestsign448() argument 852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 861 size_t tbslen) in pkey_ecd_digestverify25519() argument 873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 879 size_t tbslen) in pkey_ecd_digestverify448() argument 891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448() 1187 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() [all …]
|
D | ec_pmeth.c | 107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/third_party/openssl/crypto/ec/ |
D | ecx_meth.c | 807 size_t tbslen) in pkey_ecd_digestsign25519() argument 825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, in pkey_ecd_digestsign25519() 834 size_t tbslen) in pkey_ecd_digestsign448() argument 852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 861 size_t tbslen) in pkey_ecd_digestverify25519() argument 873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 879 size_t tbslen) in pkey_ecd_digestverify448() argument 891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448() 1187 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() [all …]
|
D | ec_pmeth.c | 107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_meth_new.pod | 65 size_t tbslen)); 72 size_t tbslen)); 83 size_t tbslen)); 128 size_t tbslen)); 134 size_t tbslen)); 165 size_t tbslen)); 172 size_t tbslen)); 183 size_t tbslen)); 228 size_t tbslen)); 234 size_t tbslen)); [all …]
|
/third_party/openssl/crypto/evp/ |
D | m_sigver.c | 568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 580 tbs, tbslen); in EVP_DigestSign() 584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 672 tbs, tbslen); in EVP_DigestVerify() 676 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 679 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
D | signature.c | 632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 694 tbs, tbslen); in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
D | m_sigver.c | 568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 580 tbs, tbslen); in EVP_DigestSign() 584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 672 tbs, tbslen); in EVP_DigestVerify() 676 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 679 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
D | signature.c | 632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 694 tbs, tbslen); in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | evp.h | 625 size_t tbslen); 632 size_t tbslen); 1386 const unsigned char *tbs, size_t tbslen); 1390 const unsigned char *tbs, size_t tbslen); 1448 size_t tbslen)); 1456 size_t tbslen)); 1468 size_t tbslen)); 1520 size_t tbslen)); 1527 size_t tbslen)); 1567 size_t tbslen)); [all …]
|
/third_party/openssl/ohos_lite/include/crypto/ |
D | evp.h | 55 const unsigned char *tbs, size_t tbslen); 59 const unsigned char *tbs, size_t tbslen); 81 const unsigned char *tbs, size_t tbslen); 84 size_t tbslen);
|