Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 25 of 95) sorted by relevance

1234

/external/kmod/libkmod/
Dlibkmod-signature.c95 uint32_t sig_len; /* Length of signature data (big endian) */ member
99 const struct module_signature *modsig, size_t sig_len, in fill_default() argument
102 size -= sig_len; in fill_default()
104 sig_info->sig_len = sig_len; in fill_default()
195 const struct module_signature *modsig, size_t sig_len, in fill_pkcs7() argument
216 size -= sig_len; in fill_pkcs7()
219 in = BIO_new_mem_buf(pkcs7_raw, sig_len); in fill_pkcs7()
250 sig_info->sig_len = ASN1_STRING_length(sig); in fill_pkcs7()
300 const struct module_signature *modsig, size_t sig_len, in fill_pkcs7() argument
328 size_t sig_len; in kmod_module_signature_info() local
[all …]
/external/boringssl/src/crypto/ecdsa_extra/
Decdsa_asn1.c70 unsigned int *sig_len, const EC_KEY *eckey) { in ECDSA_sign() argument
72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, in ECDSA_sign()
79 *sig_len = 0; in ECDSA_sign()
91 *sig_len = 0; in ECDSA_sign()
94 *sig_len = (unsigned)len; in ECDSA_sign()
103 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { in ECDSA_verify() argument
109 s = ECDSA_SIG_from_bytes(sig, sig_len); in ECDSA_verify()
117 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
/external/rust/crates/quiche/deps/boringssl/src/crypto/ecdsa_extra/
Decdsa_asn1.c70 unsigned int *sig_len, const EC_KEY *eckey) { in ECDSA_sign() argument
72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, in ECDSA_sign()
79 *sig_len = 0; in ECDSA_sign()
91 *sig_len = 0; in ECDSA_sign()
94 *sig_len = (unsigned)len; in ECDSA_sign()
103 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { in ECDSA_verify() argument
109 s = ECDSA_SIG_from_bytes(sig, sig_len); in ECDSA_verify()
117 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
/external/boringssl/src/tool/
Dsign.cc70 size_t sig_len = EVP_PKEY_size(key.get()); in Sign() local
71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); in Sign()
72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), in Sign()
77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) { in Sign()
/external/rust/crates/quiche/deps/boringssl/src/tool/
Dsign.cc70 size_t sig_len = EVP_PKEY_size(key.get()); in Sign() local
71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); in Sign()
72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), in Sign()
77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) { in Sign()
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/
Dsign.c84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local
97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal()
100 *out_sig_len = sig_len; in EVP_SignFinal()
123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument
145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
Devp_extra_test.cc385 size_t sig_len = 0; in TEST() local
386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); in TEST()
389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); in TEST()
392 sig.resize(sig_len); in TEST()
393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); in TEST()
394 sig.resize(sig_len); in TEST()
401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); in TEST()
423 unsigned sig_len = sizeof(sig); in TEST() local
425 &sig_len, rsa.get())); in TEST()
433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); in TEST()
[all …]
Ddigestsign.c176 size_t sig_len) { in EVP_DigestVerifyFinal() argument
190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal()
218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_DigestVerify() argument
222 EVP_DigestVerifyFinal(ctx, sig, sig_len); in EVP_DigestVerify()
230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len); in EVP_DigestVerify()
/external/boringssl/src/crypto/evp/
Dsign.c84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local
97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal()
100 *out_sig_len = sig_len; in EVP_SignFinal()
123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument
145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
Devp_extra_test.cc385 size_t sig_len = 0; in TEST() local
386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); in TEST()
389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); in TEST()
392 sig.resize(sig_len); in TEST()
393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); in TEST()
394 sig.resize(sig_len); in TEST()
401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); in TEST()
423 unsigned sig_len = sizeof(sig); in TEST() local
425 &sig_len, rsa.get())); in TEST()
433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); in TEST()
[all …]
Ddigestsign.c176 size_t sig_len) { in EVP_DigestVerifyFinal() argument
190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal()
218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_DigestVerify() argument
222 EVP_DigestVerifyFinal(ctx, sig, sig_len); in EVP_DigestVerify()
230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len); in EVP_DigestVerify()
/external/vboot_reference/utility/
Dverify_data.c52 int i, algorithm, sig_len; in main() local
74 sig_len = siglen_map[algorithm]; in main()
76 (signature = read_signature(argv[3], sig_len)) && in main()
78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) { in main()
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/
Dcavp_rsa2_siggen_test.cc79 size_t sig_len; in TestRSA2SigGen() local
86 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), in TestRSA2SigGen()
96 sig_len = sig_len_u; in TestRSA2SigGen()
99 sig.resize(sig_len); in TestRSA2SigGen()
Dtest_fips.c186 unsigned sig_len; in main() local
190 &sig_len, rsa_key)) { in main()
195 hexdump(output, sig_len); in main()
199 hexdump(output, sig_len); in main()
201 output, sig_len, rsa_key)) { in main()
/external/boringssl/src/util/fipstools/cavp/
Dcavp_rsa2_siggen_test.cc79 size_t sig_len; in TestRSA2SigGen() local
86 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), in TestRSA2SigGen()
96 sig_len = sig_len_u; in TestRSA2SigGen()
99 sig.resize(sig_len); in TestRSA2SigGen()
Dtest_fips.c186 unsigned sig_len; in main() local
190 &sig_len, rsa_key)) { in main()
195 hexdump(output, sig_len); in main()
199 hexdump(output, sig_len); in main()
201 output, sig_len, rsa_key)) { in main()
/external/vboot_reference/firmware/lib/cryptolib/
Drsa.c132 const uint32_t sig_len, in RSAVerify() argument
143 if (sig_len != (key->len * sizeof(uint32_t))) { in RSAVerify()
158 buf = (uint8_t*) VbExMalloc(sig_len); in RSAVerify()
161 Memcpy(buf, sig, sig_len); in RSAVerify()
179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { in RSAVerify()
/external/vboot_reference/tests/
Drsa_verify_benchmark.c25 uint64_t digest_len, sig_len; in SpeedTestAlgorithm() local
58 signature = BufferFromFile(file_name, &sig_len); in SpeedTestAlgorithm()
67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) in SpeedTestAlgorithm()
/external/libwebsockets/lib/tls/openssl/
Dlws-genec.c431 uint8_t *sig, size_t sig_len)
457 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) {
465 return (int)sig_len;
477 uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sign_jws() argument
492 if ((int)sig_len < keybytes * 2) { in lws_genecdsa_hash_sign_jws()
494 (int)sig_len, keybytes * 2); in lws_genecdsa_hash_sign_jws()
559 const uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sig_verify_jws() argument
573 if ((int)sig_len != keybytes * 2) { in lws_genecdsa_hash_sig_verify_jws()
575 (int)sig_len, keybytes * 2); in lws_genecdsa_hash_sig_verify_jws()
Dlws-genrsa.c285 size_t sig_len) argument
296 n = RSA_verify(n, in, h, (uint8_t *)sig, (int)sig_len, ctx->rsa);
309 (int)sig_len);
328 size_t sig_len) argument
376 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) {
382 used = (int)sig_len;
/external/arm-trusted-firmware/drivers/auth/
Dcrypto_mod.c68 void *sig_ptr, unsigned int sig_len, in crypto_mod_verify_signature() argument
75 assert(sig_len != 0); in crypto_mod_verify_signature()
82 sig_ptr, sig_len, in crypto_mod_verify_signature()
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/credentials/jwt/
Djson_token.cc232 size_t sig_len = 0; in compute_and_encode_signature() local
250 if (EVP_DigestSignFinal(md_ctx, nullptr, &sig_len) != 1) { in compute_and_encode_signature()
254 sig = static_cast<unsigned char*>(gpr_malloc(sig_len)); in compute_and_encode_signature()
255 if (EVP_DigestSignFinal(md_ctx, sig, &sig_len) != 1) { in compute_and_encode_signature()
259 result = grpc_base64_encode(sig, sig_len, 1, 0); in compute_and_encode_signature()
/external/rust/crates/quiche/deps/boringssl/src/crypto/dsa/
Ddsa_test.cc291 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { in TestVerify() argument
298 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get()); in TestVerify()
327 unsigned sig_len; in TEST() local
330 DSA_sign(0, kDigest, sizeof(kDigest), sig.data(), &sig_len, dsa.get())); in TEST()
/external/boringssl/src/crypto/dsa/
Ddsa_test.cc291 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { in TestVerify() argument
298 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get()); in TestVerify()
327 unsigned sig_len; in TEST() local
330 DSA_sign(0, kDigest, sizeof(kDigest), sig.data(), &sig_len, dsa.get())); in TEST()
/external/boringssl/src/crypto/trust_token/
Dtrust_token.c358 size_t srr_len, sig_len; in TRUST_TOKEN_CLIENT_finish_redemption() local
360 !CBS_stow(&sig, &sig_buf, &sig_len)) { in TRUST_TOKEN_CLIENT_finish_redemption()
370 *out_sig_len = sig_len; in TRUST_TOKEN_CLIENT_finish_redemption()
681 size_t srr_len = 0, sig_len = 0, client_data_len = 0; in TRUST_TOKEN_ISSUER_redeem() local
762 !EVP_DigestSign(&md_ctx, NULL, &sig_len, srr_buf, srr_len)) { in TRUST_TOKEN_ISSUER_redeem()
776 !EVP_EncodedLength(&sig_b64_len, sig_len)) { in TRUST_TOKEN_ISSUER_redeem()
780 sig_buf = OPENSSL_malloc(sig_len); in TRUST_TOKEN_ISSUER_redeem()
786 !EVP_DigestSign(&md_ctx, sig_buf, &sig_len, srr_buf, srr_len) || in TRUST_TOKEN_ISSUER_redeem()
794 EVP_EncodeBlock(sig_b64_buf, sig_buf, sig_len)) || in TRUST_TOKEN_ISSUER_redeem()
810 !CBB_reserve(&child, &ptr, sig_len) || in TRUST_TOKEN_ISSUER_redeem()
[all …]

1234