/external/kmod/libkmod/ |
D | libkmod-signature.c | 95 uint32_t sig_len; /* Length of signature data (big endian) */ member 99 const struct module_signature *modsig, size_t sig_len, in fill_default() argument 102 size -= sig_len; in fill_default() 104 sig_info->sig_len = sig_len; in fill_default() 195 const struct module_signature *modsig, size_t sig_len, in fill_pkcs7() argument 216 size -= sig_len; in fill_pkcs7() 219 in = BIO_new_mem_buf(pkcs7_raw, sig_len); in fill_pkcs7() 250 sig_info->sig_len = ASN1_STRING_length(sig); in fill_pkcs7() 300 const struct module_signature *modsig, size_t sig_len, in fill_pkcs7() argument 328 size_t sig_len; in kmod_module_signature_info() local [all …]
|
/external/boringssl/src/crypto/ecdsa_extra/ |
D | ecdsa_asn1.c | 70 unsigned int *sig_len, const EC_KEY *eckey) { in ECDSA_sign() argument 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, in ECDSA_sign() 79 *sig_len = 0; in ECDSA_sign() 91 *sig_len = 0; in ECDSA_sign() 94 *sig_len = (unsigned)len; in ECDSA_sign() 103 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { in ECDSA_verify() argument 109 s = ECDSA_SIG_from_bytes(sig, sig_len); in ECDSA_verify() 117 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/ecdsa_extra/ |
D | ecdsa_asn1.c | 70 unsigned int *sig_len, const EC_KEY *eckey) { in ECDSA_sign() argument 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, in ECDSA_sign() 79 *sig_len = 0; in ECDSA_sign() 91 *sig_len = 0; in ECDSA_sign() 94 *sig_len = (unsigned)len; in ECDSA_sign() 103 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { in ECDSA_verify() argument 109 s = ECDSA_SIG_from_bytes(sig, sig_len); in ECDSA_verify() 117 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
|
/external/boringssl/src/tool/ |
D | sign.cc | 70 size_t sig_len = EVP_PKEY_size(key.get()); in Sign() local 71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); in Sign() 72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), in Sign() 77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) { in Sign()
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | sign.cc | 70 size_t sig_len = EVP_PKEY_size(key.get()); in Sign() local 71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); in Sign() 72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), in Sign() 77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) { in Sign()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal() 100 *out_sig_len = sig_len; in EVP_SignFinal() 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
|
D | evp_extra_test.cc | 385 size_t sig_len = 0; in TEST() local 386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); in TEST() 389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); in TEST() 392 sig.resize(sig_len); in TEST() 393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); in TEST() 394 sig.resize(sig_len); in TEST() 401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); in TEST() 423 unsigned sig_len = sizeof(sig); in TEST() local 425 &sig_len, rsa.get())); in TEST() 433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); in TEST() [all …]
|
D | digestsign.c | 176 size_t sig_len) { in EVP_DigestVerifyFinal() argument 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal() 218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_DigestVerify() argument 222 EVP_DigestVerifyFinal(ctx, sig, sig_len); in EVP_DigestVerify() 230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len); in EVP_DigestVerify()
|
/external/boringssl/src/crypto/evp/ |
D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal() 100 *out_sig_len = sig_len; in EVP_SignFinal() 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
|
D | evp_extra_test.cc | 385 size_t sig_len = 0; in TEST() local 386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); in TEST() 389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); in TEST() 392 sig.resize(sig_len); in TEST() 393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); in TEST() 394 sig.resize(sig_len); in TEST() 401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); in TEST() 423 unsigned sig_len = sizeof(sig); in TEST() local 425 &sig_len, rsa.get())); in TEST() 433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); in TEST() [all …]
|
D | digestsign.c | 176 size_t sig_len) { in EVP_DigestVerifyFinal() argument 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal() 218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_DigestVerify() argument 222 EVP_DigestVerifyFinal(ctx, sig, sig_len); in EVP_DigestVerify() 230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len); in EVP_DigestVerify()
|
/external/vboot_reference/utility/ |
D | verify_data.c | 52 int i, algorithm, sig_len; in main() local 74 sig_len = siglen_map[algorithm]; in main() 76 (signature = read_signature(argv[3], sig_len)) && in main() 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) { in main()
|
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/ |
D | cavp_rsa2_siggen_test.cc | 79 size_t sig_len; in TestRSA2SigGen() local 86 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), in TestRSA2SigGen() 96 sig_len = sig_len_u; in TestRSA2SigGen() 99 sig.resize(sig_len); in TestRSA2SigGen()
|
D | test_fips.c | 186 unsigned sig_len; in main() local 190 &sig_len, rsa_key)) { in main() 195 hexdump(output, sig_len); in main() 199 hexdump(output, sig_len); in main() 201 output, sig_len, rsa_key)) { in main()
|
/external/boringssl/src/util/fipstools/cavp/ |
D | cavp_rsa2_siggen_test.cc | 79 size_t sig_len; in TestRSA2SigGen() local 86 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), in TestRSA2SigGen() 96 sig_len = sig_len_u; in TestRSA2SigGen() 99 sig.resize(sig_len); in TestRSA2SigGen()
|
D | test_fips.c | 186 unsigned sig_len; in main() local 190 &sig_len, rsa_key)) { in main() 195 hexdump(output, sig_len); in main() 199 hexdump(output, sig_len); in main() 201 output, sig_len, rsa_key)) { in main()
|
/external/vboot_reference/firmware/lib/cryptolib/ |
D | rsa.c | 132 const uint32_t sig_len, in RSAVerify() argument 143 if (sig_len != (key->len * sizeof(uint32_t))) { in RSAVerify() 158 buf = (uint8_t*) VbExMalloc(sig_len); in RSAVerify() 161 Memcpy(buf, sig, sig_len); in RSAVerify() 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { in RSAVerify()
|
/external/vboot_reference/tests/ |
D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; in SpeedTestAlgorithm() local 58 signature = BufferFromFile(file_name, &sig_len); in SpeedTestAlgorithm() 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) in SpeedTestAlgorithm()
|
/external/libwebsockets/lib/tls/openssl/ |
D | lws-genec.c | 431 uint8_t *sig, size_t sig_len) 457 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 465 return (int)sig_len; 477 uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sign_jws() argument 492 if ((int)sig_len < keybytes * 2) { in lws_genecdsa_hash_sign_jws() 494 (int)sig_len, keybytes * 2); in lws_genecdsa_hash_sign_jws() 559 const uint8_t *sig, size_t sig_len) in lws_genecdsa_hash_sig_verify_jws() argument 573 if ((int)sig_len != keybytes * 2) { in lws_genecdsa_hash_sig_verify_jws() 575 (int)sig_len, keybytes * 2); in lws_genecdsa_hash_sig_verify_jws()
|
D | lws-genrsa.c | 285 size_t sig_len) argument 296 n = RSA_verify(n, in, h, (uint8_t *)sig, (int)sig_len, ctx->rsa); 309 (int)sig_len); 328 size_t sig_len) argument 376 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 382 used = (int)sig_len;
|
/external/arm-trusted-firmware/drivers/auth/ |
D | crypto_mod.c | 68 void *sig_ptr, unsigned int sig_len, in crypto_mod_verify_signature() argument 75 assert(sig_len != 0); in crypto_mod_verify_signature() 82 sig_ptr, sig_len, in crypto_mod_verify_signature()
|
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/credentials/jwt/ |
D | json_token.cc | 232 size_t sig_len = 0; in compute_and_encode_signature() local 250 if (EVP_DigestSignFinal(md_ctx, nullptr, &sig_len) != 1) { in compute_and_encode_signature() 254 sig = static_cast<unsigned char*>(gpr_malloc(sig_len)); in compute_and_encode_signature() 255 if (EVP_DigestSignFinal(md_ctx, sig, &sig_len) != 1) { in compute_and_encode_signature() 259 result = grpc_base64_encode(sig, sig_len, 1, 0); in compute_and_encode_signature()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/dsa/ |
D | dsa_test.cc | 291 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { in TestVerify() argument 298 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get()); in TestVerify() 327 unsigned sig_len; in TEST() local 330 DSA_sign(0, kDigest, sizeof(kDigest), sig.data(), &sig_len, dsa.get())); in TEST()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa_test.cc | 291 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { in TestVerify() argument 298 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get()); in TestVerify() 327 unsigned sig_len; in TEST() local 330 DSA_sign(0, kDigest, sizeof(kDigest), sig.data(), &sig_len, dsa.get())); in TEST()
|
/external/boringssl/src/crypto/trust_token/ |
D | trust_token.c | 358 size_t srr_len, sig_len; in TRUST_TOKEN_CLIENT_finish_redemption() local 360 !CBS_stow(&sig, &sig_buf, &sig_len)) { in TRUST_TOKEN_CLIENT_finish_redemption() 370 *out_sig_len = sig_len; in TRUST_TOKEN_CLIENT_finish_redemption() 681 size_t srr_len = 0, sig_len = 0, client_data_len = 0; in TRUST_TOKEN_ISSUER_redeem() local 762 !EVP_DigestSign(&md_ctx, NULL, &sig_len, srr_buf, srr_len)) { in TRUST_TOKEN_ISSUER_redeem() 776 !EVP_EncodedLength(&sig_b64_len, sig_len)) { in TRUST_TOKEN_ISSUER_redeem() 780 sig_buf = OPENSSL_malloc(sig_len); in TRUST_TOKEN_ISSUER_redeem() 786 !EVP_DigestSign(&md_ctx, sig_buf, &sig_len, srr_buf, srr_len) || in TRUST_TOKEN_ISSUER_redeem() 794 EVP_EncodeBlock(sig_b64_buf, sig_buf, sig_len)) || in TRUST_TOKEN_ISSUER_redeem() 810 !CBB_reserve(&child, &ptr, sig_len) || in TRUST_TOKEN_ISSUER_redeem() [all …]
|