/external/kmod/libkmod/ |
D | libkmod-signature.c | 91 uint32_t sig_len; /* Length of signature data (big endian) */ member 112 size_t sig_len; in kmod_module_signature_info() local 131 sig_len = be32toh(get_unaligned(&modsig->sig_len)); in kmod_module_signature_info() 132 if (sig_len == 0 || in kmod_module_signature_info() 133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len)) in kmod_module_signature_info() 136 size -= modsig->key_id_len + sig_len; in kmod_module_signature_info()
|
/external/boringssl/src/crypto/ecdsa_extra/ |
D | ecdsa_asn1.c | 70 unsigned int *sig_len, const EC_KEY *eckey) { in ECDSA_sign() argument 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, in ECDSA_sign() 81 *sig_len = 0; in ECDSA_sign() 87 *sig_len = 0; in ECDSA_sign() 99 *sig_len = 0; in ECDSA_sign() 102 *sig_len = (unsigned)len; in ECDSA_sign() 111 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { in ECDSA_verify() argument 117 s = ECDSA_SIG_from_bytes(sig, sig_len); in ECDSA_verify() 125 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
|
/external/boringssl/src/tool/ |
D | sign.cc | 70 size_t sig_len = EVP_PKEY_size(key.get()); in Sign() local 71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); in Sign() 72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), in Sign() 77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) { in Sign()
|
D | speed.cc | 151 unsigned sig_len; in SpeedRSA() local 155 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { in SpeedRSA() 160 sig.get(), &sig_len, key); in SpeedRSA() 169 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { in SpeedRSA() 186 sizeof(fake_sha256_hash), sig.get(), sig_len, key); in SpeedRSA() 440 unsigned sig_len; in SpeedECDSACurve() local 443 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { in SpeedECDSACurve() 444 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, in SpeedECDSACurve() 452 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { in SpeedECDSACurve() 453 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, in SpeedECDSACurve()
|
/external/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 385 size_t sig_len = 0; in TEST() local 386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); in TEST() 389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); in TEST() 392 sig.resize(sig_len); in TEST() 393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); in TEST() 394 sig.resize(sig_len); in TEST() 401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); in TEST() 423 unsigned sig_len = sizeof(sig); in TEST() local 425 &sig_len, rsa.get())); in TEST() 433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); in TEST() [all …]
|
D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal() 100 *out_sig_len = sig_len; in EVP_SignFinal() 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
|
D | digestsign.c | 176 size_t sig_len) { in EVP_DigestVerifyFinal() argument 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal() 218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_DigestVerify() argument 222 EVP_DigestVerifyFinal(ctx, sig, sig_len); in EVP_DigestVerify() 230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len); in EVP_DigestVerify()
|
D | evp_ctx.c | 226 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, in EVP_PKEY_sign() argument 236 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len); in EVP_PKEY_sign() 249 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_PKEY_verify() argument 259 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len); in EVP_PKEY_verify() 316 const uint8_t *sig, size_t sig_len) { in EVP_PKEY_verify_recover() argument 325 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len); in EVP_PKEY_verify_recover()
|
/external/vboot_reference/utility/ |
D | verify_data.c | 52 int i, algorithm, sig_len; in main() local 74 sig_len = siglen_map[algorithm]; in main() 76 (signature = read_signature(argv[3], sig_len)) && in main() 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) { in main()
|
/external/vboot_reference/firmware/lib/cryptolib/ |
D | rsa.c | 132 const uint32_t sig_len, in RSAVerify() argument 143 if (sig_len != (key->len * sizeof(uint32_t))) { in RSAVerify() 158 buf = (uint8_t*) VbExMalloc(sig_len); in RSAVerify() 161 Memcpy(buf, sig, sig_len); in RSAVerify() 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { in RSAVerify()
|
/external/libconstrainedcrypto/ |
D | dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { in dsa_sig_unpack() argument 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { in dsa_sig_unpack() 87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) { in dsa_sig_unpack()
|
/external/boringssl/src/fipstools/ |
D | cavp_rsa2_siggen_test.cc | 80 size_t sig_len; in TestRSA2SigGen() local 87 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), in TestRSA2SigGen() 97 sig_len = sig_len_u; in TestRSA2SigGen() 101 EncodeHex(sig.data(), sig_len).c_str()); in TestRSA2SigGen()
|
D | test_fips.c | 186 unsigned sig_len; in main() local 190 &sig_len, rsa_key)) { in main() 195 hexdump(output, sig_len); in main() 199 hexdump(output, sig_len); in main() 201 output, sig_len, rsa_key)) { in main()
|
/external/vboot_reference/tests/ |
D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; in SpeedTestAlgorithm() local 58 signature = BufferFromFile(file_name, &sig_len); in SpeedTestAlgorithm() 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) in SpeedTestAlgorithm()
|
/external/syslinux/gpxe/src/crypto/axtls/ |
D | rsa.c | 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 299 block = (uint8_t *)malloc(sig_len); 302 dat_bi = bi_import(ctx, sig, sig_len); 308 bi_export(ctx, decrypted_bi, block, sig_len); 312 while (block[i++] && i < sig_len); 313 size = sig_len - i;
|
D | crypto.h | 178 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 236 uint16_t sig_len; member
|
/external/tensorflow/tensorflow/core/platform/cloud/ |
D | oauth_client.cc | 114 size_t sig_len = 0; in CreateSignature() local 115 if (EVP_DigestSignFinal(md_ctx.get(), nullptr, &sig_len) != 1) { in CreateSignature() 118 std::unique_ptr<unsigned char[]> sig(new unsigned char[sig_len]); in CreateSignature() 119 if (EVP_DigestSignFinal(md_ctx.get(), sig.get(), &sig_len) != 1) { in CreateSignature() 123 return Base64Encode(StringPiece(reinterpret_cast<char*>(sig.get()), sig_len), in CreateSignature()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 550 const uint8_t *sig, size_t sig_len, RSA *rsa) { in RSA_verify() argument 574 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, in RSA_verify() 603 const uint8_t *sig, size_t sig_len) { in RSA_verify_pss_mgf1() argument 617 if (!RSA_verify_raw(rsa, &em_len, em, em_len, sig, sig_len, RSA_NO_PADDING)) { in RSA_verify_pss_mgf1() 820 unsigned sig_len = RSA_size(key); in RSA_check_fips() local 821 uint8_t *sig = OPENSSL_malloc(sig_len); in RSA_check_fips() 827 if (!RSA_sign(NID_sha256, data, sizeof(data), sig, &sig_len, key)) { in RSA_check_fips() 835 if (!RSA_verify(NID_sha256, data, sizeof(data), sig, sig_len, key)) { in RSA_check_fips()
|
/external/boringssl/src/include/openssl/ |
D | evp.h | 316 size_t sig_len); 321 size_t sig_len, const uint8_t *data, 389 size_t sig_len, EVP_PKEY *pkey); 494 size_t *sig_len, const uint8_t *digest, 512 size_t sig_len, const uint8_t *digest,
|
D | ecdsa.h | 78 unsigned int *sig_len, const EC_KEY *key); 86 size_t sig_len, const EC_KEY *key);
|
D | dsa.h | 231 size_t sig_len, const DSA *dsa); 241 size_t sig_len, const DSA *dsa);
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 760 const uint8_t *sig, size_t sig_len, const DSA *dsa) { in DSA_verify() argument 762 if (!DSA_check_signature(&valid, digest, digest_len, sig, sig_len, dsa)) { in DSA_verify() 769 size_t digest_len, const uint8_t *sig, size_t sig_len, in DSA_check_signature() argument 781 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) { in DSA_check_signature() 787 if (der_len < 0 || (size_t)der_len != sig_len || in DSA_check_signature() 788 OPENSSL_memcmp(sig, der, sig_len)) { in DSA_check_signature()
|
D | dsa_test.cc | 289 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { in TestVerify() argument 296 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get()); in TestVerify()
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
D | ecdsa_test.cc | 181 unsigned sig_len = ECDSA_size(eckey.get()); in TEST() local 182 std::vector<uint8_t> signature(sig_len); in TEST() 184 ECDSA_sign(0, digest, 20, signature.data(), &sig_len, eckey.get())); in TEST() 185 signature.resize(sig_len); in TEST()
|
/external/libconstrainedcrypto/include/constrainedcrypto/ |
D | dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|