/external/boringssl/src/crypto/evp/ |
D | p_ec.c | 117 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_ec_sign() argument 123 *siglen = ECDSA_size(ec); in pkey_ec_sign() 125 } else if (*siglen < (size_t)ECDSA_size(ec)) { in pkey_ec_sign() 133 *siglen = (size_t)sltmp; in pkey_ec_sign() 137 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, in pkey_ec_verify() argument 139 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->pkey->pkey.ec); in pkey_ec_verify()
|
D | p_ed25519.c | 27 size_t *siglen, const uint8_t *tbs, in pkey_ed25519_sign_message() argument 35 *siglen = 64; in pkey_ed25519_sign_message() 44 size_t siglen, const uint8_t *tbs, in pkey_ed25519_verify_message() argument 47 if (siglen != 64 || in pkey_ed25519_verify_message()
|
D | p_rsa.c | 171 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_rsa_sign() argument 178 *siglen = key_len; in pkey_rsa_sign() 182 if (*siglen < key_len) { in pkey_rsa_sign() 194 *siglen = out_len; in pkey_rsa_sign() 198 return RSA_sign_pss_mgf1(rsa, siglen, sig, *siglen, tbs, tbslen, in pkey_rsa_sign() 206 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); in pkey_rsa_sign() 210 size_t siglen, const uint8_t *tbs, in pkey_rsa_verify() argument 218 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); in pkey_rsa_verify() 222 rctx->saltlen, sig, siglen); in pkey_rsa_verify() 232 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, in pkey_rsa_verify()
|
D | internal.h | 199 int (*sign)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 202 int (*sign_message)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 205 int (*verify)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, 208 int (*verify_message)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen,
|
/external/nos/test/system-test-harness/src/ |
D | avb_tests.cc | 41 uint8_t *signature, size_t *siglen); 199 size_t siglen = *maxsig; in SignChallenge() local 217 EVP_DigestSignFinal(&md_ctx, NULL, &siglen); in SignChallenge() 218 if (siglen > *maxsig) { in SignChallenge() 219 std::cerr << "Signature length too long: " << siglen << " > " in SignChallenge() 223 *maxsig = siglen; in SignChallenge() 224 int code = EVP_DigestSignFinal(&md_ctx, signature, &siglen); in SignChallenge() 771 size_t siglen = sizeof(signature); in TEST_F() local 783 ASSERT_EQ(0, SignChallenge(&message, signature, &siglen)); in TEST_F() 788 code = Reset(client.get(), ResetRequest::PRODUCTION, signature, siglen); in TEST_F() [all …]
|
/external/nos/test/system-test-harness/tools/ |
D | avb_tools.cc | 135 size_t siglen = sizeof(signature); in ResetProduction() local 136 memset(signature, 0, siglen); in ResetProduction() 144 Reset(client, ResetRequest::PRODUCTION, signature, siglen); in ResetProduction()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa_test.cc | 225 unsigned int siglen; in TestGenerate() local 277 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa.get())) { in TestGenerate() 280 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa.get()) != in TestGenerate()
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 596 uint8_t *sigret, unsigned int *siglen, const RSA *rsa);
|
D | evp.h | 581 size_t siglen);
|
/external/valgrind/include/vki/ |
D | vki-solaris.h | 333 vki_uint32_t siglen; member
|
/external/valgrind/coregrind/m_syswrap/ |
D | syswrap-solaris.c | 9041 p->vki_da_u.result.siglen); 9144 p->vki_da_u.result.siglen);
|