/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 231 static int dsa_sign(void *vpdsactx, unsigned char *sig, size_t *siglen, in dsa_sign() argument 244 *siglen = dsasize; in dsa_sign() 258 *siglen = sltmp; in dsa_sign() 262 static int dsa_verify(void *vpdsactx, const unsigned char *sig, size_t siglen, in dsa_verify() argument 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify() 333 int dsa_digest_sign_final(void *vpdsactx, unsigned char *sig, size_t *siglen, in dsa_digest_sign_final() argument 359 return dsa_sign(vpdsactx, sig, siglen, sigsize, digest, (size_t)dlen); in dsa_digest_sign_final() 364 size_t siglen) in dsa_digest_verify_final() 383 return dsa_verify(vpdsactx, sig, siglen, digest, (size_t)dlen); in dsa_digest_verify_final() 363 dsa_digest_verify_final(void *vpdsactx, const unsigned char *sig, size_t siglen) dsa_digest_verify_final() argument
|
H A D | sm2_sig.c | 157 static int sm2sig_sign(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_sign() argument 167 *siglen = ecsize; in sm2sig_sign() 181 *siglen = sltmp; in sm2sig_sign() 185 static int sm2sig_verify(void *vpsm2ctx, const unsigned char *sig, size_t siglen, in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify() 284 int sm2sig_digest_sign_final(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_digest_sign_final() argument 304 return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen); in sm2sig_digest_sign_final() 309 size_t siglen) in sm2sig_digest_verify_final() 324 return sm2sig_verify(vpsm2ctx, sig, siglen, digest, (size_t)dlen); in sm2sig_digest_verify_final() 308 sm2sig_digest_verify_final(void *vpsm2ctx, const unsigned char *sig, size_t siglen) sm2sig_digest_verify_final() argument
|
/third_party/openssl/providers/implementations/signature/ |
H A D | ecdsa_sig.c | 169 static int ecdsa_sign(void *vctx, unsigned char *sig, size_t *siglen, in ecdsa_sign() argument 181 *siglen = ecsize; in ecdsa_sign() 200 *siglen = sltmp; in ecdsa_sign() 204 static int ecdsa_verify(void *vctx, const unsigned char *sig, size_t siglen, in ecdsa_verify() argument 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify() 336 int ecdsa_digest_sign_final(void *vctx, unsigned char *sig, size_t *siglen, in ecdsa_digest_sign_final() argument 354 return ecdsa_sign(vctx, sig, siglen, sigsize, digest, (size_t)dlen); in ecdsa_digest_sign_final() 358 size_t siglen) in ecdsa_digest_verify_final() 370 return ecdsa_verify(ctx, sig, siglen, digest, (size_t)dlen); in ecdsa_digest_verify_final() 357 ecdsa_digest_verify_final(void *vctx, const unsigned char *sig, size_t siglen) ecdsa_digest_verify_final() argument
|
H A D | dsa_sig.c | 231 static int dsa_sign(void *vpdsactx, unsigned char *sig, size_t *siglen, in dsa_sign() argument 244 *siglen = dsasize; in dsa_sign() 258 *siglen = sltmp; in dsa_sign() 262 static int dsa_verify(void *vpdsactx, const unsigned char *sig, size_t siglen, in dsa_verify() argument 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify() 333 int dsa_digest_sign_final(void *vpdsactx, unsigned char *sig, size_t *siglen, in dsa_digest_sign_final() argument 359 return dsa_sign(vpdsactx, sig, siglen, sigsize, digest, (size_t)dlen); in dsa_digest_sign_final() 364 size_t siglen) in dsa_digest_verify_final() 383 return dsa_verify(vpdsactx, sig, siglen, digest, (size_t)dlen); in dsa_digest_verify_final() 363 dsa_digest_verify_final(void *vpdsactx, const unsigned char *sig, size_t siglen) dsa_digest_verify_final() argument
|
H A D | sm2_sig.c | 157 static int sm2sig_sign(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_sign() argument 167 *siglen = ecsize; in sm2sig_sign() 181 *siglen = sltmp; in sm2sig_sign() 185 static int sm2sig_verify(void *vpsm2ctx, const unsigned char *sig, size_t siglen, in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify() 284 int sm2sig_digest_sign_final(void *vpsm2ctx, unsigned char *sig, size_t *siglen, in sm2sig_digest_sign_final() argument 304 return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen); in sm2sig_digest_sign_final() 309 size_t siglen) in sm2sig_digest_verify_final() 324 return sm2sig_verify(vpsm2ctx, sig, siglen, digest, (size_t)dlen); in sm2sig_digest_verify_final() 308 sm2sig_digest_verify_final(void *vpsm2ctx, const unsigned char *sig, size_t siglen) sm2sig_digest_verify_final() argument
|
/kernel/linux/linux-5.10/lib/ |
H A D | digsig.c | 68 const char *sig, int siglen, in digsig_verify_rsa() 134 nret = siglen; in digsig_verify_rsa() 188 * @siglen: length of the signature 199 int digsig_verify(struct key *keyring, const char *sig, int siglen, in digsig_verify() argument 209 if (siglen < sizeof(*sh) + 2) in digsig_verify() 249 err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh), in digsig_verify() 67 digsig_verify_rsa(struct key *key, const char *sig, int siglen, const char *h, int hlen) digsig_verify_rsa() argument
|
/kernel/linux/linux-6.6/lib/ |
H A D | digsig.c | 68 const char *sig, int siglen, in digsig_verify_rsa() 134 nret = siglen; in digsig_verify_rsa() 188 * @siglen: length of the signature 199 int digsig_verify(struct key *keyring, const char *sig, int siglen, in digsig_verify() argument 209 if (siglen < sizeof(*sh) + 2) in digsig_verify() 249 err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh), in digsig_verify() 67 digsig_verify_rsa(struct key *key, const char *sig, int siglen, const char *h, int hlen) digsig_verify_rsa() argument
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | dgst.c | 28 EVP_PKEY *key, unsigned char *sigin, int siglen, 108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main() local 400 siglen = EVP_PKEY_get_size(sigkey); in dgst_main() 401 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 402 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 404 if (siglen <= 0) { in dgst_main() 439 siglen, NULL, md_name, "stdin"); in dgst_main() 455 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 547 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() 546 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, int xoflen, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file) do_fp() argument [all...] |
H A D | pkeyutl.c | 39 int filesize, unsigned char *sig, int siglen, 114 int buf_inlen = 0, siglen = -1; in pkeyutl_main() local 413 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main() 415 if (siglen < 0) { in pkeyutl_main() 453 rv = do_raw_keyop(pkey_op, mctx, pkey, in, filesize, sig, siglen, in pkeyutl_main() 456 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, in pkeyutl_main() 715 int filesize, unsigned char *sig, int siglen, in do_raw_keyop() 739 rv = EVP_DigestVerify(mctx, sig, (size_t)siglen, mbuf, buf_len); in do_raw_keyop() 773 rv = EVP_DigestVerifyFinal(mctx, sig, (size_t)siglen); in do_raw_keyop() 713 do_raw_keyop(int pkey_op, EVP_MD_CTX *mctx, EVP_PKEY *pkey, BIO *in, int filesize, unsigned char *sig, int siglen, unsigned char **out, size_t *poutlen) do_raw_keyop() argument
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | signature.c | 631 unsigned char *sig, size_t *siglen, in EVP_PKEY_sign() 649 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign() 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 660 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 675 const unsigned char *sig, size_t siglen, in EVP_PKEY_verify() 693 ret = ctx->op.sig.signature->verify(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify() 719 const unsigned char *sig, size_t siglen) in EVP_PKEY_verify_recover() 739 sig, siglen); in EVP_PKEY_verify_recover() 630 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) EVP_PKEY_sign() argument 674 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) EVP_PKEY_verify() argument 717 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) EVP_PKEY_verify_recover() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 134 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() 199 *siglen = ret; in pkey_rsa_sign() 205 const unsigned char *sig, size_t siglen) in pkey_rsa_verifyrecover() 220 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, rsa, in pkey_rsa_verifyrecover() 239 sig, siglen, rsa); in pkey_rsa_verifyrecover() 247 ret = RSA_public_decrypt(siglen, sig, rout, rsa, rctx->pad_mode); in pkey_rsa_verifyrecover() 256 const unsigned char *sig, size_t siglen, in pkey_rsa_verify() 271 sig, siglen, rsa); in pkey_rsa_verify() 277 if (pkey_rsa_verifyrecover(ctx, NULL, &rslen, sig, siglen) <= 0) in pkey_rsa_verify() 283 ret = RSA_public_decrypt(siglen, si in pkey_rsa_verify() 133 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) pkey_rsa_sign() argument 203 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) pkey_rsa_verifyrecover() argument 255 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) pkey_rsa_verify() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | signature.c | 631 unsigned char *sig, size_t *siglen, in EVP_PKEY_sign() 649 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign() 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 660 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 675 const unsigned char *sig, size_t siglen, in EVP_PKEY_verify() 693 ret = ctx->op.sig.signature->verify(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify() 719 const unsigned char *sig, size_t siglen) in EVP_PKEY_verify_recover() 739 sig, siglen); in EVP_PKEY_verify_recover() 630 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) EVP_PKEY_sign() argument 674 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) EVP_PKEY_verify() argument 717 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) EVP_PKEY_verify_recover() argument [all...] |
/third_party/openssl/apps/ |
H A D | dgst.c | 28 EVP_PKEY *key, unsigned char *sigin, int siglen, 108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main() local 400 siglen = EVP_PKEY_get_size(sigkey); in dgst_main() 401 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 402 siglen = BIO_read(sigbio, sigbuf, siglen); in dgst_main() 404 if (siglen <= 0) { in dgst_main() 439 siglen, NULL, md_name, "stdin"); in dgst_main() 455 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 547 EVP_PKEY *key, unsigned char *sigin, int siglen, in do_fp() 546 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, int xoflen, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file) do_fp() argument [all...] |
H A D | pkeyutl.c | 39 int filesize, unsigned char *sig, int siglen, 114 int buf_inlen = 0, siglen = -1; in pkeyutl_main() local 413 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main() 415 if (siglen < 0) { in pkeyutl_main() 453 rv = do_raw_keyop(pkey_op, mctx, pkey, in, filesize, sig, siglen, in pkeyutl_main() 456 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, in pkeyutl_main() 715 int filesize, unsigned char *sig, int siglen, in do_raw_keyop() 739 rv = EVP_DigestVerify(mctx, sig, (size_t)siglen, mbuf, buf_len); in do_raw_keyop() 773 rv = EVP_DigestVerifyFinal(mctx, sig, (size_t)siglen); in do_raw_keyop() 713 do_raw_keyop(int pkey_op, EVP_MD_CTX *mctx, EVP_PKEY *pkey, BIO *in, int filesize, unsigned char *sig, int siglen, unsigned char **out, size_t *poutlen) do_raw_keyop() argument
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 134 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() 199 *siglen = ret; in pkey_rsa_sign() 205 const unsigned char *sig, size_t siglen) in pkey_rsa_verifyrecover() 220 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, rsa, in pkey_rsa_verifyrecover() 239 sig, siglen, rsa); in pkey_rsa_verifyrecover() 247 ret = RSA_public_decrypt(siglen, sig, rout, rsa, rctx->pad_mode); in pkey_rsa_verifyrecover() 256 const unsigned char *sig, size_t siglen, in pkey_rsa_verify() 271 sig, siglen, rsa); in pkey_rsa_verify() 277 if (pkey_rsa_verifyrecover(ctx, NULL, &rslen, sig, siglen) <= 0) in pkey_rsa_verify() 283 ret = RSA_public_decrypt(siglen, si in pkey_rsa_verify() 133 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) pkey_rsa_sign() argument 203 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) pkey_rsa_verifyrecover() argument 255 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) pkey_rsa_verify() argument [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | tracepoint.h | 88 __field(u32, siglen) 95 __entry->siglen = *((u8 *)data + 3) * 4; 97 (u8 *)data + 4, __entry->siglen); 99 TP_printk("bcdc: prio=%d siglen=%d", __entry->prio, __entry->siglen)
|
/kernel/linux/linux-5.10/security/integrity/ |
H A D | digsig.c | 60 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument 65 if (siglen < 2) in integrity_digsig_verify() 75 return digsig_verify(keyring, sig + 1, siglen - 1, digest, in integrity_digsig_verify() 78 return asymmetric_verify(keyring, sig, siglen, digest, in integrity_digsig_verify()
|
/kernel/linux/linux-6.6/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | tracepoint.h | 89 __field(u32, siglen) 96 __entry->siglen = *((u8 *)data + 3) * 4; 98 (u8 *)data + 4, __entry->siglen); 100 TP_printk("bcdc: prio=%d siglen=%d", __entry->prio, __entry->siglen)
|
/kernel/linux/linux-6.6/security/integrity/ |
H A D | digsig.c | 61 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument 66 if (siglen < 2) in integrity_digsig_verify() 76 return digsig_verify(keyring, sig + 1, siglen - 1, digest, in integrity_digsig_verify() 80 return asymmetric_verify(keyring, sig, siglen, digest, in integrity_digsig_verify()
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_oct.c | 26 size_t siglen; in o2i_SCT_signature() local 55 n2s(p, siglen); in o2i_SCT_signature() 57 if (siglen > len_remaining) { in o2i_SCT_signature() 62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature() 64 len_remaining -= siglen; in o2i_SCT_signature() 65 *in = p + siglen; in o2i_SCT_signature()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_oct.c | 26 size_t siglen; in o2i_SCT_signature() local 55 n2s(p, siglen); in o2i_SCT_signature() 57 if (siglen > len_remaining) { in o2i_SCT_signature() 62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature() 64 len_remaining -= siglen; in o2i_SCT_signature() 65 *in = p + siglen; in o2i_SCT_signature()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | digsig.h | 47 int digsig_verify(struct key *keyring, const char *sig, int siglen, 53 int siglen, const char *digest, int digestlen) in digsig_verify() 52 digsig_verify(struct key *keyring, const char *sig, int siglen, const char *digest, int digestlen) digsig_verify() argument
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | digsig.h | 47 int digsig_verify(struct key *keyring, const char *sig, int siglen, 53 int siglen, const char *digest, int digestlen) in digsig_verify() 52 digsig_verify(struct key *keyring, const char *sig, int siglen, const char *digest, int digestlen) digsig_verify() argument
|
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pem_sign.c | 29 unsigned int *siglen, EVP_PKEY *pkey) in PEM_SignFinal() 45 *siglen = i; in PEM_SignFinal() 28 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) PEM_SignFinal() argument
|
/third_party/openssl/crypto/pem/ |
H A D | pem_sign.c | 29 unsigned int *siglen, EVP_PKEY *pkey) in PEM_SignFinal() 45 *siglen = i; in PEM_SignFinal() 28 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) PEM_SignFinal() argument
|