/third_party/openssl/demos/signature/ |
H A D | EVP_Signature_demo.c | 74 size_t sig_len; in demo_sign() local 116 /* Call EVP_DigestSignFinal to get signature length sig_len */ in demo_sign() 117 if (!EVP_DigestSignFinal(sign_context, NULL, &sig_len)) { in demo_sign() 121 if (sig_len <= 0) { in demo_sign() 125 sig_value = OPENSSL_malloc(sig_len); in demo_sign() 130 if (!EVP_DigestSignFinal(sign_context, sig_value, &sig_len)) { in demo_sign() 134 *sig_out_len = sig_len; in demo_sign() 137 BIO_dump_indent_fp(stdout, sig_value, sig_len, 2); in demo_sign() 151 size_t sig_len, unsigned char *sig_value) in demo_verify() 191 if (EVP_DigestVerifyFinal(verify_context, sig_value, sig_len) < in demo_verify() 150 demo_verify(OSSL_LIB_CTX *libctx, const char *sig_name, size_t sig_len, unsigned char *sig_value) demo_verify() argument 209 size_t sig_len = 0; main() local [all...] |
H A D | rsa_pss_direct.c | 38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 88 if (EVP_PKEY_sign(ctx, NULL, sig_len, in sign() 95 *sig = OPENSSL_malloc(*sig_len); in sign() 102 if (EVP_PKEY_sign(ctx, *sig, sig_len, in sign() 124 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 171 if (EVP_PKEY_verify(ctx, sig, sig_len, in verify() 191 size_t sig_len = 0; in main() local 193 if (sign(libctx, &sig, &sig_len) == 0) in main() 196 if (verify(libctx, sig, sig_len) == 0) in main()
|
H A D | rsa_pss_hash.c | 33 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 80 if (EVP_DigestSignFinal(mctx, NULL, sig_len) == 0) { in sign() 86 *sig = OPENSSL_malloc(*sig_len); in sign() 93 if (EVP_DigestSignFinal(mctx, *sig, sig_len) == 0) { in sign() 114 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 158 if (EVP_DigestVerifyFinal(mctx, sig, sig_len) == 0) { in verify() 176 size_t sig_len = 0; in main() local 178 if (sign(libctx, &sig, &sig_len) == 0) in main() 181 if (verify(libctx, sig, sig_len) == 0) in main()
|
/third_party/mbedtls/library/ |
H A D | pk_wrap.c | 67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() 92 if (sig_len < rsa_len) { in rsa_verify_wrap() 114 sig, sig_len); in rsa_verify_wrap() 132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() 144 if (sig_len < rsa_len) { in rsa_verify_wrap() 159 if (sig_len > rsa_len) { in rsa_verify_wrap() 172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext() 188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext() 189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext() 211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext() 65 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 130 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 168 mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, mbedtls_rsa_context *rsa_ctx, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) mbedtls_pk_psa_rsa_sign_ext() argument 230 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 254 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 538 ecdsa_verify_psa(unsigned char *key, size_t key_len, psa_ecc_family_t curve, size_t curve_bits, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_psa() argument 602 ecdsa_opaque_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_opaque_verify_wrap() argument 633 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 646 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 671 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 696 ecdsa_sign_psa(mbedtls_svc_key_id_t key_id, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) ecdsa_sign_psa() argument 734 ecdsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_opaque_sign_wrap() argument 754 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 809 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 876 eckey_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) eckey_verify_rs_wrap() argument 902 eckey_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) eckey_sign_rs_wrap() argument 1187 ecdsa_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) ecdsa_verify_rs_wrap() argument 1207 ecdsa_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) ecdsa_sign_rs_wrap() argument 1291 rsa_alt_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_alt_sign_wrap() argument 1341 size_t sig_len = 0; rsa_alt_check_pair() local 1503 rsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_opaque_sign_wrap() argument [all...] |
H A D | pk_wrap.h | 38 const unsigned char *sig, size_t sig_len); 43 unsigned char *sig, size_t sig_size, size_t *sig_len, 51 const unsigned char *sig, size_t sig_len, 57 unsigned char *sig, size_t sig_size, size_t *sig_len, 133 size_t *sig_len);
|
H A D | pk.c | 1045 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() 1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1086 sig, sig_len); in mbedtls_pk_verify_restartable() 1094 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() 1097 sig, sig_len, NULL); in mbedtls_pk_verify() 1106 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() 1126 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1185 * mbedtls_psa_rsa_verify_hash requires the sig_len to be exact, in mbedtls_pk_verify_ext() 1186 * so for this reason the passed sig_len is overwritten. Smaller in mbedtls_pk_verify_ext() 1188 signature_length = sig_len > mbedtls_pk_get_le in mbedtls_pk_verify_ext() 1042 mbedtls_pk_verify_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_verify_restartable() argument 1092 mbedtls_pk_verify(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify() argument 1103 mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify_ext() argument 1233 mbedtls_pk_sign_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_sign_restartable() argument 1287 mbedtls_pk_sign(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign() argument 1300 mbedtls_pk_sign_ext(mbedtls_pk_type_t pk_type, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign_ext() argument [all...] |
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 67 /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ in ima_read_modsig() 68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig() 72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig() 80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 67 /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ in ima_read_modsig() 68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig() 72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig() 80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | module_signing.c | 23 size_t sig_len, modlen = info->len; in mod_verify_sig() local 37 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 38 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | verify_pkcs7_sig.c | 49 __be32 sig_len; /* Length of signature data */ member 56 __u32 sig_len; member 151 data_item->sig_len = st.st_size; in populate_data_item_str() 159 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str() 163 if (ret != data_item->sig_len) { in populate_data_item_str() 183 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local 233 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod() 234 modlen -= sig_len + sizeof(ms); in populate_data_item_mod() 244 if (sig_len > sizeo in populate_data_item_mod() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() [all...] |
H A D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() [all...] |
H A D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
/kernel/linux/linux-6.6/kernel/module/ |
H A D | signing.c | 46 size_t sig_len, modlen = info->len; in mod_verify_sig() local 60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 61 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/third_party/mbedtls/programs/pkey/ |
H A D | ecdsa.c | 89 size_t sig_len; in main() local 163 sig, sizeof(sig), &sig_len, in main() 168 mbedtls_printf(" ok (signature length = %u)\n", (unsigned int) sig_len); in main() 170 dump_buf(" + Signature: ", sig, sig_len); in main() 200 sig, sig_len)) != 0) { in main()
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper() 146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper() 163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() [all...] |
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper() 146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper() 163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() [all...] |
/third_party/openssl/test/ |
H A D | ecdsatest.c | 195 size_t sig_len; in test_builtin() local 247 || !TEST_ptr(sig = OPENSSL_malloc(sig_len = (size_t)temp)) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 252 || !TEST_int_le(sig_len, ECDSA_size(eckey)) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 262 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len - 1, tbs, sizeof(tbs)), -1) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 312 offset = tbs[0] % sig_len; in test_builtin() [all...] |
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | machine_kexec_file.c | 31 unsigned long sig_len; in s390_verify_sig() local 49 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig() 50 if (sig_len >= kernel_len) in s390_verify_sig() 52 kernel_len -= sig_len; in s390_verify_sig() 68 kernel + kernel_len, sig_len, in s390_verify_sig() 74 kernel + kernel_len, sig_len, in s390_verify_sig()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | test_verify_pkcs7_sig.c | 32 __u32 sig_len; member 76 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG() 79 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | lws-genec.c | 476 uint8_t *sig, size_t sig_len) 502 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 510 return (int)sig_len; 522 uint8_t *sig, size_t sig_len) 538 if ((int)sig_len != (int)(keybytes * 2)) { 540 (int)sig_len, (int)(hs * 2)); 605 const uint8_t *sig, size_t sig_len) 619 if ((int)sig_len != keybytes * 2) { 621 (int)sig_len, keybytes * 2);
|
/third_party/mbedtls/include/mbedtls/ |
H A D | pk.h | 729 * \param sig_len Signature length 740 * signature in \p sig but its length is less than \p sig_len, 745 const unsigned char *sig, size_t sig_len); 760 * \param sig_len Signature length 770 const unsigned char *sig, size_t sig_len, 784 * \param sig_len Signature length 790 * signature in \p sig but its length is less than \p sig_len, 807 const unsigned char *sig, size_t sig_len); 823 * \param sig_len On successful return, 843 unsigned char *sig, size_t sig_size, size_t *sig_len, [all...] |