Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 - 25 of 159) sorted by relevance

1234567

/third_party/openssl/demos/signature/
H A DEVP_Signature_demo.c74 size_t sig_len; in demo_sign() local
116 /* Call EVP_DigestSignFinal to get signature length sig_len */ in demo_sign()
117 if (!EVP_DigestSignFinal(sign_context, NULL, &sig_len)) { in demo_sign()
121 if (sig_len <= 0) { in demo_sign()
125 sig_value = OPENSSL_malloc(sig_len); in demo_sign()
130 if (!EVP_DigestSignFinal(sign_context, sig_value, &sig_len)) { in demo_sign()
134 *sig_out_len = sig_len; in demo_sign()
137 BIO_dump_indent_fp(stdout, sig_value, sig_len, 2); in demo_sign()
151 size_t sig_len, unsigned char *sig_value) in demo_verify()
191 if (EVP_DigestVerifyFinal(verify_context, sig_value, sig_len) < in demo_verify()
150 demo_verify(OSSL_LIB_CTX *libctx, const char *sig_name, size_t sig_len, unsigned char *sig_value) demo_verify() argument
209 size_t sig_len = 0; main() local
[all...]
H A Drsa_pss_direct.c38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument
88 if (EVP_PKEY_sign(ctx, NULL, sig_len, in sign()
95 *sig = OPENSSL_malloc(*sig_len); in sign()
102 if (EVP_PKEY_sign(ctx, *sig, sig_len, in sign()
124 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument
171 if (EVP_PKEY_verify(ctx, sig, sig_len, in verify()
191 size_t sig_len = 0; in main() local
193 if (sign(libctx, &sig, &sig_len) == 0) in main()
196 if (verify(libctx, sig, sig_len) == 0) in main()
H A Drsa_pss_hash.c33 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument
80 if (EVP_DigestSignFinal(mctx, NULL, sig_len) == 0) { in sign()
86 *sig = OPENSSL_malloc(*sig_len); in sign()
93 if (EVP_DigestSignFinal(mctx, *sig, sig_len) == 0) { in sign()
114 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument
158 if (EVP_DigestVerifyFinal(mctx, sig, sig_len) == 0) { in verify()
176 size_t sig_len = 0; in main() local
178 if (sign(libctx, &sig, &sig_len) == 0) in main()
181 if (verify(libctx, sig, sig_len) == 0) in main()
/third_party/mbedtls/library/
H A Dpk_wrap.c67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap()
92 if (sig_len < rsa_len) { in rsa_verify_wrap()
114 sig, sig_len); in rsa_verify_wrap()
132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap()
144 if (sig_len < rsa_len) { in rsa_verify_wrap()
159 if (sig_len > rsa_len) { in rsa_verify_wrap()
172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext()
188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext()
189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext()
211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext()
65 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument
130 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument
168 mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, mbedtls_rsa_context *rsa_ctx, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) mbedtls_pk_psa_rsa_sign_ext() argument
230 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument
254 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument
538 ecdsa_verify_psa(unsigned char *key, size_t key_len, psa_ecc_family_t curve, size_t curve_bits, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_psa() argument
602 ecdsa_opaque_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_opaque_verify_wrap() argument
633 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument
646 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument
671 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument
696 ecdsa_sign_psa(mbedtls_svc_key_id_t key_id, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) ecdsa_sign_psa() argument
734 ecdsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_opaque_sign_wrap() argument
754 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument
809 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument
876 eckey_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) eckey_verify_rs_wrap() argument
902 eckey_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) eckey_sign_rs_wrap() argument
1187 ecdsa_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) ecdsa_verify_rs_wrap() argument
1207 ecdsa_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) ecdsa_sign_rs_wrap() argument
1291 rsa_alt_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_alt_sign_wrap() argument
1341 size_t sig_len = 0; rsa_alt_check_pair() local
1503 rsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_opaque_sign_wrap() argument
[all...]
H A Dpk_wrap.h38 const unsigned char *sig, size_t sig_len);
43 unsigned char *sig, size_t sig_size, size_t *sig_len,
51 const unsigned char *sig, size_t sig_len,
57 unsigned char *sig, size_t sig_size, size_t *sig_len,
133 size_t *sig_len);
H A Dpk.c1045 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable()
1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable()
1086 sig, sig_len); in mbedtls_pk_verify_restartable()
1094 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify()
1097 sig, sig_len, NULL); in mbedtls_pk_verify()
1106 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext()
1126 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext()
1185 * mbedtls_psa_rsa_verify_hash requires the sig_len to be exact, in mbedtls_pk_verify_ext()
1186 * so for this reason the passed sig_len is overwritten. Smaller in mbedtls_pk_verify_ext()
1188 signature_length = sig_len > mbedtls_pk_get_le in mbedtls_pk_verify_ext()
1042 mbedtls_pk_verify_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_verify_restartable() argument
1092 mbedtls_pk_verify(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify() argument
1103 mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify_ext() argument
1233 mbedtls_pk_sign_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_sign_restartable() argument
1287 mbedtls_pk_sign(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign() argument
1300 mbedtls_pk_sign_ext(mbedtls_pk_type_t pk_type, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign_ext() argument
[all...]
/kernel/linux/linux-5.10/security/integrity/ima/
H A Dima_modsig.c46 size_t sig_len; in ima_read_modsig() local
64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig()
65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
67 /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ in ima_read_modsig()
68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig()
72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig()
79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig()
80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
/kernel/linux/linux-6.6/security/integrity/ima/
H A Dima_modsig.c46 size_t sig_len; in ima_read_modsig() local
64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig()
65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
67 /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ in ima_read_modsig()
68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig()
72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig()
79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig()
80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
/kernel/linux/linux-5.10/kernel/
H A Dmodule_signing.c23 size_t sig_len, modlen = info->len; in mod_verify_sig() local
37 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig()
38 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/
H A Dverify_pkcs7_sig.c49 __be32 sig_len; /* Length of signature data */ member
56 __u32 sig_len; member
151 data_item->sig_len = st.st_size; in populate_data_item_str()
159 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str()
163 if (ret != data_item->sig_len) { in populate_data_item_str()
183 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local
233 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod()
234 modlen -= sig_len + sizeof(ms); in populate_data_item_mod()
244 if (sig_len > sizeo in populate_data_item_mod()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ct/
H A Dct_sct.c169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument
173 sct->sig_len = sig_len; in SCT_set0_signature()
177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument
181 sct->sig_len = 0; in SCT_set1_signature()
184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature()
185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature()
190 sct->sig_len = sig_len; in SCT_set1_signature()
242 return sct->sig_len; in SCT_get0_signature()
[all...]
H A Dct_oct.c87 int sig_len; in o2i_SCT() local
126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT()
127 if (sig_len <= 0) { in o2i_SCT()
131 len -= sig_len; in o2i_SCT()
173 len = 4 + sct->sig_len; in i2o_SCT_signature()
190 s2n(sct->sig_len, p); in i2o_SCT_signature()
191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature()
216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
/third_party/openssl/crypto/ct/
H A Dct_sct.c169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument
173 sct->sig_len = sig_len; in SCT_set0_signature()
177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument
181 sct->sig_len = 0; in SCT_set1_signature()
184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature()
185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature()
190 sct->sig_len = sig_len; in SCT_set1_signature()
242 return sct->sig_len; in SCT_get0_signature()
[all...]
H A Dct_oct.c87 int sig_len; in o2i_SCT() local
126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT()
127 if (sig_len <= 0) { in o2i_SCT()
131 len -= sig_len; in o2i_SCT()
173 len = 4 + sct->sig_len; in i2o_SCT_signature()
190 s2n(sct->sig_len, p); in i2o_SCT_signature()
191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature()
216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
/kernel/linux/linux-6.6/kernel/module/
H A Dsigning.c46 size_t sig_len, modlen = info->len; in mod_verify_sig() local
60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig()
61 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/third_party/mbedtls/programs/pkey/
H A Decdsa.c89 size_t sig_len; in main() local
163 sig, sizeof(sig), &sig_len, in main()
168 mbedtls_printf(" ok (signature length = %u)\n", (unsigned int) sig_len); in main()
170 dump_buf(" + Signature: ", sig, sig_len); in main()
200 sig, sig_len)) != 0) { in main()
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dverify_pefile.c105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary()
108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary()
129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper()
144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper()
146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper()
163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper()
165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper()
166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper()
195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper()
[all...]
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dverify_pefile.c105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary()
108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary()
129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper()
144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper()
146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper()
163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper()
165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper()
166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper()
195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper()
[all...]
/third_party/openssl/test/
H A Decdsatest.c195 size_t sig_len; in test_builtin() local
247 || !TEST_ptr(sig = OPENSSL_malloc(sig_len = (size_t)temp)) in test_builtin()
251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin()
252 || !TEST_int_le(sig_len, ECDSA_size(eckey)) in test_builtin()
257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
262 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len - 1, tbs, sizeof(tbs)), -1) in test_builtin()
267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
312 offset = tbs[0] % sig_len; in test_builtin()
[all...]
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DServerKeyExchange.pm78 my $sig_len = unpack('n', substr($self->data, $ptr));
79 if (defined $sig_len) {
81 $sig = substr($self->data, $ptr, $sig_len);
82 $ptr += $sig_len;
/third_party/openssl/util/perl/TLSProxy/
H A DServerKeyExchange.pm78 my $sig_len = unpack('n', substr($self->data, $ptr));
79 if (defined $sig_len) {
81 $sig = substr($self->data, $ptr, $sig_len);
82 $ptr += $sig_len;
/kernel/linux/linux-5.10/arch/s390/kernel/
H A Dmachine_kexec_file.c31 unsigned long sig_len; in s390_verify_sig() local
49 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig()
50 if (sig_len >= kernel_len) in s390_verify_sig()
52 kernel_len -= sig_len; in s390_verify_sig()
68 kernel + kernel_len, sig_len, in s390_verify_sig()
74 kernel + kernel_len, sig_len, in s390_verify_sig()
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/
H A Dtest_verify_pkcs7_sig.c32 __u32 sig_len; member
76 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG()
79 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
/third_party/libwebsockets/lib/tls/openssl/
H A Dlws-genec.c476 uint8_t *sig, size_t sig_len)
502 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) {
510 return (int)sig_len;
522 uint8_t *sig, size_t sig_len)
538 if ((int)sig_len != (int)(keybytes * 2)) {
540 (int)sig_len, (int)(hs * 2));
605 const uint8_t *sig, size_t sig_len)
619 if ((int)sig_len != keybytes * 2) {
621 (int)sig_len, keybytes * 2);
/third_party/mbedtls/include/mbedtls/
H A Dpk.h729 * \param sig_len Signature length
740 * signature in \p sig but its length is less than \p sig_len,
745 const unsigned char *sig, size_t sig_len);
760 * \param sig_len Signature length
770 const unsigned char *sig, size_t sig_len,
784 * \param sig_len Signature length
790 * signature in \p sig but its length is less than \p sig_len,
807 const unsigned char *sig, size_t sig_len);
823 * \param sig_len On successful return,
843 unsigned char *sig, size_t sig_size, size_t *sig_len,
[all...]

Completed in 13 milliseconds

1234567