/third_party/mbedtls/library/ |
H A D | pk_wrap.c | 67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() 92 if (sig_len < rsa_len) { in rsa_verify_wrap() 114 sig, sig_len); in rsa_verify_wrap() 132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() 144 if (sig_len < rsa_len) { in rsa_verify_wrap() 159 if (sig_len > rsa_len) { in rsa_verify_wrap() 172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext() 188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext() 189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext() 211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext() 65 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 130 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 168 mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, mbedtls_rsa_context *rsa_ctx, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) mbedtls_pk_psa_rsa_sign_ext() argument 230 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 254 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 538 ecdsa_verify_psa(unsigned char *key, size_t key_len, psa_ecc_family_t curve, size_t curve_bits, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_psa() argument 602 ecdsa_opaque_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_opaque_verify_wrap() argument 633 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 646 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 671 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 696 ecdsa_sign_psa(mbedtls_svc_key_id_t key_id, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) ecdsa_sign_psa() argument 734 ecdsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_opaque_sign_wrap() argument 754 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 809 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 876 eckey_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) eckey_verify_rs_wrap() argument 902 eckey_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) eckey_sign_rs_wrap() argument 1187 ecdsa_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) ecdsa_verify_rs_wrap() argument 1207 ecdsa_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) ecdsa_sign_rs_wrap() argument 1291 rsa_alt_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_alt_sign_wrap() argument 1341 size_t sig_len = 0; rsa_alt_check_pair() local 1503 rsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_opaque_sign_wrap() argument [all...] |
H A D | pk_wrap.h | 38 const unsigned char *sig, size_t sig_len); 43 unsigned char *sig, size_t sig_size, size_t *sig_len, 51 const unsigned char *sig, size_t sig_len, 57 unsigned char *sig, size_t sig_size, size_t *sig_len, 133 size_t *sig_len);
|
H A D | pk.c | 1045 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() 1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1086 sig, sig_len); in mbedtls_pk_verify_restartable() 1094 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() 1097 sig, sig_len, NULL); in mbedtls_pk_verify() 1106 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() 1126 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1185 * mbedtls_psa_rsa_verify_hash requires the sig_len to be exact, in mbedtls_pk_verify_ext() 1186 * so for this reason the passed sig_len is overwritten. Smaller in mbedtls_pk_verify_ext() 1188 signature_length = sig_len > mbedtls_pk_get_le in mbedtls_pk_verify_ext() 1042 mbedtls_pk_verify_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_verify_restartable() argument 1092 mbedtls_pk_verify(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify() argument 1103 mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify_ext() argument 1233 mbedtls_pk_sign_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_sign_restartable() argument 1287 mbedtls_pk_sign(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign() argument 1300 mbedtls_pk_sign_ext(mbedtls_pk_type_t pk_type, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign_ext() argument [all...] |
H A D | x509write_csr.c | 142 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 229 sig, sig_size, &sig_len, in x509write_csr_der_internal() 255 * Note: mbedtls_x509_write_sig will check for c2 - ( buf + len ) < sig_len in x509write_csr_der_internal() 261 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
|
/third_party/openssl/demos/signature/ |
H A D | EVP_Signature_demo.c | 74 size_t sig_len; in demo_sign() local 116 /* Call EVP_DigestSignFinal to get signature length sig_len */ in demo_sign() 117 if (!EVP_DigestSignFinal(sign_context, NULL, &sig_len)) { in demo_sign() 121 if (sig_len <= 0) { in demo_sign() 125 sig_value = OPENSSL_malloc(sig_len); in demo_sign() 130 if (!EVP_DigestSignFinal(sign_context, sig_value, &sig_len)) { in demo_sign() 134 *sig_out_len = sig_len; in demo_sign() 137 BIO_dump_indent_fp(stdout, sig_value, sig_len, 2); in demo_sign() 151 size_t sig_len, unsigned char *sig_value) in demo_verify() 191 if (EVP_DigestVerifyFinal(verify_context, sig_value, sig_len) < in demo_verify() 150 demo_verify(OSSL_LIB_CTX *libctx, const char *sig_name, size_t sig_len, unsigned char *sig_value) demo_verify() argument 209 size_t sig_len = 0; main() local [all...] |
H A D | rsa_pss_direct.c | 38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 88 if (EVP_PKEY_sign(ctx, NULL, sig_len, in sign() 95 *sig = OPENSSL_malloc(*sig_len); in sign() 102 if (EVP_PKEY_sign(ctx, *sig, sig_len, in sign() 124 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 171 if (EVP_PKEY_verify(ctx, sig, sig_len, in verify() 191 size_t sig_len = 0; in main() local 193 if (sign(libctx, &sig, &sig_len) == 0) in main() 196 if (verify(libctx, sig, sig_len) == 0) in main()
|
H A D | rsa_pss_hash.c | 33 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() argument 80 if (EVP_DigestSignFinal(mctx, NULL, sig_len) == 0) { in sign() 86 *sig = OPENSSL_malloc(*sig_len); in sign() 93 if (EVP_DigestSignFinal(mctx, *sig, sig_len) == 0) { in sign() 114 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) in verify() argument 158 if (EVP_DigestVerifyFinal(mctx, sig, sig_len) == 0) { in verify() 176 size_t sig_len = 0; in main() local 178 if (sign(libctx, &sig, &sig_len) == 0) in main() 181 if (verify(libctx, sig, sig_len) == 0) in main()
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() [all...] |
H A D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() [all...] |
H A D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
/third_party/openssl/test/ |
H A D | ecdsatest.c | 195 size_t sig_len; in test_builtin() local 247 || !TEST_ptr(sig = OPENSSL_malloc(sig_len = (size_t)temp)) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 252 || !TEST_int_le(sig_len, ECDSA_size(eckey)) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 262 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len - 1, tbs, sizeof(tbs)), -1) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 312 offset = tbs[0] % sig_len; in test_builtin() [all...] |
H A D | acvp_test.c | 94 size_t sig_len; in sig_gen() local 97 sig_len = sz; in sig_gen() 102 || !TEST_int_gt(EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len), 0)) in sig_gen() 105 *sig_out_len = sig_len; in sig_gen() 206 static int get_ecdsa_sig_rs_bytes(const unsigned char *sig, size_t sig_len, in get_ecdsa_sig_rs_bytes() argument 214 ECDSA_SIG *sign = d2i_ECDSA_SIG(NULL, &sig, sig_len); in get_ecdsa_sig_rs_bytes() 251 size_t sig_len = 0, rlen = 0, slen = 0; in ecdsa_siggen_test() local 260 &sig, &sig_len)) in ecdsa_siggen_test() 261 || !TEST_true(get_ecdsa_sig_rs_bytes(sig, sig_len, &r, &s, &rlen, &slen))) in ecdsa_siggen_test() 280 size_t sig_len; in ecdsa_sigver_test() local 549 get_dsa_sig_rs_bytes(const unsigned char *sig, size_t sig_len, unsigned char **r, unsigned char **s, size_t *r_len, size_t *s_len) get_dsa_sig_rs_bytes() argument 594 size_t sig_len = 0, rlen = 0, slen = 0; dsa_siggen_test() local 621 size_t sig_len; dsa_sigver_test() local 1163 size_t sig_len = 0, n_len = 0, e_len = 0; rsa_siggen_test() local [all...] |
/third_party/mbedtls/programs/pkey/ |
H A D | ecdsa.c | 89 size_t sig_len; in main() local 163 sig, sizeof(sig), &sig_len, in main() 168 mbedtls_printf(" ok (signature length = %u)\n", (unsigned int) sig_len); in main() 170 dump_buf(" + Signature: ", sig, sig_len); in main() 200 sig, sig_len)) != 0) { in main()
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | lws-genec.c | 476 uint8_t *sig, size_t sig_len) 502 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 510 return (int)sig_len; 522 uint8_t *sig, size_t sig_len) 538 if ((int)sig_len != (int)(keybytes * 2)) { 540 (int)sig_len, (int)(hs * 2)); 605 const uint8_t *sig, size_t sig_len) 619 if ((int)sig_len != keybytes * 2) { 621 (int)sig_len, keybytes * 2);
|
H A D | lws-genrsa.c | 286 size_t sig_len) 298 (unsigned int)sig_len, ctx->rsa); 311 (int)sig_len); 330 size_t sig_len) 382 if (EVP_DigestSignFinal(mdctx, sig, &sig_len)) { 388 used = (unsigned int)sig_len; 284 lws_genrsa_hash_sig_verify(struct lws_genrsa_ctx *ctx, const uint8_t *in, enum lws_genhash_types hash_type, const uint8_t *sig, size_t sig_len) global() argument 328 lws_genrsa_hash_sign(struct lws_genrsa_ctx *ctx, const uint8_t *in, enum lws_genhash_types hash_type, uint8_t *sig, size_t sig_len) global() argument
|
/third_party/mbedtls/include/mbedtls/ |
H A D | pk.h | 729 * \param sig_len Signature length 740 * signature in \p sig but its length is less than \p sig_len, 745 const unsigned char *sig, size_t sig_len); 760 * \param sig_len Signature length 770 const unsigned char *sig, size_t sig_len, 784 * \param sig_len Signature length 790 * signature in \p sig but its length is less than \p sig_len, 807 const unsigned char *sig, size_t sig_len); 823 * \param sig_len On successful return, 843 unsigned char *sig, size_t sig_size, size_t *sig_len, [all...] |
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify() 41 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) ECDSA_verify() argument
|
/third_party/openssl/crypto/ec/ |
H A D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify() 41 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) ECDSA_verify() argument
|
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-genec.h | 159 * \param sig_len: length of the signature we are checking in bytes 176 const uint8_t *sig, size_t sig_len); 185 * \param sig_len: length of the buffer (must be >= length of key N) 199 uint8_t *sig, size_t sig_len);
|
H A D | lws-genrsa.h | 195 * \param sig_len: length of the signature we are checking in bytes 209 const uint8_t *sig, size_t sig_len); 217 * \param sig_len: length of the buffer (must be >= length of key N) 219 * Returns <0 for error, or \p sig_len for success. 230 uint8_t *sig, size_t sig_len);
|
/third_party/fsverity-utils/lib/ |
H A D | sign_digest.c | 126 size_t pkcs7_data_len, sig_len; in sign_pkcs7() local 152 sig_len = EVP_PKEY_size(pkey); in sign_pkcs7() 153 sig = libfsverity_zalloc(sig_len); in sign_pkcs7() 158 if (!EVP_DigestSign(&md_ctx, sig, &sig_len, data_to_sign, data_size)) { in sign_pkcs7() 200 !CBB_add_bytes(&signature, sig, sig_len) || in sign_pkcs7()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 56 size_t sig_len; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
|