| /src/crypto/external/apache2/openssl/dist/fuzz/ |
| ml-dsa.c | 305 size_t sig_len = 0, tbslen; local 315 if (!consume_size_t(*buf, len, &tbslen)) { 316 fprintf(stderr, "Failed to set tbslen"); 319 /* Keep tbslen within a reasonable value we can malloc */ 320 tbslen = (tbslen % 2048) + 1; 322 if ((tbs = OPENSSL_malloc(tbslen)) == NULL 324 || !RAND_bytes_ex(NULL, tbs, tbslen, 0)) { 337 || EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, tbslen) <= 0 339 || EVP_PKEY_sign(ctx, sig, &sig_len, tbs, tbslen) <= 0) 384 size_t sig_len, tbslen; local [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 152 const unsigned char *tbs, size_t tbslen) 174 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { 182 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, 193 const unsigned char *tbs, size_t tbslen) 215 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) { 223 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey [all...] |
| dsa_sig.c | 232 size_t sigsize, const unsigned char *tbs, size_t tbslen) 251 if (mdsize != 0 && tbslen != mdsize) 254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); 263 const unsigned char *tbs, size_t tbslen) 268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) 271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa);
|
| sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) 174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); 186 const unsigned char *tbs, size_t tbslen) 190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 386 const unsigned char *tbs, size_t tbslen) 420 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { 432 tbs, tbslen, md, &mdlen) 438 tbslen = mdlen; 439 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { 450 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey [all...] |
| sm2_sig.c | 162 size_t sigsize, const unsigned char *tbs, size_t tbslen) 178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); 190 const unsigned char *tbs, size_t tbslen) 194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec);
|
| ecdsa_sig.c | 325 const unsigned char *tbs, size_t tbslen) 348 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 356 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp, 361 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, 409 size_t sigsize, const unsigned char *tbs, size_t tbslen) 421 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) 425 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); 441 const unsigned char *tbs, size_t tbslen) 445 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) 448 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec) [all...] |
| ml_dsa_sig.c | 209 const uint8_t *tbs, size_t tbslen) 211 return ml_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); 233 const uint8_t *tbs, size_t tbslen) 235 return ml_dsa_verify(vctx, sig, siglen, tbs, tbslen);
|
| slh_dsa_sig.c | 231 const uint8_t *tbs, size_t tbslen) 233 return slh_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); 254 const uint8_t *tbs, size_t tbslen) 256 return slh_dsa_verify(vctx, sig, siglen, tbs, tbslen);
|
| dsa_sig.c | 333 const unsigned char *tbs, size_t tbslen) 357 if (mdsize != 0 && tbslen != mdsize) 360 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, 414 size_t sigsize, const unsigned char *tbs, size_t tbslen) 426 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) 430 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); 442 const unsigned char *tbs, size_t tbslen) 447 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) 450 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); 494 const unsigned char *tbs, size_t tbslen) [all...] |
| rsa_sig.c | 678 const unsigned char *tbs, size_t tbslen) 699 if (tbslen != mdsize) { 713 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, 726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { 729 RSA_size(prsactx->rsa), tbslen + 1); 736 memcpy(prsactx->tbuf, tbs, tbslen); 737 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); 738 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, 745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, 810 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_pmeth.c | 79 size_t tbslen) 95 if (tbslen != (size_t)md_size) 99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 109 const unsigned char *tbs, size_t tbslen) 124 if (tbslen != (size_t)md_size) 128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
|
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_pmeth.c | 79 size_t tbslen) 91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 104 const unsigned char *tbs, size_t tbslen) 115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_pmeth.c | 73 size_t tbslen) 80 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_size(dctx->md)) 83 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 93 const unsigned char *tbs, size_t tbslen) 99 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_size(dctx->md)) 102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| m_sigver.c | 164 const unsigned char *tbs, size_t tbslen) 167 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); 168 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) 211 size_t siglen, const unsigned char *tbs, size_t tbslen) 214 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); 215 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0)
|
| pmeth_fn.c | 54 const unsigned char *tbs, size_t tbslen) 66 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 88 const unsigned char *tbs, size_t tbslen) 99 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_pmeth.c | 126 size_t tbslen) 133 if (tbslen != (size_t)EVP_MD_size(rctx->md)) { 143 tbs, tbslen, sig, &sltmp, rsa); 149 if ((size_t)EVP_PKEY_size(ctx->pkey) < tbslen + 1) { 157 memcpy(rctx->tbuf, tbs, tbslen); 158 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_type(rctx->md)); 159 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, 164 tbs, tbslen, sig, &sltmp, rsa); 182 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa, 243 const unsigned char *tbs, size_t tbslen) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/sm2/ |
| sm2_pmeth.c | 89 const unsigned char *tbs, size_t tbslen) 110 ret = sm2_sign(tbs, tbslen, sig, &sltmp, ec); 120 const unsigned char *tbs, size_t tbslen) 124 return sm2_verify(tbs, tbslen, sig, siglen, ec);
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_pmeth.c | 136 size_t tbslen) 155 if (tbslen != (size_t)md_size) { 164 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); 170 if ((size_t)RSA_size(rsa) < tbslen + 1) { 178 memcpy(rctx->tbuf, tbs, tbslen); 179 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); 180 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, 185 tbs, tbslen, sig, &sltmp, rsa); 203 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); 265 const unsigned char *tbs, size_t tbslen) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_pmeth.c | 135 size_t tbslen) 147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { 170 memcpy(rctx->tbuf, tbs, tbslen); 171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); 172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, 177 tbs, tbslen, sig, &sltmp, rsa); 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); 257 const unsigned char *tbs, size_t tbslen) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| m_sigver.c | 568 const unsigned char *tbs, size_t tbslen) 580 tbs, tbslen); 584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); 587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) 661 size_t siglen, const unsigned char *tbs, size_t tbslen) 676 tbs, tbslen); 680 return pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); 683 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ecx_meth.c | 740 size_t tbslen) 753 if (ED25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey) == 0) 761 size_t tbslen) 774 if (ED448_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, 783 size_t tbslen) 790 return ED25519_verify(tbs, tbslen, sig, edkey->pubkey); 795 size_t tbslen) 802 return ED448_verify(tbs, tbslen, sig, edkey->pubkey, NULL, 0);
|
| /src/external/bsd/libfido2/dist/src/ |
| eddsa.c | 46 const unsigned char *tbs, size_t tbslen) 52 (void)tbslen;
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecx_meth.c | 806 size_t tbslen) 824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, 836 size_t tbslen) 854 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, 864 size_t tbslen) 876 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, 884 size_t tbslen) 896 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, 1223 size_t tbslen) 1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecx_meth.c | 807 size_t tbslen) 825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, 834 size_t tbslen) 852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, 861 size_t tbslen) 873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, 879 size_t tbslen) 891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, 1187 size_t tbslen) 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); [all...] |