HomeSort by: relevance | last modified time | path
    Searched refs:tbslen (Results 1 - 25 of 64) sorted by relevancy

1 2 3

  /src/crypto/external/apache2/openssl/dist/fuzz/
ml-dsa.c 305 size_t sig_len = 0, tbslen; local
315 if (!consume_size_t(*buf, len, &tbslen)) {
316 fprintf(stderr, "Failed to set tbslen");
319 /* Keep tbslen within a reasonable value we can malloc */
320 tbslen = (tbslen % 2048) + 1;
322 if ((tbs = OPENSSL_malloc(tbslen)) == NULL
324 || !RAND_bytes_ex(NULL, tbs, tbslen, 0)) {
337 || EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, tbslen) <= 0
339 || EVP_PKEY_sign(ctx, sig, &sig_len, tbs, tbslen) <= 0)
384 size_t sig_len, tbslen; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
eddsa_sig.c 35 const unsigned char *tbs, size_t tbslen);
37 const unsigned char *tbs, size_t tbslen);
40 const unsigned char *tbs, size_t tbslen);
43 const unsigned char *tbs, size_t tbslen);
152 const unsigned char *tbs, size_t tbslen)
174 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) {
182 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey,
193 const unsigned char *tbs, size_t tbslen)
215 if (s390x_ed448_digestsign(edkey, sigret, tbs, tbslen) == 0) {
223 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, edkey->pubkey
    [all...]
dsa_sig.c 232 size_t sigsize, const unsigned char *tbs, size_t tbslen)
251 if (mdsize != 0 && tbslen != mdsize)
254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa);
263 const unsigned char *tbs, size_t tbslen)
268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize))
271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa);
sm2_sig.c 158 size_t sigsize, const unsigned char *tbs, size_t tbslen)
174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec);
186 const unsigned char *tbs, size_t tbslen)
190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
eddsa_sig.c 35 const unsigned char *tbs, size_t tbslen);
37 const unsigned char *tbs, size_t tbslen);
40 const unsigned char *tbs, size_t tbslen);
43 const unsigned char *tbs, size_t tbslen);
386 const unsigned char *tbs, size_t tbslen)
420 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) {
432 tbs, tbslen, md, &mdlen)
438 tbslen = mdlen;
439 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) {
450 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey
    [all...]
sm2_sig.c 162 size_t sigsize, const unsigned char *tbs, size_t tbslen)
178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec);
190 const unsigned char *tbs, size_t tbslen)
194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec);
ecdsa_sig.c 325 const unsigned char *tbs, size_t tbslen)
348 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
356 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp,
361 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r,
409 size_t sigsize, const unsigned char *tbs, size_t tbslen)
421 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0)
425 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen);
441 const unsigned char *tbs, size_t tbslen)
445 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize))
448 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec)
    [all...]
ml_dsa_sig.c 209 const uint8_t *tbs, size_t tbslen)
211 return ml_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen);
233 const uint8_t *tbs, size_t tbslen)
235 return ml_dsa_verify(vctx, sig, siglen, tbs, tbslen);
slh_dsa_sig.c 231 const uint8_t *tbs, size_t tbslen)
233 return slh_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen);
254 const uint8_t *tbs, size_t tbslen)
256 return slh_dsa_verify(vctx, sig, siglen, tbs, tbslen);
dsa_sig.c 333 const unsigned char *tbs, size_t tbslen)
357 if (mdsize != 0 && tbslen != mdsize)
360 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa,
414 size_t sigsize, const unsigned char *tbs, size_t tbslen)
426 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0)
430 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen);
442 const unsigned char *tbs, size_t tbslen)
447 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize))
450 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa);
494 const unsigned char *tbs, size_t tbslen)
    [all...]
rsa_sig.c 678 const unsigned char *tbs, size_t tbslen)
699 if (tbslen != mdsize) {
713 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp,
726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) {
729 RSA_size(prsactx->rsa), tbslen + 1);
736 memcpy(prsactx->tbuf, tbs, tbslen);
737 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid);
738 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf,
745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp,
810 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/dsa/
dsa_pmeth.c 79 size_t tbslen)
95 if (tbslen != (size_t)md_size)
99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
109 const unsigned char *tbs, size_t tbslen)
124 if (tbslen != (size_t)md_size)
128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
  /src/crypto/external/bsd/openssl/dist/crypto/dsa/
dsa_pmeth.c 79 size_t tbslen)
91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md))
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
104 const unsigned char *tbs, size_t tbslen)
115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md))
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
  /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/
dsa_pmeth.c 73 size_t tbslen)
80 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_size(dctx->md))
83 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
93 const unsigned char *tbs, size_t tbslen)
99 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_size(dctx->md))
102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
  /src/crypto/external/bsd/openssl.old/dist/crypto/evp/
m_sigver.c 164 const unsigned char *tbs, size_t tbslen)
167 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen);
168 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0)
211 size_t siglen, const unsigned char *tbs, size_t tbslen)
214 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen);
215 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0)
pmeth_fn.c 54 const unsigned char *tbs, size_t tbslen)
66 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen);
88 const unsigned char *tbs, size_t tbslen)
99 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen);
  /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/
rsa_pmeth.c 126 size_t tbslen)
133 if (tbslen != (size_t)EVP_MD_size(rctx->md)) {
143 tbs, tbslen, sig, &sltmp, rsa);
149 if ((size_t)EVP_PKEY_size(ctx->pkey) < tbslen + 1) {
157 memcpy(rctx->tbuf, tbs, tbslen);
158 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_type(rctx->md));
159 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf,
164 tbs, tbslen, sig, &sltmp, rsa);
182 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa,
243 const unsigned char *tbs, size_t tbslen)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/sm2/
sm2_pmeth.c 89 const unsigned char *tbs, size_t tbslen)
110 ret = sm2_sign(tbs, tbslen, sig, &sltmp, ec);
120 const unsigned char *tbs, size_t tbslen)
124 return sm2_verify(tbs, tbslen, sig, siglen, ec);
  /src/crypto/external/apache2/openssl/dist/crypto/rsa/
rsa_pmeth.c 136 size_t tbslen)
155 if (tbslen != (size_t)md_size) {
164 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa);
170 if ((size_t)RSA_size(rsa) < tbslen + 1) {
178 memcpy(rctx->tbuf, tbs, tbslen);
179 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md));
180 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf,
185 tbs, tbslen, sig, &sltmp, rsa);
203 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode);
265 const unsigned char *tbs, size_t tbslen)
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/rsa/
rsa_pmeth.c 135 size_t tbslen)
147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) {
156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa);
162 if ((size_t)RSA_size(rsa) < tbslen + 1) {
170 memcpy(rctx->tbuf, tbs, tbslen);
171 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md));
172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf,
177 tbs, tbslen, sig, &sltmp, rsa);
195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode);
257 const unsigned char *tbs, size_t tbslen)
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
m_sigver.c 568 const unsigned char *tbs, size_t tbslen)
580 tbs, tbslen);
584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen);
587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0)
661 size_t siglen, const unsigned char *tbs, size_t tbslen)
676 tbs, tbslen);
680 return pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen);
683 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0)
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/
ecx_meth.c 740 size_t tbslen)
753 if (ED25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey) == 0)
761 size_t tbslen)
774 if (ED448_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL,
783 size_t tbslen)
790 return ED25519_verify(tbs, tbslen, sig, edkey->pubkey);
795 size_t tbslen)
802 return ED448_verify(tbs, tbslen, sig, edkey->pubkey, NULL, 0);
  /src/external/bsd/libfido2/dist/src/
eddsa.c 46 const unsigned char *tbs, size_t tbslen)
52 (void)tbslen;
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecx_meth.c 806 size_t tbslen)
824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey,
836 size_t tbslen)
854 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey,
864 size_t tbslen)
876 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey,
884 size_t tbslen)
896 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey,
1223 size_t tbslen)
1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen);
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecx_meth.c 807 size_t tbslen)
825 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL,
834 size_t tbslen)
852 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey,
861 size_t tbslen)
873 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey,
879 size_t tbslen)
891 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey,
1187 size_t tbslen)
1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen);
    [all...]

Completed in 47 milliseconds

1 2 3