/freebsd-12-stable/crypto/openssl/include/openssl/ |
H A D | ct.h | 250 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len); 257 size_t sig_len);
|
H A D | ec.h | 1319 int sig_len, EC_KEY *eckey), 1363 int sig_len, EC_KEY *eckey),
|
/freebsd-12-stable/crypto/openssl/crypto/sm2/ |
H A D | sm2_sign.c | 441 const unsigned char *sig, int sig_len, EC_KEY *eckey) 455 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) { 461 if (derlen != sig_len || memcmp(sig, der, derlen) != 0) { 440 sm2_verify(const unsigned char *dgst, int dgstlen, const unsigned char *sig, int sig_len, EC_KEY *eckey) argument
|
/freebsd-12-stable/crypto/openssl/crypto/ec/ |
H A D | ecdsa_ossl.c | 293 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 304 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) 308 if (derlen != sig_len || memcmp(sigbuf, der, derlen) != 0) 292 ossl_ecdsa_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
|
H A D | ec_kmeth.c | 229 int sig_len, EC_KEY *eckey), 307 int sig_len, EC_KEY *eckey), 225 EC_KEY_METHOD_set_verify(EC_KEY_METHOD *meth, int (*verify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (*verify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument 303 EC_KEY_METHOD_get_verify(const EC_KEY_METHOD *meth, int (**pverify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (**pverify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument
|
H A D | ec_local.h | 626 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey); 653 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
|
/freebsd-12-stable/contrib/ldns/ |
H A D | dnssec.c | 1735 const long sig_len) 1746 sig_len); 1789 (void)sig; (void)sig_len; 1858 const long sig_len, int num_bytes) 1864 ecdsa_sig = d2i_ECDSA_SIG(NULL, (const unsigned char **)&data, sig_len); 1964 ldns_convert_ed25519_rrsig_asn12rdf(const ldns_buffer *sig, long sig_len) argument 1970 print_hex("sig in ASN", data, sig_len); 1988 ldns_convert_ed448_rrsig_asn12rdf(const ldns_buffer *sig, long sig_len) argument 1994 print_hex("sig in ASN", data, sig_len); 1734 ldns_convert_dsa_rrsig_asn12rdf(const ldns_buffer *sig, const long sig_len) argument 1857 ldns_convert_ecdsa_rrsig_asn1len2rdf(const ldns_buffer *sig, const long sig_len, int num_bytes) argument
|
/freebsd-12-stable/contrib/bearssl/test/ |
H A D | test_speed.c | 1150 size_t nlen, ulen, sig_len; local 1172 sig_len = sign(impl, &br_sha256_vtable, hv, &sk, sig); 1173 if (vrfy(impl, hv, sizeof hv, &pk, sig, sig_len) != 1) { 1181 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len); 1193 sig_len = sign(impl, &br_sha256_vtable, hv, &sk, sig); 1214 vrfy(impl, hv, sizeof hv, &pk, sig, sig_len);
|
H A D | test_crypto.c | 6428 size_t plain_len, salt_len, sig_len; local 6435 sig_len = hextobin(sig, KAT_RSA_PSS[u ++]); 6453 check_equals("KAT RSA/PSS sign", tmp, sig, sig_len); 6455 if (vrfy(sig, sig_len, 6463 sig[sig_len >> 1] ^= 0x01; 6464 if (vrfy(sig, sig_len, 9149 size_t sig_len, sig2_len; local 9162 sig_len = hextobin(sig, kv->sasn1); 9164 sig_len = hextobin(sig, kv->sraw); 9168 kv->pub, sig, sig_len) ! [all...] |
/freebsd-12-stable/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.c | 186 * sig_len signature length (in bytes); signature value is in the pad 192 int hash, int use_rsa, size_t sig_len) 238 if (!ctx->eng.irsavrfy(ctx->eng.pad, sig_len, 246 ctx->eng.pad, sig_len)) 1269 size_t sig_len; local 1271 sig_len = make_client_sign(CTX); 1272 if (sig_len == 0) { 1276 T0_PUSH(sig_len); 1800 size_t sig_len = T0_POP(); local 1804 T0_PUSH(verify_SKE_sig(CTX, hash, use_rsa, sig_len)); 191 verify_SKE_sig(br_ssl_client_context *ctx, int hash, int use_rsa, size_t sig_len) argument [all...] |
H A D | ssl_hs_server.c | 270 size_t hv_len, sig_len; local 323 sig_len = (*ctx->policy_vtable)->do_sign(ctx->policy_vtable, 325 return sig_len ? (int)sig_len : -BR_ERR_INVALID_ALGORITHM; 405 verify_CV_sig(br_ssl_server_context *ctx, size_t sig_len) argument 426 if (!ctx->eng.irsavrfy(ctx->eng.pad, sig_len, 438 &pk->key.ec, ctx->eng.pad, sig_len))
|
/freebsd-12-stable/crypto/openssh/ |
H A D | sshkey.c | 2515 size_t i, ca_len, sig_len; local 2629 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), 2633 if ((ret = get_sigtype(sig_blob, sig_len, &sigtype)) != 0) 2644 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0)
|
/freebsd-12-stable/contrib/bearssl/src/ |
H A D | inner.h | 1946 uint32_t br_rsa_pkcs1_sig_unpad(const unsigned char *sig, size_t sig_len,
|