/freebsd-10.1-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_locl.h | 4 size_t siglen, RSA *rsa);
|
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, 97 *siglen = i; 107 unsigned int siglen, RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) { 120 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 125 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 144 OPENSSL_cleanse(s, (unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 88 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); 139 *siglen = i; 171 const unsigned char *sigbuf, size_t siglen, RSA *rsa) 185 if (siglen != (unsigned int)RSA_size(rsa)) { 191 i = RSA_public_decrypt((int)siglen, 199 s = (unsigned char *)OPENSSL_malloc((unsigned int)siglen); 208 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 298 OPENSSL_cleanse(s, (unsigned int)siglen); 305 const unsigned char *sigbuf, unsigned int siglen, RS 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 168 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 304 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
H A D | rsa_pmeth.c | 185 size_t *siglen, const unsigned char *tbs, 213 *siglen = slen; 215 *siglen = 0; 267 *siglen = ret; 273 const unsigned char *sig, size_t siglen) 282 ret = RSA_public_decrypt(siglen, sig, 304 sig, siglen, ctx->pkey->pkey.rsa); 311 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, 320 const unsigned char *sig, size_t siglen, 343 rctx->mgf1md, sig, siglen); 184 pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 271 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument 319 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 78 *sig, unsigned int *siglen, EC_KEY *eckey) 80 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, 91 *siglen = 0; 94 *siglen = i2d_ECDSA_SIG(s, &sig); 77 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
H A D | ecdsa.h | 186 * \param siglen pointer to the length of the returned signature 191 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 199 * \param siglen pointer to the length of the returned signature 207 unsigned char *sig, unsigned int *siglen, 216 * \param siglen length of the DER encoded signature 222 const unsigned char *sig, int siglen, EC_KEY *eckey);
|
/freebsd-10.1-release/sys/amd64/amd64/ |
H A D | bios.c | 59 * (siglen) number of bytes in the signature. 68 bios_sigsearch(u_int32_t start, u_char *sig, int siglen, int paralen, int sigofs) argument 85 while ((sp + sigofs + siglen) < end) { 88 if (!bcmp(sp + sigofs, sig, siglen)) {
|
/freebsd-10.1-release/crypto/openssl/crypto/pem/ |
H A D | pem_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 94 *siglen = i; 77 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
/freebsd-10.1-release/crypto/openssl/crypto/evp/ |
H A D | m_sigver.c | 124 size_t *siglen) 140 sigret, siglen, &tmp_ctx); 146 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 150 if (ctx->pctx->pmeth->signctx(ctx->pctx, sigret, siglen, ctx) <= 156 || EVP_PKEY_sign(ctx->pctx, sigret, siglen, NULL, s) <= 0) 163 int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, unsigned char *sig, size_t siglen) argument 180 sig, siglen, &tmp_ctx); 186 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen); 123 EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) argument
|
H A D | p_sign.c | 78 unsigned int *siglen, EVP_PKEY *pkey) 86 *siglen = 0; 106 *siglen = sltmp; 131 return (ctx->digest->sign(ctx->digest->type, m, m_len, sigret, siglen, 77 EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 90 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 115 sigbuf, siglen, pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
H A D | pmeth_fn.c | 101 unsigned char *sig, size_t *siglen, 113 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) 114 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 135 const unsigned char *sig, size_t siglen, 147 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); 169 const unsigned char *sig, size_t siglen) 181 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 134 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument 167 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
|
/freebsd-10.1-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_asn1.c | 155 unsigned char *sig, unsigned int *siglen, DSA *dsa) 161 *siglen = 0; 164 *siglen = i2d_DSA_SIG(s, &sig); 177 const unsigned char *sigbuf, int siglen, DSA *dsa) 188 if (d2i_DSA_SIG(&s, &p, siglen) == NULL) 192 if (derlen != siglen || memcmp(sigbuf, der, derlen))
|
H A D | dsatest.c | 150 unsigned int siglen; local 211 DSA_sign(0, str1, 20, sig, &siglen, dsa); 212 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 217 DSA_sign(0, str1, 20, sig, &siglen, dsa); 218 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
H A D | dsa_pmeth.c | 121 size_t *siglen, const unsigned char *tbs, 138 *siglen = sltmp; 143 const unsigned char *sig, size_t siglen, 155 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa); 120 pkey_dsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 142 pkey_dsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
|
/freebsd-10.1-release/crypto/openssl/engines/ccgost/ |
H A D | gost_pmeth.c | 313 size_t *siglen, const unsigned char *tbs, 318 if (!siglen) 321 *siglen = 64; /* better to check size of pkey->pkey.dsa-q */ 328 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 332 size_t *siglen, const unsigned char *tbs, 337 if (!siglen) 340 *siglen = 64; /* better to check size of curve order */ 347 return pack_sign_cp(unpacked_sig, 32, sig, siglen); 353 size_t siglen, const unsigned char *tbs, 358 DSA_SIG *s = unpack_cp_signature(sig, siglen); 312 pkey_gost94_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 331 pkey_gost01_cp_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbs_len) argument 352 pkey_gost94_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 367 pkey_gost01_cp_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbs_len) argument 538 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx) argument [all...] |
H A D | gost_sign.c | 131 int pack_sign_cc(DSA_SIG *s,int order,unsigned char *sig, size_t *siglen) 133 *siglen = 2*order; 134 memset(sig,0,*siglen); 137 dump_signature("serialized",sig,*siglen); 146 int pack_sign_cp(DSA_SIG *s, int order, unsigned char *sig, size_t *siglen) argument 148 *siglen = 2 * order; 149 memset(sig, 0, *siglen); 152 dump_signature("serialized", sig, *siglen); 305 DSA_SIG *unpack_cc_signature(const unsigned char *sig,size_t siglen) 314 s->r = getbnfrombuf(sig, siglen/ 320 unpack_cp_signature(const unsigned char *sig, size_t siglen) argument [all...] |
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, 123 int siglen = 0; local 444 siglen = EVP_PKEY_size(sigkey); 445 sigbuf = OPENSSL_malloc(siglen); 456 siglen = BIO_read(sigbio, sigbuf, siglen); 458 if (siglen <= 0) { 475 siglen, NULL, NULL, "stdin", bmd); 497 siglen, sig_name, md_name, argv[i], bmd); 527 EVP_PKEY *key, unsigned char *sigin, int siglen, 526 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file, BIO *bmd) argument [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 117 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 126 *siglen = ECDSA_size(ec); 128 } else if (*siglen < (size_t)ECDSA_size(ec)) { 142 *siglen = (size_t)sltmp; 147 const unsigned char *sig, size_t siglen, 159 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); 146 pkey_ec_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
|
/freebsd-10.1-release/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 626 * \param[in] siglen length of signature data to use 634 size_t siglen, 733 * \param[in] siglen length of the signature data 739 size_t siglen, 784 * \param[in] siglen length of signature data 790 size_t siglen, 798 * \param[in] siglen length of signature data 804 size_t siglen, 812 * \param[in] siglen length of signature data 819 size_t siglen, [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/hmac/ |
H A D | hm_pmeth.c | 157 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 166 *siglen = l; 172 *siglen = (size_t)hlen;
|
/freebsd-10.1-release/crypto/openssl/crypto/cmac/ |
H A D | cm_pmeth.c | 116 static int cmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 119 return CMAC_Final(ctx->data, sig, siglen);
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | schnorr.c | 219 * On success, 0 is returned and *siglen bytes of signature are returned in 225 u_char **sig, u_int *siglen) 239 *siglen = buffer_len(&b); 240 *sig = xmalloc(*siglen); 241 memcpy(*sig, buffer_ptr(&b), *siglen); 354 * Verify Schnorr signature 'sig' of length 'siglen' against public exponent 364 const u_char *sig, u_int siglen) 380 buffer_append(&b, sig, siglen); 582 u_int siglen; local 593 &sig, &siglen)) 223 schnorr_sign_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, u_char **sig, u_int *siglen) argument 361 schnorr_verify_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *g_x, const u_char *id, u_int idlen, const u_char *sig, u_int siglen) argument [all...] |
H A D | ssh-rsa.c | 208 u_char *sigbuf, u_int siglen, RSA *rsa) 230 if (siglen == 0 || siglen > rsasize) { 231 error("bad siglen"); 235 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 207 openssh_RSA_verify(int hash_alg, u_char *hash, u_int hashlen, u_char *sigbuf, u_int siglen, RSA *rsa) argument
|
/freebsd-10.1-release/sys/amd64/include/pc/ |
H A D | bios.h | 107 uint32_t bios_sigsearch(uint32_t start, u_char *sig, int siglen, int paralen,
|