Searched refs:dgst (Results 1 - 25 of 38) sorted by relevance

12

/openbsd-current/lib/libfido2/src/
H A Drs1.c24 rs1_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument
49 if (EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr,
50 dgst->len) != 1) {
H A Deddsa.c172 eddsa_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument
184 if (dgst->len > INT_MAX || sig->len > INT_MAX) {
185 fido_log_debug("%s: dgst->len=%zu, sig->len=%zu", __func__,
186 dgst->len, sig->len);
200 if (EVP_DigestVerify(mdctx, sig->ptr, sig->len, dgst->ptr,
201 dgst->len) != 1) {
214 eddsa_pk_verify_sig(const fido_blob_t *dgst, const eddsa_pk_t *pk, argument
221 eddsa_verify_sig(dgst, pkey, sig) < 0) {
H A Dcred.c244 get_signed_hash_u2f(fido_blob_t *dgst, const unsigned char *rp_id, argument
254 if (dgst->len != SHA256_DIGEST_LENGTH ||
265 EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) {
278 verify_attstmt(const fido_blob_t *dgst, const fido_attstmt_t *attstmt) argument
303 ok = es256_verify_sig(dgst, pkey, &attstmt->sig);
306 ok = rs256_verify_sig(dgst, pkey, &attstmt->sig);
309 ok = rs1_verify_sig(dgst, pkey, &attstmt->sig);
312 ok = eddsa_verify_sig(dgst, pkey, &attstmt->sig);
331 fido_blob_t dgst; local
334 dgst
416 fido_blob_t dgst; local
[all...]
H A Dtpm.c146 get_signed_sha1(tpm_sha1_data_t *dgst, const fido_blob_t *authdata, argument
153 if ((dgst->size = sizeof(dgst->body)) != SHA_DIGEST_LENGTH ||
159 EVP_DigestFinal_ex(ctx, dgst->body, NULL) != 1) {
344 fido_get_signed_hash_tpm(fido_blob_t *dgst, const fido_blob_t *clientdata_hash, argument
382 if (dgst->len < SHA_DIGEST_LENGTH ||
383 SHA1(certinfo->ptr, certinfo->len, dgst->ptr) != dgst->ptr) {
387 dgst->len = SHA_DIGEST_LENGTH;
H A Drs256.c220 rs256_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument
245 if (EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr,
246 dgst->len) != 1) {
259 rs256_pk_verify_sig(const fido_blob_t *dgst, const rs256_pk_t *pk, argument
266 rs256_verify_sig(dgst, pkey, sig) < 0) {
H A Dassert.c369 fido_get_signed_hash(int cose_alg, fido_blob_t *dgst, argument
391 if (dgst->len < SHA256_DIGEST_LENGTH ||
397 EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) {
401 dgst->len = SHA256_DIGEST_LENGTH;
404 dgst->len < authdata_len + clientdata->len) {
408 memcpy(dgst->ptr, authdata_ptr, authdata_len);
409 memcpy(dgst->ptr + authdata_len, clientdata->ptr,
411 dgst->len = authdata_len + clientdata->len;
429 fido_blob_t dgst; local
434 dgst
[all...]
H A Des256.c496 es256_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument
509 EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr,
510 dgst->len) != 1) {
523 es256_pk_verify_sig(const fido_blob_t *dgst, const es256_pk_t *pk, argument
530 es256_verify_sig(dgst, pkey, sig) < 0) {
H A Dlargeblob.c389 u_char dgst[SHA256_DIGEST_LENGTH]; local
393 if (SHA256(data, len, dgst) != dgst)
395 memcpy(out, dgst, LARGEBLOB_DIGEST_LENGTH);
571 unsigned char dgst[SHA256_DIGEST_LENGTH]; local
593 if (cbor.len > SIZE_MAX - sizeof(dgst)) {
598 if (SHA256(cbor.ptr, cbor.len, dgst) != dgst) {
603 totalsize = cbor.len + sizeof(dgst) - 16; /* the first 16 bytes only */
621 if ((r = largeblob_set_tx(dev, token, dgst, sizeo
[all...]
/openbsd-current/lib/libssl/test/
H A Dtest_aesni19 HASH=`cat $PROG | $PROG dgst -hex`
35 $PROG dgst -hex ) 2>/dev/null`
45 $PROG dgst -hex ) 2>/dev/null`
54 $PROG dgst -hex ) 2>/dev/null`
H A Dtest_padlock19 HASH=`cat $PROG | $PROG dgst -hex`
33 $PROG dgst -hex ) 2>/dev/null`
41 $PROG dgst -hex ) 2>/dev/null`
49 $PROG dgst -hex ) 2>/dev/null`
/openbsd-current/lib/libcrypto/ocsp/
H A Docsp_lib.c82 OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, const X509 *issuer) argument
89 if (!dgst)
90 dgst = EVP_sha1();
102 return OCSP_cert_id_new(dgst, iname, ikey, serial);
107 OCSP_cert_id_new(const EVP_MD *dgst, const X509_NAME *issuerName, argument
122 if ((nid = EVP_MD_type(dgst)) == NID_undef) {
132 if (!X509_NAME_digest(issuerName, dgst, md, &i))
138 if (!EVP_Digest(issuerKey->data, issuerKey->length, md, &i, dgst, NULL))
H A Docsp_vfy.c326 const EVP_MD *dgst; local
331 if (!(dgst =
337 mdlen = EVP_MD_size(dgst);
344 if (!X509_NAME_digest(iname, dgst, md, NULL))
348 X509_pubkey_digest(cert, dgst, md, NULL);
/openbsd-current/sbin/isakmpd/
H A Dhash.c159 hmac_final(unsigned char *dgst, struct hash *hash) argument
161 hash->Final(dgst, hash->ctx);
162 hash->Update(hash->ctx2, dgst, hash->hashsize);
163 hash->Final(dgst, hash->ctx2);
/openbsd-current/lib/libcrypto/ec/
H A Dec_kmeth.c225 int (*sign)(int type, const unsigned char *dgst,
230 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst,
242 int (*verify)(int type, const unsigned char *dgst, int dgst_len,
244 int (*verify_sig)(const unsigned char *dgst, int dgst_len,
298 int (**psign)(int type, const unsigned char *dgst,
303 ECDSA_SIG *(**psign_sig)(const unsigned char *dgst,
318 int (**pverify)(int type, const unsigned char *dgst, int dgst_len,
320 int (**pverify_sig)(const unsigned char *dgst, int dgst_len,
224 EC_KEY_METHOD_set_sign(EC_KEY_METHOD *meth, int (*sign)(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey), int (*sign_setup)(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp), ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, int dgst_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey)) argument
241 EC_KEY_METHOD_set_verify(EC_KEY_METHOD *meth, int (*verify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (*verify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument
297 EC_KEY_METHOD_get_sign(const EC_KEY_METHOD *meth, int (**psign)(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey), int (**psign_setup)(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp), ECDSA_SIG *(**psign_sig)(const unsigned char *dgst, int dgst_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey)) argument
317 EC_KEY_METHOD_get_verify(const EC_KEY_METHOD *meth, int (**pverify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (**pverify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument
H A Dec_local.h326 int (*sign)(int type, const unsigned char *dgst, int dlen, unsigned char
331 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, int dgst_len,
334 int (*verify)(int type, const unsigned char *dgst, int dgst_len,
336 int (*verify_sig)(const unsigned char *dgst, int dgst_len,
345 int ecdsa_verify(int type, const unsigned char *dgst, int dgst_len,
347 int ecdsa_verify_sig(const unsigned char *dgst, int dgst_len,
/openbsd-current/lib/libcrypto/dsa/
H A Ddsa_local.h67 DSA_SIG *(*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa);
70 int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len,
H A Ddsa_ossl.c83 dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument
124 if (BN_bin2bn(dgst, dlen, m) == NULL)
303 dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, DSA *dsa) argument
350 if (BN_bin2bn(dgst, dgst_len, u1) == NULL)
445 DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument
447 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
452 DSA_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, DSA *dsa) argument
454 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa);
H A Ddsa.h125 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa);
126 int DSA_do_verify(const unsigned char *dgst,int dgst_len,
144 int DSA_sign(int type,const unsigned char *dgst,int dlen,
146 int DSA_verify(int type,const unsigned char *dgst,int dgst_len,
H A Ddsa_asn1.c417 DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, argument
426 if ((s = DSA_do_sign(dgst, dlen, dsa)) == NULL)
450 DSA_verify(int type, const unsigned char *dgst, int dgst_len, argument
469 ret = DSA_do_verify(dgst, dgst_len, s, dsa);
/openbsd-current/lib/libcrypto/sm2/
H A Dsm2.h36 int SM2_sign(const unsigned char *dgst, int dgstlen, unsigned char *sig,
42 int SM2_verify(const unsigned char *dgst, int dgstlen, const unsigned char *sig,
/openbsd-current/usr.bin/openssl/
H A DMakefile24 crl2p7.c dgst.c dh.c dhparam.c dsa.c dsaparam.c ec.c ecparam.c enc.c \
H A Denc.c340 const EVP_MD *dgst = NULL; local
416 (dgst = EVP_get_digestbyname(cfg.md)) == NULL) {
422 if (dgst == NULL)
423 dgst = EVP_sha256();
613 cfg.iter, dgst, iklen+ivlen, tmpkeyiv)) {
622 EVP_BytesToKey(cfg.cipher, dgst, sptr,
/openbsd-current/lib/libcrypto/rsa/
H A Drsa_oaep.c325 long seedlen, const EVP_MD *dgst)
337 mdlen = EVP_MD_size(dgst);
345 if (!EVP_DigestInit_ex(md_ctx, dgst, NULL) ||
324 PKCS1_MGF1(unsigned char *mask, long len, const unsigned char *seed, long seedlen, const EVP_MD *dgst) argument
/openbsd-current/usr.sbin/smtpd/
H A Dca.c403 ecdsae_send_enc_imsg(const unsigned char *dgst, int dgst_len, argument
428 m_add_data(p_ca, (const void *)dgst, (size_t)dgst_len);
477 ecdsae_do_sign(const unsigned char *dgst, int dgst_len, const BIGNUM *inv, argument
485 return (ecdsae_send_enc_imsg(dgst, dgst_len, inv, rp, eckey));
487 return (psign_sig(dgst, dgst_len, inv, rp, eckey));
/openbsd-current/lib/libcrypto/pkcs7/
H A Dpk7_lib.c371 const EVP_MD *dgst)
400 nid = EVP_MD_type(dgst);
421 PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) argument
425 if (dgst == NULL) {
429 dgst = EVP_get_digestbynid(def_nid);
430 if (dgst == NULL) {
438 if (!PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst))
370 PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) argument

Completed in 305 milliseconds

12