/openbsd-current/lib/libfido2/src/ |
H A D | rs1.c | 24 rs1_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument 49 if (EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr, 50 dgst->len) != 1) {
|
H A D | eddsa.c | 172 eddsa_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument 184 if (dgst->len > INT_MAX || sig->len > INT_MAX) { 185 fido_log_debug("%s: dgst->len=%zu, sig->len=%zu", __func__, 186 dgst->len, sig->len); 200 if (EVP_DigestVerify(mdctx, sig->ptr, sig->len, dgst->ptr, 201 dgst->len) != 1) { 214 eddsa_pk_verify_sig(const fido_blob_t *dgst, const eddsa_pk_t *pk, argument 221 eddsa_verify_sig(dgst, pkey, sig) < 0) {
|
H A D | cred.c | 244 get_signed_hash_u2f(fido_blob_t *dgst, const unsigned char *rp_id, argument 254 if (dgst->len != SHA256_DIGEST_LENGTH || 265 EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) { 278 verify_attstmt(const fido_blob_t *dgst, const fido_attstmt_t *attstmt) argument 303 ok = es256_verify_sig(dgst, pkey, &attstmt->sig); 306 ok = rs256_verify_sig(dgst, pkey, &attstmt->sig); 309 ok = rs1_verify_sig(dgst, pkey, &attstmt->sig); 312 ok = eddsa_verify_sig(dgst, pkey, &attstmt->sig); 331 fido_blob_t dgst; local 334 dgst 416 fido_blob_t dgst; local [all...] |
H A D | tpm.c | 146 get_signed_sha1(tpm_sha1_data_t *dgst, const fido_blob_t *authdata, argument 153 if ((dgst->size = sizeof(dgst->body)) != SHA_DIGEST_LENGTH || 159 EVP_DigestFinal_ex(ctx, dgst->body, NULL) != 1) { 344 fido_get_signed_hash_tpm(fido_blob_t *dgst, const fido_blob_t *clientdata_hash, argument 382 if (dgst->len < SHA_DIGEST_LENGTH || 383 SHA1(certinfo->ptr, certinfo->len, dgst->ptr) != dgst->ptr) { 387 dgst->len = SHA_DIGEST_LENGTH;
|
H A D | rs256.c | 220 rs256_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument 245 if (EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr, 246 dgst->len) != 1) { 259 rs256_pk_verify_sig(const fido_blob_t *dgst, const rs256_pk_t *pk, argument 266 rs256_verify_sig(dgst, pkey, sig) < 0) {
|
H A D | assert.c | 369 fido_get_signed_hash(int cose_alg, fido_blob_t *dgst, argument 391 if (dgst->len < SHA256_DIGEST_LENGTH || 397 EVP_DigestFinal_ex(ctx, dgst->ptr, NULL) != 1) { 401 dgst->len = SHA256_DIGEST_LENGTH; 404 dgst->len < authdata_len + clientdata->len) { 408 memcpy(dgst->ptr, authdata_ptr, authdata_len); 409 memcpy(dgst->ptr + authdata_len, clientdata->ptr, 411 dgst->len = authdata_len + clientdata->len; 429 fido_blob_t dgst; local 434 dgst [all...] |
H A D | es256.c | 496 es256_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, argument 509 EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr, 510 dgst->len) != 1) { 523 es256_pk_verify_sig(const fido_blob_t *dgst, const es256_pk_t *pk, argument 530 es256_verify_sig(dgst, pkey, sig) < 0) {
|
H A D | largeblob.c | 389 u_char dgst[SHA256_DIGEST_LENGTH]; local 393 if (SHA256(data, len, dgst) != dgst) 395 memcpy(out, dgst, LARGEBLOB_DIGEST_LENGTH); 571 unsigned char dgst[SHA256_DIGEST_LENGTH]; local 593 if (cbor.len > SIZE_MAX - sizeof(dgst)) { 598 if (SHA256(cbor.ptr, cbor.len, dgst) != dgst) { 603 totalsize = cbor.len + sizeof(dgst) - 16; /* the first 16 bytes only */ 621 if ((r = largeblob_set_tx(dev, token, dgst, sizeo [all...] |
/openbsd-current/lib/libssl/test/ |
H A D | test_aesni | 19 HASH=`cat $PROG | $PROG dgst -hex` 35 $PROG dgst -hex ) 2>/dev/null` 45 $PROG dgst -hex ) 2>/dev/null` 54 $PROG dgst -hex ) 2>/dev/null`
|
H A D | test_padlock | 19 HASH=`cat $PROG | $PROG dgst -hex` 33 $PROG dgst -hex ) 2>/dev/null` 41 $PROG dgst -hex ) 2>/dev/null` 49 $PROG dgst -hex ) 2>/dev/null`
|
/openbsd-current/lib/libcrypto/ocsp/ |
H A D | ocsp_lib.c | 82 OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, const X509 *issuer) argument 89 if (!dgst) 90 dgst = EVP_sha1(); 102 return OCSP_cert_id_new(dgst, iname, ikey, serial); 107 OCSP_cert_id_new(const EVP_MD *dgst, const X509_NAME *issuerName, argument 122 if ((nid = EVP_MD_type(dgst)) == NID_undef) { 132 if (!X509_NAME_digest(issuerName, dgst, md, &i)) 138 if (!EVP_Digest(issuerKey->data, issuerKey->length, md, &i, dgst, NULL))
|
H A D | ocsp_vfy.c | 326 const EVP_MD *dgst; local 331 if (!(dgst = 337 mdlen = EVP_MD_size(dgst); 344 if (!X509_NAME_digest(iname, dgst, md, NULL)) 348 X509_pubkey_digest(cert, dgst, md, NULL);
|
/openbsd-current/sbin/isakmpd/ |
H A D | hash.c | 159 hmac_final(unsigned char *dgst, struct hash *hash) argument 161 hash->Final(dgst, hash->ctx); 162 hash->Update(hash->ctx2, dgst, hash->hashsize); 163 hash->Final(dgst, hash->ctx2);
|
/openbsd-current/lib/libcrypto/ec/ |
H A D | ec_kmeth.c | 225 int (*sign)(int type, const unsigned char *dgst, 230 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, 242 int (*verify)(int type, const unsigned char *dgst, int dgst_len, 244 int (*verify_sig)(const unsigned char *dgst, int dgst_len, 298 int (**psign)(int type, const unsigned char *dgst, 303 ECDSA_SIG *(**psign_sig)(const unsigned char *dgst, 318 int (**pverify)(int type, const unsigned char *dgst, int dgst_len, 320 int (**pverify_sig)(const unsigned char *dgst, int dgst_len, 224 EC_KEY_METHOD_set_sign(EC_KEY_METHOD *meth, int (*sign)(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey), int (*sign_setup)(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp), ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, int dgst_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey)) argument 241 EC_KEY_METHOD_set_verify(EC_KEY_METHOD *meth, int (*verify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (*verify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument 297 EC_KEY_METHOD_get_sign(const EC_KEY_METHOD *meth, int (**psign)(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey), int (**psign_setup)(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp), ECDSA_SIG *(**psign_sig)(const unsigned char *dgst, int dgst_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey)) argument 317 EC_KEY_METHOD_get_verify(const EC_KEY_METHOD *meth, int (**pverify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (**pverify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument
|
H A D | ec_local.h | 326 int (*sign)(int type, const unsigned char *dgst, int dlen, unsigned char 331 ECDSA_SIG *(*sign_sig)(const unsigned char *dgst, int dgst_len, 334 int (*verify)(int type, const unsigned char *dgst, int dgst_len, 336 int (*verify_sig)(const unsigned char *dgst, int dgst_len, 345 int ecdsa_verify(int type, const unsigned char *dgst, int dgst_len, 347 int ecdsa_verify_sig(const unsigned char *dgst, int dgst_len,
|
/openbsd-current/lib/libcrypto/dsa/ |
H A D | dsa_local.h | 67 DSA_SIG *(*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 70 int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len,
|
H A D | dsa_ossl.c | 83 dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 124 if (BN_bin2bn(dgst, dlen, m) == NULL) 303 dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, DSA *dsa) argument 350 if (BN_bin2bn(dgst, dgst_len, u1) == NULL) 445 DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 447 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); 452 DSA_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, DSA *dsa) argument 454 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa);
|
H A D | dsa.h | 125 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); 126 int DSA_do_verify(const unsigned char *dgst,int dgst_len, 144 int DSA_sign(int type,const unsigned char *dgst,int dlen, 146 int DSA_verify(int type,const unsigned char *dgst,int dgst_len,
|
H A D | dsa_asn1.c | 417 DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, argument 426 if ((s = DSA_do_sign(dgst, dlen, dsa)) == NULL) 450 DSA_verify(int type, const unsigned char *dgst, int dgst_len, argument 469 ret = DSA_do_verify(dgst, dgst_len, s, dsa);
|
/openbsd-current/lib/libcrypto/sm2/ |
H A D | sm2.h | 36 int SM2_sign(const unsigned char *dgst, int dgstlen, unsigned char *sig, 42 int SM2_verify(const unsigned char *dgst, int dgstlen, const unsigned char *sig,
|
/openbsd-current/usr.bin/openssl/ |
H A D | Makefile | 24 crl2p7.c dgst.c dh.c dhparam.c dsa.c dsaparam.c ec.c ecparam.c enc.c \
|
H A D | enc.c | 340 const EVP_MD *dgst = NULL; local 416 (dgst = EVP_get_digestbyname(cfg.md)) == NULL) { 422 if (dgst == NULL) 423 dgst = EVP_sha256(); 613 cfg.iter, dgst, iklen+ivlen, tmpkeyiv)) { 622 EVP_BytesToKey(cfg.cipher, dgst, sptr,
|
/openbsd-current/lib/libcrypto/rsa/ |
H A D | rsa_oaep.c | 325 long seedlen, const EVP_MD *dgst) 337 mdlen = EVP_MD_size(dgst); 345 if (!EVP_DigestInit_ex(md_ctx, dgst, NULL) || 324 PKCS1_MGF1(unsigned char *mask, long len, const unsigned char *seed, long seedlen, const EVP_MD *dgst) argument
|
/openbsd-current/usr.sbin/smtpd/ |
H A D | ca.c | 403 ecdsae_send_enc_imsg(const unsigned char *dgst, int dgst_len, argument 428 m_add_data(p_ca, (const void *)dgst, (size_t)dgst_len); 477 ecdsae_do_sign(const unsigned char *dgst, int dgst_len, const BIGNUM *inv, argument 485 return (ecdsae_send_enc_imsg(dgst, dgst_len, inv, rp, eckey)); 487 return (psign_sig(dgst, dgst_len, inv, rp, eckey));
|
/openbsd-current/lib/libcrypto/pkcs7/ |
H A D | pk7_lib.c | 371 const EVP_MD *dgst) 400 nid = EVP_MD_type(dgst); 421 PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) argument 425 if (dgst == NULL) { 429 dgst = EVP_get_digestbynid(def_nid); 430 if (dgst == NULL) { 438 if (!PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst)) 370 PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) argument
|