/openbsd-current/regress/lib/libcrypto/ecdsa/ |
H A D | ecdsatest.c | 99 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 175 if ((sig_len = ECDSA_size(eckey)) == 0) 177 if ((signature = malloc(sig_len)) == NULL) 179 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 185 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 192 if (ECDSA_verify(0, digest, 20, signature, sig_len, 199 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 206 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, 220 sig_len)) == NULL) 251 if ((sig_len [all...] |
/openbsd-current/lib/libcrypto/ct/ |
H A D | ct_sct.c | 248 SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) argument 252 sct->sig_len = sig_len; 258 SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) argument 262 sct->sig_len = 0; 265 if (sig != NULL && sig_len > 0) { 266 sct->sig = malloc(sig_len); 271 memcpy(sct->sig, sig, sig_len); 272 sct->sig_len = sig_len; [all...] |
H A D | ct_oct.c | 234 len = 4 + sct->sig_len; 251 s2n(sct->sig_len, p); 252 memcpy(p, sct->sig, sct->sig_len); 278 len = 43 + sct->ext_len + 4 + sct->sig_len;
|
H A D | ct_local.h | 114 size_t sig_len; member in struct:sct_st
|
H A D | ct_vfy.c | 188 if ((ret = EVP_DigestVerifyFinal(ctx, sct->sig, sct->sig_len)) == 0)
|
H A D | ct.h | 290 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len); 297 size_t sig_len);
|
H A D | ct_prn.c | 192 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
|
/openbsd-current/regress/lib/libcrypto/sm2/ |
H A D | sm2evptest.c | 110 size_t sig_len = 0; local 172 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, NULL, &sig_len)); 174 CHECK_GOTO(sig_len == (size_t) EVP_PKEY_size(pkey)); 176 sig = malloc(sig_len); 179 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, sig, &sig_len)); 201 CHECK_GOTO(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len));
|
/openbsd-current/lib/libcrypto/ec/ |
H A D | ec_kmeth.c | 243 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), 319 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), 241 EC_KEY_METHOD_set_verify(EC_KEY_METHOD *meth, int (*verify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (*verify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument 317 EC_KEY_METHOD_get_verify(const EC_KEY_METHOD *meth, int (**pverify)(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), int (**pverify_sig)(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey)) argument
|
H A D | ec_local.h | 335 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey); 346 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
|
H A D | ecx_methods.c | 837 size_t sig_len, const unsigned char *message, size_t message_len) 847 if (sig_len != ecx_sig_size(pkey_ctx->pkey)) 836 pkey_ecx_digestverify(EVP_MD_CTX *md_ctx, const unsigned char *sig, size_t sig_len, const unsigned char *message, size_t message_len) argument
|
/openbsd-current/lib/libcrypto/ecdsa/ |
H A D | ecdsa.c | 604 const unsigned char *sigbuf, int sig_len, EC_KEY *key) 616 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) 620 if ((der_len = i2d_ECDSA_SIG(s, &der)) != sig_len) 636 const unsigned char *sigbuf, int sig_len, EC_KEY *key) 642 return key->meth->verify(type, digest, digest_len, sigbuf, sig_len, key); 603 ecdsa_verify(int type, const unsigned char *digest, int digest_len, const unsigned char *sigbuf, int sig_len, EC_KEY *key) argument 635 ECDSA_verify(int type, const unsigned char *digest, int digest_len, const unsigned char *sigbuf, int sig_len, EC_KEY *key) argument
|
/openbsd-current/lib/libcrypto/sm2/ |
H A D | sm2_sign.c | 425 int sig_len, EC_KEY *eckey) 439 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) { 446 if (derlen != sig_len || memcmp(sig, der, derlen) != 0) { 424 SM2_verify(const unsigned char *dgst, int dgstlen, const unsigned char *sig, int sig_len, EC_KEY *eckey) argument
|
/openbsd-current/lib/libcrypto/cms/ |
H A D | cms_sd.c | 784 size_t sig_len = 0; local 812 if (!EVP_DigestSign(si->mctx, NULL, &sig_len, buf, buf_len)) 814 if ((sig = calloc(1, sig_len)) == NULL) 816 if (!EVP_DigestSign(si->mctx, sig, &sig_len, buf, buf_len)) 825 ASN1_STRING_set0(si->signature, sig, sig_len); 833 freezero(sig, sig_len);
|
/openbsd-current/lib/libssl/ |
H A D | tls13_server.c | 715 size_t sig_len, sig_content_len; local 757 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) 759 if ((sig = calloc(1, sig_len)) == NULL) 761 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) 768 if (!CBB_add_bytes(&sig_cbb, sig, sig_len))
|
H A D | tls13_client.c | 913 size_t sig_len, sig_content_len; local 955 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) 957 if ((sig = calloc(1, sig_len)) == NULL) 959 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) 966 if (!CBB_add_bytes(&sig_cbb, sig, sig_len))
|
/openbsd-current/usr.bin/ssh/ |
H A D | sk-usbhid.c | 909 size_t sig_len; local 913 sig_len = fido_assert_sig_len(assert, 0); 914 if ((sig = d2i_ECDSA_SIG(NULL, &cp, sig_len)) == NULL) {
|
H A D | sshkey.c | 2147 size_t i, ca_len, sig_len; local 2222 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), 2226 if ((ret = sshkey_get_sigtype(sig_blob, sig_len, &sigtype)) != 0) 2237 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0)
|
/openbsd-current/gnu/usr.bin/gcc/gcc/java/ |
H A D | gjavah.c | 1488 int sig_len = JPOOL_UTF_LENGTH (jcf, signature_index); 1491 signature, sig_len)) 1496 unsigned char *limit = signature + sig_len; 1487 int sig_len = JPOOL_UTF_LENGTH (jcf, signature_index); variable
|