/crypto/digest/ |
A D | digest_test.cc | 159 size_t digest_len) { in CompareDigest() argument 172 unsigned digest_len; in TestDigest() local 173 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 174 CompareDigest(test, digest.get(), digest_len); in TestDigest() 185 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); in TestDigest() 186 CompareDigest(test, digest.get(), digest_len); in TestDigest() 200 CompareDigest(test, digest.get(), digest_len); in TestDigest() 210 CompareDigest(test, digest.get(), digest_len); in TestDigest() 222 CompareDigest(test, digest.get(), digest_len); in TestDigest() 231 CompareDigest(test, digest.get(), digest_len); in TestDigest() [all …]
|
/crypto/fipsmodule/ecdsa/ |
A D | ecdsa.cc.inc | 34 const uint8_t *digest, size_t digest_len) { 39 if (digest_len > num_bytes) { 40 digest_len = num_bytes; 42 bn_big_endian_to_words(out->words, order->width, digest, digest_len); 45 if (8 * digest_len > num_bits) { 91 digest_to_scalar(group, &m, digest, digest_len); 109 int ecdsa_verify_fixed(const uint8_t *digest, size_t digest_len, 158 digest_to_scalar(group, &tmp, digest, digest_len); 209 priv_key, &k, digest, digest_len); 241 BCM_sha512_update(&sha, digest, digest_len); [all …]
|
A D | internal.h | 33 int ecdsa_sign_fixed(const uint8_t *digest, size_t digest_len, uint8_t *sig, 41 const uint8_t *digest, size_t digest_len, uint8_t *sig, size_t *out_sig_len, 47 int ecdsa_verify_fixed(const uint8_t *digest, size_t digest_len, 53 int ecdsa_verify_fixed_no_self_test(const uint8_t *digest, size_t digest_len,
|
A D | ecdsa_test.cc | 80 static void VerifyECDSASig(API api, const uint8_t *digest, size_t digest_len, in VerifyECDSASig() argument 90 ECDSA_verify(0, digest, digest_len, der, der_len, eckey)); in VerifyECDSASig() 96 ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey)); in VerifyECDSASig() 108 size_t digest_len, ECDSA_SIG *ecdsa_sig, in TestTamperedSig() argument 134 VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0); in TestTamperedSig() 140 VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1); in TestTamperedSig()
|
/crypto/ecdsa/ |
A D | ecdsa_asn1.cc | 74 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, in ECDSA_sign() argument 77 return eckey->ecdsa_meth->sign(digest, digest_len, sig, out_sig_len, in ECDSA_sign() 84 if (!ecdsa_sign_fixed(digest, digest_len, fixed, &fixed_len, sizeof(fixed), in ECDSA_sign() 107 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, in ECDSA_verify() argument 132 ecdsa_verify_fixed(digest, digest_len, fixed, fixed_len, eckey); in ECDSA_verify() 204 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, in ECDSA_do_verify() argument 209 ecdsa_verify_fixed(digest, digest_len, fixed, fixed_len, eckey); in ECDSA_do_verify() 215 const uint8_t *digest, size_t digest_len, const EC_KEY *eckey, in ECDSA_sign_with_nonce_and_leak_private_key_for_testing() argument 220 digest, digest_len, sig, &sig_len, sizeof(sig), eckey, nonce, in ECDSA_sign_with_nonce_and_leak_private_key_for_testing() 228 ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, size_t digest_len, in ECDSA_do_sign() argument [all …]
|
A D | ecdsa_p1363.cc | 27 int ECDSA_sign_p1363(const uint8_t *digest, size_t digest_len, uint8_t *sig, in ECDSA_sign_p1363() argument 30 return ecdsa_sign_fixed(digest, digest_len, sig, out_sig_len, max_sig_len, in ECDSA_sign_p1363() 34 int ECDSA_verify_p1363(const uint8_t *digest, size_t digest_len, in ECDSA_verify_p1363() argument 37 return ecdsa_verify_fixed(digest, digest_len, sig, sig_len, eckey); in ECDSA_verify_p1363()
|
A D | ecdsa_p1363_test.cc | 58 unsigned int digest_len; in RunWycheproofTest() local 60 EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)); in RunWycheproofTest() 62 int ret = ECDSA_verify_p1363(digest, digest_len, sig.data(), sig.size(), in RunWycheproofTest()
|
/crypto/dsa/ |
A D | dsa.cc | 569 if (digest_len > BN_num_bytes(dsa->q)) { in DSA_do_sign() 573 digest_len = BN_num_bytes(dsa->q); in DSA_do_sign() 576 if (BN_bin2bn(digest, digest_len, &m) == NULL) { in DSA_do_sign() 639 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { in DSA_do_verify() 646 size_t digest_len, const DSA_SIG *sig, in DSA_do_check_signature() argument 699 if (digest_len > (q_bits >> 3)) { in DSA_do_check_signature() 703 digest_len = (q_bits >> 3); in DSA_do_check_signature() 706 if (BN_bin2bn(digest, digest_len, &u1) == NULL) { in DSA_do_check_signature() 750 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, in DSA_sign() argument 754 s = DSA_do_sign(digest, digest_len, dsa); in DSA_sign() [all …]
|
/crypto/fipsmodule/rsa/ |
A D | rsa.cc.inc | 471 if (digest_len != SSL_SIG_LENGTH) { 481 if (digest_len != sig_prefix->hash_len) { 495 size_t digest_len) { 502 assert(digest_len == SSL_SIG_LENGTH); 504 *out_msg_len = digest_len; 516 assert(digest_len == sig_prefix->hash_len); 553 assert(digest_len <= EVP_MAX_MD_SIZE); 567 digest_len) || 599 if (digest_len != EVP_MD_size(md)) { 647 digest_len)) { [all …]
|
A D | internal.h | 154 size_t digest_len, const uint8_t *sig, 162 size_t digest_len, uint8_t *out, unsigned *out_len,
|
/crypto/fipsmodule/hkdf/ |
A D | hkdf.cc.inc | 63 const size_t digest_len = EVP_MD_size(digest); 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 87 !HMAC_Update(&hmac, previous, digest_len))) { 96 todo = digest_len;
|
/crypto/evp/ |
A D | evp_ctx.cc | 160 const uint8_t *digest, size_t digest_len) { in EVP_PKEY_sign() argument 169 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len); in EVP_PKEY_sign() 183 const uint8_t *digest, size_t digest_len) { in EVP_PKEY_verify() argument 192 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len); in EVP_PKEY_verify()
|
A D | evp_test.cc | 649 unsigned digest_len; in RunWycheproofVerifyTest() local 651 EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)); in RunWycheproofVerifyTest() 653 bool sig_ok = DSA_check_signature(&valid, digest, digest_len, sig.data(), in RunWycheproofVerifyTest()
|
/crypto/fipsmodule/dh/ |
A D | dh.cc.inc | 336 const size_t digest_len = EVP_MD_size(digest); 337 if (digest_len > max_out_len) { 356 out_len_unsigned != digest_len) { 360 *out_len = digest_len;
|
/crypto/fipsmodule/service_indicator/ |
A D | service_indicator_test.cc | 981 unsigned digest_len; in TEST_P() local 994 approved, EVP_DigestFinal_ex(ctx.get(), digest.data(), &digest_len))); in TEST_P() 996 EXPECT_EQ(Bytes(test.expected_digest, digest_len), Bytes(digest)); in TEST_P() 1001 &digest_len, test.func(), nullptr))); in TEST_P()
|