/openssl-master/demos/signature/ |
A D | EVP_Signature_demo.c | 74 size_t sig_len; in demo_sign() local 117 if (!EVP_DigestSignFinal(sign_context, NULL, &sig_len)) { in demo_sign() 121 if (sig_len <= 0) { in demo_sign() 125 sig_value = OPENSSL_malloc(sig_len); in demo_sign() 130 if (!EVP_DigestSignFinal(sign_context, sig_value, &sig_len)) { in demo_sign() 134 *sig_out_len = sig_len; in demo_sign() 137 BIO_dump_indent_fp(stdout, sig_value, sig_len, 2); in demo_sign() 151 size_t sig_len, unsigned char *sig_value) in demo_verify() argument 209 size_t sig_len = 0; in main() local 218 if (!demo_sign(libctx, sig_name, &sig_len, &sig_value)) { in main() [all …]
|
/openssl-master/crypto/ct/ |
A D | ct_sct.c | 169 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 173 sct->sig_len = sig_len; in SCT_set0_signature() 177 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 181 sct->sig_len = 0; in SCT_set1_signature() 184 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 185 sct->sig = OPENSSL_memdup(sig, sig_len); in SCT_set1_signature() 190 sct->sig_len = sig_len; in SCT_set1_signature() 242 return sct->sig_len; in SCT_get0_signature() 260 sct->sig != NULL && sct->sig_len > 0; in SCT_signature_is_complete()
|
A D | ct_oct.c | 87 int sig_len; in o2i_SCT() local 126 sig_len = o2i_SCT_signature(sct, &p, len); in o2i_SCT() 127 if (sig_len <= 0) { in o2i_SCT() 131 len -= sig_len; in o2i_SCT() 173 len = 4 + sct->sig_len; in i2o_SCT_signature() 190 s2n(sct->sig_len, p); in i2o_SCT_signature() 191 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 216 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
A D | ct_local.h | 76 size_t sig_len; member
|
A D | ct_prn.c | 111 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); in SCT_print()
|
A D | ct_vfy.c | 133 ret = EVP_DigestVerifyFinal(ctx, sct->sig, sct->sig_len); in SCT_CTX_verify()
|
/openssl-master/test/ |
A D | ecdsatest.c | 195 size_t sig_len; in test_builtin() local 247 || !TEST_ptr(sig = OPENSSL_malloc(sig_len = (size_t)temp)) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 252 || !TEST_int_le(sig_len, ECDSA_size(eckey)) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 312 offset = tbs[0] % sig_len; in test_builtin() 317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() [all …]
|
A D | acvp_test.c | 94 size_t sig_len; in sig_gen() local 97 sig_len = sz; in sig_gen() 105 *sig_out_len = sig_len; in sig_gen() 251 size_t sig_len = 0, rlen = 0, slen = 0; in ecdsa_siggen_test() local 260 &sig, &sig_len)) in ecdsa_siggen_test() 280 size_t sig_len; in ecdsa_sigver_test() local 594 size_t sig_len = 0, rlen = 0, slen = 0; in dsa_siggen_test() local 601 &sig, &sig_len)) in dsa_siggen_test() 621 size_t sig_len; in dsa_sigver_test() local 1163 size_t sig_len = 0, n_len = 0, e_len = 0; in rsa_siggen_test() local [all …]
|
A D | evp_extra_test.c | 1017 size_t sig_len = 0, shortsig_len = 1; in test_EVP_PKEY_sign() local 1051 sig = OPENSSL_malloc(sig_len); in test_EVP_PKEY_sign() 1153 size_t sig_len = 0, sig2_len = 0, shortsig_len = 1; in test_EVP_DigestSignInit() local 1223 || !TEST_ptr(sig = OPENSSL_malloc(sig_len))) in test_EVP_DigestSignInit() 1237 if (!TEST_true(EVP_DigestSign(md_ctx, sig, &sig_len, kMsg, in test_EVP_DigestSignInit() 1243 || !TEST_ptr(sig = OPENSSL_malloc(sig_len)) in test_EVP_DigestSignInit() 1292 if (!TEST_mem_eq(sig, sig_len, sig2, sig2_len)) in test_EVP_DigestSignInit() 1781 size_t sig_len = 0; in test_EVP_SM2() local 1849 if (!TEST_true(EVP_DigestSignFinal(md_ctx, NULL, &sig_len))) in test_EVP_SM2() 1852 if (!TEST_ptr(sig = OPENSSL_malloc(sig_len))) in test_EVP_SM2() [all …]
|
A D | acvp_test.inc | 1243 size_t sig_len;
|
/openssl-master/util/perl/TLSProxy/ |
A D | ServerKeyExchange.pm | 78 my $sig_len = unpack('n', substr($self->data, $ptr)); 79 if (defined $sig_len) { 81 $sig = substr($self->data, $ptr, $sig_len); 82 $ptr += $sig_len;
|
/openssl-master/crypto/ec/ |
A D | ecdsa_vrf.c | 42 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ECDSA_verify() argument 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
A D | ecdsa_ossl.c | 332 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) in ossl_ecdsa_verify() argument 343 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) in ossl_ecdsa_verify() 347 if (derlen != sig_len || memcmp(sigbuf, der, derlen) != 0) in ossl_ecdsa_verify()
|
A D | ec_kmeth.c | 256 int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_set_verify() argument 334 int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_get_verify() argument
|
A D | ec_local.h | 658 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey); 688 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
|
/openssl-master/doc/man7/ |
A D | EVP_SIGNATURE-ED25519.pod | 71 size_t sig_len; 77 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 78 sig = OPENSSL_zalloc(sig_len); 80 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
A D | EVP_PKEY-SM2.pod | 75 EVP_DigestVerifyFinal(mctx, sig, sig_len)
|
/openssl-master/crypto/cmp/ |
A D | cmp_protect.c | 56 size_t sig_len; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
|
/openssl-master/crypto/sm2/ |
A D | sm2_sign.c | 473 const unsigned char *sig, int sig_len, in ossl_sm2_internal_verify() argument 488 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) { in ossl_sm2_internal_verify() 494 if (derlen != sig_len || memcmp(sig, der, derlen) != 0) { in ossl_sm2_internal_verify()
|
/openssl-master/doc/man3/ |
A D | SCT_new.pod | 66 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len); 67 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len);
|
A D | ECDSA_SIG_new.pod | 82 stored in I<sig> and its length is returned in I<sig_len>. Note: I<sig> must 112 length is returned in I<sig_len>. Note: I<sig> must point to ECDSA_size(eckey)
|
/openssl-master/include/openssl/ |
A D | ec.h | 1498 int sig_len, EC_KEY *eckey), 1542 int sig_len, EC_KEY *eckey),
|
A D | ct.h.in | 273 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len); 280 size_t sig_len);
|