/external/openssl/crypto/evp/ |
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 91 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); 119 sigbuf,siglen,pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
H A D | p_sign.c | 78 int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 87 *siglen=0; 108 *siglen = sltmp; 136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
H A D | m_sigver.c | 131 int EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) argument 148 sigret, siglen, &tmp_ctx); 154 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 161 if (ctx->pctx->pmeth->signctx(ctx->pctx, sigret, siglen, ctx) <= 0) 167 if (s < 0 || EVP_PKEY_sign(ctx->pctx, sigret, siglen, NULL, s) <= 0) 174 int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, unsigned char *sig, size_t siglen) argument 192 sig, siglen, &tmp_ctx); 199 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen);
|
H A D | pmeth_fn.c | 101 unsigned char *sig, size_t *siglen, 115 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) 116 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 138 const unsigned char *sig, size_t siglen, 152 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); 175 const unsigned char *sig, size_t siglen) 189 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 100 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 137 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument 173 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
|
H A D | pmeth_lib.c | 517 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 526 int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, 536 unsigned char *sig, size_t *siglen, 545 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 554 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen, 515 EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, int (*sign_init)(EVP_PKEY_CTX *ctx), int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 524 EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, int (*verify_init)(EVP_PKEY_CTX *ctx), int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen)) argument 533 EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, int (*verify_recover_init)(EVP_PKEY_CTX *ctx), int (*verify_recover)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) argument 543 EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, int (*signctx_init)(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, EVP_MD_CTX *mctx)) argument 552 EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, int (*verifyctx_init)(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen, EVP_MD_CTX *mctx)) argument
|
/external/openssl/crypto/pem/ |
H A D | pem_sign.c | 78 int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, argument 95 *siglen=i;
|
/external/openssl/crypto/rsa/ |
H A D | rsa_saos.c | 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 97 *siglen=i; 106 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 114 if (siglen != (unsigned int)RSA_size(rsa)) 120 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 126 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 145 OPENSSL_cleanse(s,(unsigned int)siglen); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_sign.c | 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 91 sigret, siglen, rsa); 145 *siglen=i; 176 const unsigned char *sigbuf, size_t siglen, 192 if (siglen != (unsigned int)RSA_size(rsa)) 200 i = RSA_public_decrypt((int)siglen, 208 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 218 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 319 OPENSSL_cleanse(s,(unsigned int)siglen); 326 const unsigned char *sigbuf, unsigned int siglen, 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 173 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 325 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
H A D | rsa_pmeth.c | 185 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 219 *siglen = slen; 221 *siglen = 0; 277 *siglen = ret; 284 const unsigned char *sig, size_t siglen) 295 ret = RSA_public_decrypt(siglen, sig, 322 sig, siglen, ctx->pkey->pkey.rsa); 331 ret = RSA_public_decrypt(siglen, sig, rout, ctx->pkey->pkey.rsa, 340 const unsigned char *sig, size_t siglen, 366 sig, siglen); 282 pkey_rsa_verifyrecover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument 339 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument [all...] |
/external/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 78 *sig, unsigned int *siglen, EC_KEY *eckey) 80 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, 92 *siglen=0; 95 *siglen = i2d_ECDSA_SIG(s, &sig); 77 ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
H A D | dsa_test.c | 109 unsigned int siglen; local 163 DSA_sign(0, str1, 20, sig, &siglen, dsa); 164 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) {
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | p_hmac.c | 153 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 160 *siglen = md_size; 162 } else if (*siglen < md_size) { 170 *siglen = (size_t)hlen;
|
H A D | p_ec.c | 165 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, argument 173 *siglen = ECDSA_size(ec); 175 } else if (*siglen < (size_t)ECDSA_size(ec)) { 188 *siglen = (size_t)sltmp; 192 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, argument 203 return ECDSA_verify(type, tbs, tbslen, sig, siglen, ec);
|
H A D | p_rsa.c | 169 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, argument 176 *siglen = key_len; 180 if (*siglen < key_len) { 203 *siglen = out_len; 210 !RSA_encrypt(rsa, siglen, sig, *siglen, rctx->tbuf, key_len, 221 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); 225 size_t siglen, const uint8_t *tbs, 235 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rs 224 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, const uint8_t *tbs, size_t tbslen) argument [all...] |
/external/openssl/crypto/cmac/ |
H A D | cm_pmeth.c | 116 static int cmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 119 return CMAC_Final(ctx->data, sig, siglen);
|
/external/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 120 static int pkey_dsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 137 *siglen = sltmp; 142 const unsigned char *sig, size_t siglen, 154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa); 141 pkey_dsa_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
|
H A D | dsatest.c | 145 unsigned int siglen; local 210 DSA_sign(0, str1, 20, sig, &siglen, dsa); 211 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 216 DSA_sign(0, str1, 20, sig, &siglen, dsa); 217 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/external/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 119 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 129 *siglen = ECDSA_size(ec); 132 else if(*siglen < (size_t)ECDSA_size(ec)) 148 *siglen = (size_t)sltmp; 153 const unsigned char *sig, size_t siglen, 165 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); 152 pkey_ec_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument
|
/external/openssl/crypto/hmac/ |
H A D | hm_pmeth.c | 159 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 168 *siglen = l; 174 *siglen = (size_t)hlen;
|
/external/openssl/apps/ |
H A D | dgst.c | 78 EVP_PKEY *key, unsigned char *sigin, int siglen, 123 int siglen = 0; local 472 siglen = EVP_PKEY_size(sigkey); 473 sigbuf = OPENSSL_malloc(siglen); 480 siglen = BIO_read(sigbio, sigbuf, siglen); 482 if(siglen <= 0) { 502 siglen,NULL,NULL,"stdin",bmd); 531 siglen,sig_name,md_name, argv[i],bmd); 559 EVP_PKEY *key, unsigned char *sigin, int siglen, 558 do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout, EVP_PKEY *key, unsigned char *sigin, int siglen, const char *sig_name, const char *md_name, const char *file,BIO *bmd) argument [all...] |
H A D | pkeyutl.c | 103 int buf_inlen = 0, siglen = -1; local 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 300 if (siglen <= 0) 332 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
|
/external/chromium_org/net/android/ |
H A D | keystore_unittest.cc | 244 int siglen = static_cast<int>(signature.size()); local 247 0, digest, digest_len, sigbuf, siglen, pub_key.get());
|
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 660 unsigned int siglen; local 668 if (!EVP_SignFinal(&mctx, sig, &siglen, si->pkey)) 675 ASN1_STRING_set0(si->signature, sig, siglen); 708 size_t siglen; local 739 if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) 742 abuf = OPENSSL_malloc(siglen); 745 if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) 757 ASN1_STRING_set0(si->signature, abuf, siglen);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_lib.c | 1912 size_t i, siglen; local 1924 siglen = tls12_get_psigalgs(s, &sig); 1925 for (i = 0; i < siglen; i+=2, sig+=2)
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 911 size_t siglen; local 937 if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) 939 abuf = OPENSSL_malloc(siglen); 942 if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) 954 ASN1_STRING_set0(si->enc_digest, abuf, siglen);
|