/external/chromium_org/crypto/ |
H A D | signature_creator_openssl.cc | 71 bool success = RSA_sign(ToOpenSSLDigestType(hash_alg), data, data_len,
|
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | rsa_test.c | 297 if (!RSA_sign(NID_md5, kDummyHash, sizeof(kDummyHash), buf, &buf_len, key)) { 298 fprintf(stderr, "RSA_sign failed with only d given.\n"); 364 if (!RSA_sign(NID_md5, kDummyHash, sizeof(kDummyHash), buf, &buf_len, 366 fprintf(stderr, "RSA_sign failed with recovered key.\n");
|
H A D | rsa.c | 359 OPENSSL_PUT_ERROR(RSA, RSA_sign, RSA_R_INVALID_MESSAGE_LENGTH); 379 OPENSSL_PUT_ERROR(RSA, RSA_sign, RSA_R_UNKNOWN_ALGORITHM_TYPE); 385 OPENSSL_PUT_ERROR(RSA, RSA_sign, RSA_R_TOO_LONG); 391 OPENSSL_PUT_ERROR(RSA, RSA_sign, ERR_R_MALLOC_FAILURE); 405 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, function 425 OPENSSL_PUT_ERROR(RSA, RSA_sign, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | rsa.h | 180 /* RSA_sign signs |in_len| bytes of digest from |in| with |rsa| and writes, at 189 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in,
|
/external/chromium_org/third_party/boringssl/src/tool/ |
H A D | speed.cc | 142 return RSA_sign(NID_sha256, fake_sha256_hash, sizeof(fake_sha256_hash), 145 fprintf(stderr, "RSA_sign failed.\n");
|
/external/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 70 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, function
|
H A D | rsa.h | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards 362 int RSA_sign(int type, const unsigned char *m, unsigned int m_length,
|
H A D | rsa_pmeth.c | 251 ret = RSA_sign(EVP_MD_type(rctx->md),
|
/external/chromium_org/net/android/ |
H A D | keystore_unittest.cc | 40 // calling RSA_sign(NID_md5_sha1,...), DSA_sign(0, ...) or 284 int ret = RSA_sign( 287 LOG(ERROR) << "RSA_sign() failed: " << GetOpenSSLErrorString(); 500 // Message size must be 36 for RSA_sign(NID_md5_sha1,...) to return
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | p_rsa.c | 200 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) {
|
/external/openssl/include/openssl/ |
H A D | rsa.h | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards 362 int RSA_sign(int type, const unsigned char *m, unsigned int m_length,
|
H A D | evp.h | 251 #define EVP_PKEY_RSA_method (evp_sign_method *)RSA_sign, \
|
/external/openssl/apps/ |
H A D | speed.c | 2011 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]); 2027 ret=RSA_sign(NID_md5_sha1, buf,36, buf2,
|
/external/openssl/crypto/evp/ |
H A D | evp.h | 251 #define EVP_PKEY_RSA_method (evp_sign_method *)RSA_sign, \
|
/external/openssl/ssl/ |
H A D | d1_clnt.c | 1591 if (RSA_sign(NID_md5_sha1, data,
|
H A D | d1_srvr.c | 1403 if (RSA_sign(NID_md5_sha1, md_buf, j,
|
H A D | s3_clnt.c | 3306 if (RSA_sign(NID_md5_sha1, data,
|
H A D | s3_srvr.c | 2018 if (RSA_sign(NID_md5_sha1, md_buf, j,
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 1590 if (RSA_sign(NID_md5_sha1, md_buf, j,
|