/external/openssl/crypto/ecdsa/ |
H A D | ecs_vrf.c | 84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err; 83 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
|
H A D | ecdsatest.c | 296 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 387 sig_len = ECDSA_size(eckey); 388 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 406 if (ECDSA_verify(0, digest, 20, signature, sig_len, 415 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 424 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, 437 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL) 470 sig_len [all...] |
/external/chromium_org/crypto/ |
H A D | ec_signature_creator_openssl.cc | 38 size_t sig_len = 0; local 42 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) { 46 signature->resize(sig_len); 47 if (!EVP_DigestSignFinal(ctx.get(), &signature->front(), &sig_len)) 53 signature->resize(sig_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa_test.c | 75 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 153 sig_len = ECDSA_size(eckey); 154 signature = OPENSSL_malloc(sig_len); 158 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) { 165 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) { 172 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) { 179 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) { 186 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) { 197 ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len); 232 sig_len [all...] |
H A D | ecdsa.c | 64 unsigned int *sig_len, EC_KEY *eckey) { 66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 74 const uint8_t *sig, size_t sig_len, EC_KEY *eckey) { 79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 83 if (s == NULL || d2i_ECDSA_SIG(&s, &sig, sig_len) == NULL) { 463 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, 469 *sig_len = 0; 475 *sig_len = 0; 478 *sig_len 63 ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, EC_KEY *eckey) argument 73 ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, EC_KEY *eckey) argument 462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | rsa_ssa_openssl.cc | 75 size_t sig_len = 0; 79 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) { 83 buffer->resize(sig_len); 84 if (!EVP_DigestSignFinal(ctx.get(), &buffer->front(), &sig_len)) 87 buffer->resize(sig_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); local 103 EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len) <= 0) { 106 *out_sig_len = sig_len; 129 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, argument 156 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
|
H A D | digestsign.c | 190 size_t sig_len) { 202 r = tmp_ctx.pctx->pmeth->verifyctx(tmp_ctx.pctx, sig, sig_len, &tmp_ctx); 211 return EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); 189 EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len) argument
|
H A D | example_sign.c | 105 size_t sig_len = 0; local 115 sig = malloc(sig_len); 123 if (EVP_DigestSignFinal(&md_ctx, NULL, &sig_len) != 1) { 127 if (sig_len != RSA_size(rsa)) { 128 fprintf(stderr, "sig_len mismatch\n"); 132 sig = malloc(sig_len); 136 if (EVP_DigestSignFinal(&md_ctx, sig, &sig_len) != 1) {
|
H A D | evp_ctx.c | 251 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, argument 262 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len); 283 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, argument 294 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ecdsa.h | 73 * space. On successful exit, |*sig_len| is set to the actual number of bytes 78 unsigned int *sig_len, EC_KEY *key); 80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid 86 size_t sig_len, EC_KEY *key); 149 unsigned int *sig_len, const BIGNUM *kinv,
|
H A D | dsa.h | 204 size_t sig_len, const DSA *dsa); 214 size_t sig_len, const DSA *dsa);
|
H A D | ec_key.h | 266 unsigned int *sig_len, EC_KEY *eckey); 270 size_t sig_len, EC_KEY *eckey);
|
H A D | evp.h | 270 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid 277 size_t sig_len); 335 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid 344 size_t sig_len, EVP_PKEY *pkey); 440 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of 442 * |sig| and |*sig_len| updated with the true length. 450 size_t *sig_len, const uint8_t *data, 459 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a valid signature 464 size_t sig_len, const uint8_t *data,
|
H A D | rsa.h | 205 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid, PKCS#1 217 const uint8_t *sig, size_t sig_len, RSA *rsa);
|
/external/chromium_org/net/quic/test_tools/ |
H A D | crypto_test_utils_openssl.cc | 48 size_t sig_len; variable 49 if (!EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)) { 53 scoped_ptr<uint8[]> der_sig(new uint8[sig_len]); 54 if (!EVP_DigestSignFinal(md_ctx.get(), der_sig.get(), &sig_len)) { 60 d2i_ECDSA_SIG(NULL, const_cast<const uint8**>(&derp), sig_len));
|
/external/chromium_org/third_party/boringssl/src/tool/ |
H A D | speed.cc | 138 unsigned sig_len; local 141 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { 143 sig.get(), &sig_len, key); 152 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { 154 sizeof(fake_sha256_hash), sig.get(), sig_len, key);
|
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 243 const uint8_t *sig, size_t sig_len, const DSA *dsa) { 252 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) { 270 size_t digest_len, const uint8_t *sig, size_t sig_len, 280 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) { 242 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 269 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
|
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 365 unsigned int* sig_len, 374 // TODO(davidben): Fix BoringSSL to make sig_len a size_t*. 380 *sig_len = out_len; 387 size_t sig_len, 362 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument 384 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* eckey) argument
|
/external/chromium_org/net/android/ |
H A D | keystore_openssl.cc | 457 unsigned int* sig_len, 485 *sig_len = signature.size(); 492 size_t sig_len, 454 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument 489 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* ec_key) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | rsa.c | 443 const uint8_t *sig, size_t sig_len, RSA *rsa) { 452 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa); 455 if (sig_len != rsa_size) { 471 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, 442 RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, const uint8_t *sig, size_t sig_len, RSA *rsa) argument
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 2569 size_t sig_len; local 2637 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) 2643 der_sig = OPENSSL_malloc(sig_len); 2650 if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len)) 2657 sig = d2i_ECDSA_SIG(NULL, (const unsigned char**) &derp, sig_len);
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 3638 size_t sig_len; local 3706 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) 3712 der_sig = OPENSSL_malloc(sig_len); 3719 if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len)) 3726 sig = d2i_ECDSA_SIG(NULL, (const unsigned char**) &derp, sig_len);
|