Searched refs:sig_len (Results 1 - 23 of 23) sorted by relevance

/external/openssl/crypto/ecdsa/
H A Decs_vrf.c84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey)
91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err;
83 ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) argument
H A Decdsatest.c296 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local
387 sig_len = ECDSA_size(eckey);
388 if ((signature = OPENSSL_malloc(sig_len)) == NULL)
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1)
406 if (ECDSA_verify(0, digest, 20, signature, sig_len,
415 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len,
424 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1,
437 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL)
470 sig_len
[all...]
/external/chromium_org/crypto/
H A Dec_signature_creator_openssl.cc38 size_t sig_len = 0; local
42 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) {
46 signature->resize(sig_len);
47 if (!EVP_DigestSignFinal(ctx.get(), &signature->front(), &sig_len))
53 signature->resize(sig_len);
/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
H A Decdsa_test.c75 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local
153 sig_len = ECDSA_size(eckey);
154 signature = OPENSSL_malloc(sig_len);
158 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) {
165 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) {
172 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) {
179 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) {
186 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) {
197 ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len);
232 sig_len
[all...]
H A Decdsa.c64 unsigned int *sig_len, EC_KEY *eckey) {
66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
74 const uint8_t *sig, size_t sig_len, EC_KEY *eckey) {
79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
83 if (s == NULL || d2i_ECDSA_SIG(&s, &sig, sig_len) == NULL) {
463 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv,
469 *sig_len = 0;
475 *sig_len = 0;
478 *sig_len
63 ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, EC_KEY *eckey) argument
73 ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, EC_KEY *eckey) argument
462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/chromium_org/content/child/webcrypto/openssl/
H A Drsa_ssa_openssl.cc75 size_t sig_len = 0;
79 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) {
83 buffer->resize(sig_len);
84 if (!EVP_DigestSignFinal(ctx.get(), &buffer->front(), &sig_len))
87 buffer->resize(sig_len);
/external/chromium_org/third_party/boringssl/src/crypto/evp/
H A Dsign.c84 size_t sig_len = EVP_PKEY_size(pkey); local
103 EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len) <= 0) {
106 *out_sig_len = sig_len;
129 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, argument
156 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
H A Ddigestsign.c190 size_t sig_len) {
202 r = tmp_ctx.pctx->pmeth->verifyctx(tmp_ctx.pctx, sig, sig_len, &tmp_ctx);
211 return EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
189 EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len) argument
H A Dexample_sign.c105 size_t sig_len = 0; local
115 sig = malloc(sig_len);
123 if (EVP_DigestSignFinal(&md_ctx, NULL, &sig_len) != 1) {
127 if (sig_len != RSA_size(rsa)) {
128 fprintf(stderr, "sig_len mismatch\n");
132 sig = malloc(sig_len);
136 if (EVP_DigestSignFinal(&md_ctx, sig, &sig_len) != 1) {
H A Devp_ctx.c251 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, argument
262 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len);
283 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, argument
294 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Decdsa.h73 * space. On successful exit, |*sig_len| is set to the actual number of bytes
78 unsigned int *sig_len, EC_KEY *key);
80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid
86 size_t sig_len, EC_KEY *key);
149 unsigned int *sig_len, const BIGNUM *kinv,
H A Ddsa.h204 size_t sig_len, const DSA *dsa);
214 size_t sig_len, const DSA *dsa);
H A Dec_key.h266 unsigned int *sig_len, EC_KEY *eckey);
270 size_t sig_len, EC_KEY *eckey);
H A Devp.h270 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid
277 size_t sig_len);
335 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid
344 size_t sig_len, EVP_PKEY *pkey);
440 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of
442 * |sig| and |*sig_len| updated with the true length.
450 size_t *sig_len, const uint8_t *data,
459 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a valid signature
464 size_t sig_len, const uint8_t *data,
H A Drsa.h205 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid, PKCS#1
217 const uint8_t *sig, size_t sig_len, RSA *rsa);
/external/chromium_org/net/quic/test_tools/
H A Dcrypto_test_utils_openssl.cc48 size_t sig_len; variable
49 if (!EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)) {
53 scoped_ptr<uint8[]> der_sig(new uint8[sig_len]);
54 if (!EVP_DigestSignFinal(md_ctx.get(), der_sig.get(), &sig_len)) {
60 d2i_ECDSA_SIG(NULL, const_cast<const uint8**>(&derp), sig_len));
/external/chromium_org/third_party/boringssl/src/tool/
H A Dspeed.cc138 unsigned sig_len; local
141 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool {
143 sig.get(), &sig_len, key);
152 [key, &fake_sha256_hash, &sig, sig_len]() -> bool {
154 sizeof(fake_sha256_hash), sig.get(), sig_len, key);
/external/chromium_org/third_party/boringssl/src/crypto/dsa/
H A Ddsa.c243 const uint8_t *sig, size_t sig_len, const DSA *dsa) {
252 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) {
270 size_t digest_len, const uint8_t *sig, size_t sig_len,
280 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) {
242 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
269 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_mac.cc365 unsigned int* sig_len,
374 // TODO(davidben): Fix BoringSSL to make sig_len a size_t*.
380 *sig_len = out_len;
387 size_t sig_len,
362 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
384 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* eckey) argument
/external/chromium_org/net/android/
H A Dkeystore_openssl.cc457 unsigned int* sig_len,
485 *sig_len = signature.size();
492 size_t sig_len,
454 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
489 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* ec_key) argument
/external/chromium_org/third_party/boringssl/src/crypto/rsa/
H A Drsa.c443 const uint8_t *sig, size_t sig_len, RSA *rsa) {
452 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa);
455 if (sig_len != rsa_size) {
471 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len,
442 RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, const uint8_t *sig, size_t sig_len, RSA *rsa) argument
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c2569 size_t sig_len; local
2637 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len))
2643 der_sig = OPENSSL_malloc(sig_len);
2650 if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len))
2657 sig = d2i_ECDSA_SIG(NULL, (const unsigned char**) &derp, sig_len);
/external/openssl/ssl/
H A Ds3_clnt.c3638 size_t sig_len; local
3706 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len))
3712 der_sig = OPENSSL_malloc(sig_len);
3719 if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len))
3726 sig = d2i_ECDSA_SIG(NULL, (const unsigned char**) &derp, sig_len);

Completed in 443 milliseconds