/external/boringssl/src/crypto/evp/ |
H A D | p_ed25519.c | 27 size_t *siglen, const uint8_t *tbs, 35 *siglen = 64; 44 size_t siglen, const uint8_t *tbs, 47 if (siglen != 64 || 26 pkey_ed25519_sign_message(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, const uint8_t *tbs, size_t tbslen) argument 43 pkey_ed25519_verify_message(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, const uint8_t *tbs, size_t tbslen) argument
|
H A D | p_ec.c | 117 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, argument 123 *siglen = ECDSA_size(ec); 125 } else if (*siglen < (size_t)ECDSA_size(ec)) { 133 *siglen = (size_t)sltmp; 137 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, argument 139 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->pkey->pkey.ec);
|
H A D | p_rsa.c | 171 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, argument 178 *siglen = key_len; 182 if (*siglen < key_len) { 194 *siglen = out_len; 198 return RSA_sign_pss_mgf1(rsa, siglen, sig, *siglen, tbs, tbslen, 206 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); 210 size_t siglen, const uint8_t *tbs, 218 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rs 209 pkey_rsa_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, const uint8_t *tbs, size_t tbslen) argument [all...] |
/external/boringssl/src/crypto/dsa/ |
H A D | dsa_test.cc | 225 unsigned int siglen; local 277 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa.get())) { 280 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa.get()) !=
|
/external/nos/test/system-test-harness/tools/ |
H A D | avb_tools.cc | 135 size_t siglen = sizeof(signature); local 136 memset(signature, 0, siglen); 143 //EXPECT_EQ(0, SignChallenge(&message, signature, &siglen)); 144 Reset(client, ResetRequest::PRODUCTION, signature, siglen);
|
/external/nos/test/system-test-harness/src/ |
H A D | avb_tests.cc | 41 uint8_t *signature, size_t *siglen); 199 size_t siglen = *maxsig; local 217 EVP_DigestSignFinal(&md_ctx, NULL, &siglen); 218 if (siglen > *maxsig) { 219 std::cerr << "Signature length too long: " << siglen << " > " 223 *maxsig = siglen; 224 int code = EVP_DigestSignFinal(&md_ctx, signature, &siglen); 771 size_t siglen = sizeof(signature); local 783 ASSERT_EQ(0, SignChallenge(&message, signature, &siglen)); 788 code = Reset(client.get(), ResetRequest::PRODUCTION, signature, siglen); 848 size_t siglen = sizeof(signature); local [all...] |
/external/valgrind/include/vki/ |
H A D | vki-solaris.h | 333 vki_uint32_t siglen; member in struct:vki_kcf_door_arg_s::__anon29535::vki_kcf_door_result_s
|