Home
last modified time | relevance | path

Searched refs:siglen (Results 1 – 16 of 16) sorted by relevance

/external/boringssl/src/crypto/evp/
Dp_rsa.c165 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_rsa_sign() argument
172 *siglen = key_len; in pkey_rsa_sign()
176 if (*siglen < key_len) { in pkey_rsa_sign()
199 *siglen = out_len; in pkey_rsa_sign()
206 !RSA_sign_raw(rsa, siglen, sig, *siglen, rctx->tbuf, key_len, in pkey_rsa_sign()
217 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); in pkey_rsa_sign()
221 size_t siglen, const uint8_t *tbs, in pkey_rsa_verify() argument
231 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); in pkey_rsa_verify()
235 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, in pkey_rsa_verify()
249 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, in pkey_rsa_verify()
Dp_ec.c126 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_ec_sign() argument
134 *siglen = ECDSA_size(ec); in pkey_ec_sign()
136 } else if (*siglen < (size_t)ECDSA_size(ec)) { in pkey_ec_sign()
149 *siglen = (size_t)sltmp; in pkey_ec_sign()
153 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, in pkey_ec_verify() argument
164 return ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
Dp_hmac.c159 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, in hmac_signctx() argument
166 *siglen = md_size; in hmac_signctx()
168 } else if (*siglen < md_size) { in hmac_signctx()
176 *siglen = (size_t)hlen; in hmac_signctx()
Dinternal.h263 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
267 int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen,
271 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
275 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig, int siglen,
/external/openssh/
Dssh-rsa.c214 u_char *sigbuf, size_t siglen, RSA *rsa) in openssh_RSA_verify() argument
237 siglen == 0 || siglen > rsasize) { in openssh_RSA_verify()
245 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
Dkey.c139 size_t siglen; in key_sign() local
145 if ((r = sshkey_sign(key, &sig, &siglen, in key_sign()
151 if (siglen > INT_MAX) in key_sign()
152 fatal("%s: giant len %zu", __func__, siglen); in key_sign()
156 *lenp = siglen; in key_sign()
Dsshconnect2.c1583 size_t siglen = 0, keylen = 0; in userauth_hostbased() local
1682 r = ssh_keysign(private, &sig, &siglen, in userauth_hostbased()
1684 else if ((r = sshkey_sign(private, &sig, &siglen, in userauth_hostbased()
1700 (r = sshpkt_put_string(ssh, sig, siglen)) != 0 || in userauth_hostbased()
1709 explicit_bzero(sig, siglen); in userauth_hostbased()
Dmonitor.c696 size_t datlen, siglen; in mm_answer_sign() local
750 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, in mm_answer_sign()
756 if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen, in mm_answer_sign()
765 is_proof ? "KEX" : "hostkey proof", signature, siglen); in mm_answer_sign()
768 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_sign()
Dmonitor_wrap.c445 mm_key_verify(Key *key, u_char *sig, u_int siglen, u_char *data, u_int datalen) in mm_key_verify() argument
460 buffer_put_string(&m, sig, siglen); in mm_key_verify()
Dclientloop.c2248 size_t siglen; in client_global_hostkeys_private_confirm() local
2281 if ((r = sshpkt_get_string_direct(ssh, &sig, &siglen)) != 0) { in client_global_hostkeys_private_confirm()
2286 if ((r = sshkey_verify(ctx->keys[i], sig, siglen, in client_global_hostkeys_private_confirm()
Dsshkey.c2230 const u_char *sig, size_t siglen, in sshkey_verify() argument
2233 if (siglen == 0 || dlen > SSH_KEY_MAX_SIGN_DATA_SIZE) in sshkey_verify()
2240 return ssh_dss_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify()
2244 return ssh_ecdsa_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify()
2249 return ssh_rsa_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify()
2253 return ssh_ed25519_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify()
/external/boringssl/src/crypto/dsa/
Ddsa_test.c193 unsigned int siglen; in test_generate() local
242 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa)) { in test_generate()
245 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa) == 1) { in test_generate()
/external/boringssl/src/include/openssl/
Drsa.h411 uint8_t *sigret, unsigned int *siglen, const RSA *rsa);
414 const uint8_t *sigbuf, unsigned int siglen, const RSA *rsa);
Dpem.h411 OPENSSL_EXPORT int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_…
/external/boringssl/src/ssl/
Ds3_lib.c707 size_t i, siglen; in ssl3_get_req_cert_type() local
719 siglen = tls12_get_psigalgs(s, &sig); in ssl3_get_req_cert_type()
720 for (i = 0; i < siglen; i += 2, sig += 2) { in ssl3_get_req_cert_type()
/external/conscrypt/src/main/native/
Dorg_conscrypt_NativeCrypto.cpp1809 long siglen = static_cast<long>(signatureBytes.size()); local
1810 return d2i_ECDSA_SIG(NULL, &sigbuf, siglen);