/external/boringssl/src/crypto/evp/ |
D | p_rsa.c | 165 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_rsa_sign() argument 172 *siglen = key_len; in pkey_rsa_sign() 176 if (*siglen < key_len) { in pkey_rsa_sign() 199 *siglen = out_len; in pkey_rsa_sign() 206 !RSA_sign_raw(rsa, siglen, sig, *siglen, rctx->tbuf, key_len, in pkey_rsa_sign() 217 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); in pkey_rsa_sign() 221 size_t siglen, const uint8_t *tbs, in pkey_rsa_verify() argument 231 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); in pkey_rsa_verify() 235 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, in pkey_rsa_verify() 249 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, in pkey_rsa_verify()
|
D | p_ec.c | 126 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, in pkey_ec_sign() argument 134 *siglen = ECDSA_size(ec); in pkey_ec_sign() 136 } else if (*siglen < (size_t)ECDSA_size(ec)) { in pkey_ec_sign() 149 *siglen = (size_t)sltmp; in pkey_ec_sign() 153 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, in pkey_ec_verify() argument 164 return ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
D | p_hmac.c | 159 static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, in hmac_signctx() argument 166 *siglen = md_size; in hmac_signctx() 168 } else if (*siglen < md_size) { in hmac_signctx() 176 *siglen = (size_t)hlen; in hmac_signctx()
|
D | internal.h | 263 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 267 int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, 271 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 275 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig, int siglen,
|
/external/openssh/ |
D | ssh-rsa.c | 214 u_char *sigbuf, size_t siglen, RSA *rsa) in openssh_RSA_verify() argument 237 siglen == 0 || siglen > rsasize) { in openssh_RSA_verify() 245 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
|
D | key.c | 139 size_t siglen; in key_sign() local 145 if ((r = sshkey_sign(key, &sig, &siglen, in key_sign() 151 if (siglen > INT_MAX) in key_sign() 152 fatal("%s: giant len %zu", __func__, siglen); in key_sign() 156 *lenp = siglen; in key_sign()
|
D | sshconnect2.c | 1583 size_t siglen = 0, keylen = 0; in userauth_hostbased() local 1682 r = ssh_keysign(private, &sig, &siglen, in userauth_hostbased() 1684 else if ((r = sshkey_sign(private, &sig, &siglen, in userauth_hostbased() 1700 (r = sshpkt_put_string(ssh, sig, siglen)) != 0 || in userauth_hostbased() 1709 explicit_bzero(sig, siglen); in userauth_hostbased()
|
D | monitor.c | 696 size_t datlen, siglen; in mm_answer_sign() local 750 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, in mm_answer_sign() 756 if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen, in mm_answer_sign() 765 is_proof ? "KEX" : "hostkey proof", signature, siglen); in mm_answer_sign() 768 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_sign()
|
D | monitor_wrap.c | 445 mm_key_verify(Key *key, u_char *sig, u_int siglen, u_char *data, u_int datalen) in mm_key_verify() argument 460 buffer_put_string(&m, sig, siglen); in mm_key_verify()
|
D | clientloop.c | 2248 size_t siglen; in client_global_hostkeys_private_confirm() local 2281 if ((r = sshpkt_get_string_direct(ssh, &sig, &siglen)) != 0) { in client_global_hostkeys_private_confirm() 2286 if ((r = sshkey_verify(ctx->keys[i], sig, siglen, in client_global_hostkeys_private_confirm()
|
D | sshkey.c | 2230 const u_char *sig, size_t siglen, in sshkey_verify() argument 2233 if (siglen == 0 || dlen > SSH_KEY_MAX_SIGN_DATA_SIZE) in sshkey_verify() 2240 return ssh_dss_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify() 2244 return ssh_ecdsa_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify() 2249 return ssh_rsa_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify() 2253 return ssh_ed25519_verify(key, sig, siglen, data, dlen, compat); in sshkey_verify()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa_test.c | 193 unsigned int siglen; in test_generate() local 242 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa)) { in test_generate() 245 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa) == 1) { in test_generate()
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 411 uint8_t *sigret, unsigned int *siglen, const RSA *rsa); 414 const uint8_t *sigbuf, unsigned int siglen, const RSA *rsa);
|
D | pem.h | 411 OPENSSL_EXPORT int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_…
|
/external/boringssl/src/ssl/ |
D | s3_lib.c | 707 size_t i, siglen; in ssl3_get_req_cert_type() local 719 siglen = tls12_get_psigalgs(s, &sig); in ssl3_get_req_cert_type() 720 for (i = 0; i < siglen; i += 2, sig += 2) { in ssl3_get_req_cert_type()
|
/external/conscrypt/src/main/native/ |
D | org_conscrypt_NativeCrypto.cpp | 1809 long siglen = static_cast<long>(signatureBytes.size()); local 1810 return d2i_ECDSA_SIG(NULL, &sigbuf, siglen);
|