/external/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 346 size_t sig_len = 0; in TestEVP_DigestSignInit() local 347 if (!EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)) { in TestEVP_DigestSignInit() 351 if (sig_len != (size_t)EVP_PKEY_size(pkey.get())) { in TestEVP_DigestSignInit() 357 sig.resize(sig_len); in TestEVP_DigestSignInit() 358 if (!EVP_DigestSignFinal(md_ctx.get(), bssl::vector_data(&sig), &sig_len)) { in TestEVP_DigestSignInit() 361 sig.resize(sig_len); in TestEVP_DigestSignInit() 367 !EVP_DigestVerifyFinal(md_ctx.get(), bssl::vector_data(&sig), sig_len)) { in TestEVP_DigestSignInit() 402 size_t sig_len = 0; in TestAlgorithmRoundtrip() local 403 if (!EVP_DigestSignFinal(md_ctx, NULL, &sig_len)) { in TestAlgorithmRoundtrip() 407 if (sig_len != (size_t)EVP_PKEY_size(pkey)) { in TestAlgorithmRoundtrip() [all …]
|
D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); in EVP_SignFinal() local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { in EVP_SignFinal() 100 *out_sig_len = sig_len; in EVP_SignFinal() 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_VerifyFinal() argument 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len); in EVP_VerifyFinal()
|
D | digestsign.c | 182 size_t sig_len) { in EVP_DigestVerifyFinal() argument 193 r = tmp_ctx.pctx->pmeth->verifyctx(tmp_ctx.pctx, sig, sig_len, &tmp_ctx); in EVP_DigestVerifyFinal() 197 r = EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal()
|
D | evp_ctx.c | 250 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, in EVP_PKEY_sign() argument 261 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len); in EVP_PKEY_sign() 282 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, in EVP_PKEY_verify() argument 293 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len); in EVP_PKEY_verify()
|
/external/boringssl/src/crypto/ecdsa/ |
D | ecdsa_test.cc | 81 int sig_len = i2d_ECDSA_SIG(ecdsa_sig, NULL); in VerifyECDSASig() local 82 if (sig_len <= 0) { in VerifyECDSASig() 85 std::vector<uint8_t> signature(static_cast<size_t>(sig_len)); in VerifyECDSASig() 87 sig_len = i2d_ECDSA_SIG(ecdsa_sig, &sig_ptr); in VerifyECDSASig() 88 if (sig_len <= 0) { in VerifyECDSASig() 227 unsigned sig_len = ECDSA_size(eckey.get()); in TestBuiltin() local 228 std::vector<uint8_t> signature(sig_len); in TestBuiltin() 229 if (!ECDSA_sign(0, digest, 20, bssl::vector_data(&signature), &sig_len, in TestBuiltin() 234 signature.resize(sig_len); in TestBuiltin()
|
D | ecdsa.c | 65 unsigned int *sig_len, EC_KEY *eckey) { in ECDSA_sign() argument 67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); in ECDSA_sign() 70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, in ECDSA_sign() 75 const uint8_t *sig, size_t sig_len, EC_KEY *eckey) { in ECDSA_verify() argument 81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); in ECDSA_verify() 86 if (s == NULL || d2i_ECDSA_SIG(&s, &sigp, sig_len) == NULL || in ECDSA_verify() 87 sigp != sig + sig_len) { in ECDSA_verify() 93 if (der_len < 0 || (size_t) der_len != sig_len || memcmp(sig, der, sig_len)) { in ECDSA_verify() 456 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, in ECDSA_sign_ex() argument 462 *sig_len = 0; in ECDSA_sign_ex() [all …]
|
/external/vboot_reference/utility/ |
D | verify_data.c | 52 int i, algorithm, sig_len; in main() local 74 sig_len = siglen_map[algorithm]; in main() 76 (signature = read_signature(argv[3], sig_len)) && in main() 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) { in main()
|
/external/boringssl/src/tool/ |
D | speed.cc | 147 unsigned sig_len; in SpeedRSA() local 151 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { in SpeedRSA() 153 sig.get(), &sig_len, key); in SpeedRSA() 162 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { in SpeedRSA() 164 sizeof(fake_sha256_hash), sig.get(), sig_len, key); in SpeedRSA() 369 unsigned sig_len; in SpeedECDSACurve() local 372 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { in SpeedECDSACurve() 373 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, in SpeedECDSACurve() 381 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { in SpeedECDSACurve() 382 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, in SpeedECDSACurve()
|
/external/vboot_reference/firmware/lib/cryptolib/ |
D | rsa.c | 132 const uint32_t sig_len, in RSAVerify() argument 143 if (sig_len != (key->len * sizeof(uint32_t))) { in RSAVerify() 158 buf = (uint8_t*) VbExMalloc(sig_len); in RSAVerify() 161 Memcpy(buf, sig, sig_len); in RSAVerify() 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { in RSAVerify()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 233 const uint8_t *sig, size_t sig_len, const DSA *dsa) { in DSA_verify() argument 235 if (!DSA_check_signature(&valid, digest, digest_len, sig, sig_len, dsa)) { in DSA_verify() 242 size_t digest_len, const uint8_t *sig, size_t sig_len, in DSA_check_signature() argument 254 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) { in DSA_check_signature() 260 if (der_len < 0 || (size_t)der_len != sig_len || memcmp(sig, der, sig_len)) { in DSA_check_signature()
|
D | dsa_test.c | 257 static int test_verify(const uint8_t *sig, size_t sig_len, int expect) { in test_verify() argument 264 int ret = DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa); in test_verify()
|
/external/vboot_reference/tests/ |
D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; in SpeedTestAlgorithm() local 58 signature = BufferFromFile(file_name, &sig_len); in SpeedTestAlgorithm() 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) in SpeedTestAlgorithm()
|
D | rsa_utility_tests.c | 31 const uint32_t sig_len, in RSAVerify() argument
|
/external/boringssl/src/include/openssl/ |
D | ecdsa.h | 78 unsigned int *sig_len, EC_KEY *key); 86 size_t sig_len, EC_KEY *key); 145 unsigned int *sig_len, const BIGNUM *kinv,
|
D | ec_key.h | 266 unsigned int *sig_len, EC_KEY *eckey); 270 size_t sig_len, EC_KEY *eckey);
|
D | evp.h | 303 size_t sig_len); 370 size_t sig_len, EVP_PKEY *pkey); 464 size_t *sig_len, const uint8_t *data, 478 size_t sig_len, const uint8_t *data,
|
D | dsa.h | 205 size_t sig_len, const DSA *dsa); 215 size_t sig_len, const DSA *dsa);
|
D | rsa.h | 217 const uint8_t *sig, size_t sig_len, RSA *rsa);
|
/external/vboot_reference/firmware/lib/cryptolib/include/ |
D | rsa.h | 38 const uint32_t sig_len,
|
/external/boringssl/src/crypto/rsa/ |
D | rsa.c | 443 const uint8_t *sig, size_t sig_len, RSA *rsa) { in RSA_verify() argument 452 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa); in RSA_verify() 455 if (sig_len != rsa_size) { in RSA_verify() 471 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, in RSA_verify()
|
/external/boringssl/src/ssl/ |
D | s3_clnt.c | 2260 size_t sig_len; in ssl3_send_channel_id() local 2326 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) { in ssl3_send_channel_id() 2332 der_sig = OPENSSL_malloc(sig_len); in ssl3_send_channel_id() 2338 if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len)) { in ssl3_send_channel_id() 2345 sig = d2i_ECDSA_SIG(NULL, (const uint8_t **)&derp, sig_len); in ssl3_send_channel_id()
|
D | s3_srvr.c | 1466 size_t sig_len = EVP_PKEY_size(pkey); in ssl3_send_server_key_exchange() local 1491 !EVP_DigestSignFinal(&md_ctx, &p[2], &sig_len)) { in ssl3_send_server_key_exchange() 1496 s2n(sig_len, p); in ssl3_send_server_key_exchange() 1497 n += sig_len + 2; in ssl3_send_server_key_exchange()
|
/external/openssh/ |
D | sshkey.c | 2405 size_t i, ca_len, sig_len; in sshkey_certify() local 2512 if ((ret = sshkey_sign(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify() 2517 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_certify()
|
/external/conscrypt/src/main/native/ |
D | org_conscrypt_NativeCrypto.cpp | 2079 unsigned int* sig_len, argument 2114 *sig_len = signatureBytes.size();
|