Home
last modified time | relevance | path

Searched refs:tbslen (Results 1 – 25 of 28) sorted by relevance

12

/openssl-master/providers/implementations/signature/
A Deddsa_sig.c151 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument
182 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument
200 return s390x_ed448_digestsign(edkey, sigret, tbs, tbslen); in ed448_digest_sign()
213 size_t tbslen) in ed25519_digest_verify() argument
223 return s390x_ed25519_digestverify(edkey, sig, tbs, tbslen); in ed25519_digest_verify()
226 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_digest_verify()
232 size_t tbslen) in ed448_digest_verify() argument
242 return s390x_ed448_digestverify(edkey, sig, tbs, tbslen); in ed448_digest_verify()
420 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_ed25519_digestverify()
426 size_t tbslen) in s390x_ed448_digestverify() argument
[all …]
A Drsa_sig.c534 if (tbslen != mdsize) { in rsa_sign()
561 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign()
564 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign()
571 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign()
572 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign()
573 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign()
641 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign()
759 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument
792 if (tbslen != mdsize) { in rsa_verify()
795 mdsize, tbslen); in rsa_verify()
[all …]
A Dsm2_sig.c158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
A Ddsa_sig.c232 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign()
254 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign()
263 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify()
271 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
A Decdsa_sig.c170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument
193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign()
196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign()
205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify()
212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
/openssl-master/crypto/dsa/
A Ddsa_pmeth.c79 size_t tbslen) in pkey_dsa_sign() argument
91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign()
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify()
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/openssl-master/crypto/rsa/
A Drsa_pmeth.c135 size_t tbslen) in pkey_rsa_sign() argument
147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign()
162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign()
177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
270 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify()
272 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_verify()
[all …]
/openssl-master/crypto/ec/
A Decx_meth.c807 size_t tbslen) in pkey_ecd_digestsign25519() argument
829 size_t tbslen) in pkey_ecd_digestsign448() argument
851 size_t tbslen) in pkey_ecd_digestverify25519() argument
858 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
864 size_t tbslen) in pkey_ecd_digestverify448() argument
1171 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument
1211 size_t tbslen) in s390x_pkey_ecd_digestsign448() argument
1254 size_t tbslen) in s390x_pkey_ecd_digestverify25519() argument
1274 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519()
1281 size_t tbslen) in s390x_pkey_ecd_digestverify448() argument
[all …]
A Dec_pmeth.c107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/openssl-master/doc/man3/
A DEVP_PKEY_meth_new.pod65 size_t tbslen));
72 size_t tbslen));
128 size_t tbslen));
134 size_t tbslen));
165 size_t tbslen));
172 size_t tbslen));
228 size_t tbslen));
294 const unsigned char *tbs, size_t tbslen);
303 const unsigned char *tbs, size_t tbslen);
362 const unsigned char *tbs, size_t tbslen);
[all …]
A DEVP_PKEY_verify.pod16 const unsigned char *tbs, size_t tbslen);
32 signed) is specified using the I<tbs> and I<tbslen> parameters.
A DEVP_PKEY_sign.pod16 const unsigned char *tbs, size_t tbslen);
31 I<tbslen> parameters. If I<sig> is NULL then the maximum size of the output
A DEVP_DigestVerifyInit.pod22 size_t siglen, const unsigned char *tbs, size_t tbslen);
118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
A DEVP_DigestSignInit.pod23 size_t tbslen);
131 EVP_DigestSign() signs I<tbslen> bytes of data at I<tbs> and places the
/openssl-master/crypto/evp/
A Dm_sigver.c568 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
580 tbs, tbslen); in EVP_DigestSign()
584 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
587 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
661 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
672 tbs, tbslen); in EVP_DigestVerify()
676 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
679 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
A Dsignature.c631 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
649 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
660 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
675 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
693 tbs, tbslen); in EVP_PKEY_verify()
702 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
A Dpmeth_lib.c1700 size_t tbslen)) in EVP_PKEY_meth_set_sign() argument
1712 size_t tbslen)) in EVP_PKEY_meth_set_verify() argument
1728 size_t tbslen)) in EVP_PKEY_meth_set_verify_recover() argument
1805 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument
1813 size_t tbslen)) in EVP_PKEY_meth_set_digestverify() argument
1889 size_t tbslen)) in EVP_PKEY_meth_get_sign() argument
1903 size_t tbslen)) in EVP_PKEY_meth_get_verify() argument
1921 size_t tbslen)) in EVP_PKEY_meth_get_verify_recover() argument
2012 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument
2021 size_t tbslen)) in EVP_PKEY_meth_get_digestverify() argument
/openssl-master/doc/man7/
A Dprovider-signature.pod29 size_t sigsize, const unsigned char *tbs, size_t tbslen);
35 const unsigned char *tbs, size_t tbslen);
55 size_t tbslen);
68 size_t tbslen);
211 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen>
233 is I<tbslen> bytes long.
291 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL,
327 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
/openssl-master/include/openssl/
A Devp.h808 size_t tbslen);
818 size_t tbslen);
1894 const unsigned char *tbs, size_t tbslen);
1899 const unsigned char *tbs, size_t tbslen);
2013 const unsigned char *tbs, size_t tbslen));
2017 const unsigned char *tbs, size_t tbslen));
2022 size_t tbslen));
2056 size_t tbslen));
2082 const unsigned char *tbs, size_t tbslen));
2092 size_t tbslen));
[all …]
A Dcore_dispatch.h712 size_t tbslen))
719 size_t tbslen))
735 size_t sigsize, const unsigned char *tbs, size_t tbslen))
745 const unsigned char *tbs, size_t tbslen))
/openssl-master/test/
A Dfake_rsaprov.c153 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
A Denginetest.c196 size_t *siglen, const unsigned char *tbs, size_t tbslen) in test_encrypt() argument
/openssl-master/include/crypto/
A Devp.h147 const unsigned char *tbs, size_t tbslen);
151 const unsigned char *tbs, size_t tbslen);
173 const unsigned char *tbs, size_t tbslen);
176 size_t tbslen);
/openssl-master/ssl/statem/
A Dstatem_srvr.c2662 size_t siglen = 0, tbslen; in tls_construct_server_key_exchange() local
2694 tbslen = construct_key_exchange_tbs(s, &tbs, in tls_construct_server_key_exchange()
2697 if (tbslen == 0) { in tls_construct_server_key_exchange()
2702 if (EVP_DigestSign(md_ctx, NULL, &siglen, tbs, tbslen) <=0 in tls_construct_server_key_exchange()
2704 || EVP_DigestSign(md_ctx, sigbytes1, &siglen, tbs, tbslen) <= 0 in tls_construct_server_key_exchange()
A Dstatem_lib.c2349 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() local
2350 unsigned char *tbs = OPENSSL_malloc(tbslen); in construct_key_exchange_tbs()
2362 return tbslen; in construct_key_exchange_tbs()

Completed in 73 milliseconds

12