/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 150 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument 168 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign() 187 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument 224 size_t tbslen) in ed25519_digest_verify() argument 234 return s390x_ed25519_digestverify(edkey, sig, tbs, tbslen); in ed25519_digest_verify() 237 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_digest_verify() 243 size_t tbslen) in ed448_digest_verify() argument 253 return s390x_ed448_digestverify(edkey, sig, tbs, tbslen); in ed448_digest_verify() 431 ¶m.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_ed25519_digestverify() 437 size_t tbslen) in s390x_ed448_digestverify() argument [all …]
|
H A D | rsa_sig.c | 537 if (tbslen != mdsize) { in rsa_sign() 564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign() 567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign() 574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign() 575 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign() 576 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign() 644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign() 762 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument 795 if (tbslen != mdsize) { in rsa_verify() 798 mdsize, tbslen); in rsa_verify() [all …]
|
H A D | sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
H A D | dsa_sig.c | 231 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 250 if (mdsize != 0 && tbslen != mdsize) in dsa_sign() 253 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign() 262 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 267 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify() 270 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
|
H A D | ecdsa_sig.c | 170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign() 196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign() 205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify() 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 79 size_t tbslen) in pkey_dsa_sign() argument 91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign() 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify() 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 135 size_t tbslen) in pkey_rsa_sign() argument 147 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_sign() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 172 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument 270 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify() 272 if (tbslen != (size_t)EVP_MD_get_size(rctx->md)) { in pkey_rsa_verify() [all …]
|
/openssl/crypto/ec/ |
H A D | ecx_meth.c | 808 size_t tbslen) in pkey_ecd_digestsign25519() argument 835 size_t tbslen) in pkey_ecd_digestsign448() argument 862 size_t tbslen) in pkey_ecd_digestverify25519() argument 874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 880 size_t tbslen) in pkey_ecd_digestverify448() argument 1192 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument 1237 size_t tbslen) in s390x_pkey_ecd_digestsign448() argument 1285 size_t tbslen) in s390x_pkey_ecd_digestverify25519() argument 1310 ¶m.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519() 1317 size_t tbslen) in s390x_pkey_ecd_digestverify448() argument [all …]
|
H A D | ec_pmeth.c | 107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_meth_new.pod | 65 size_t tbslen)); 72 size_t tbslen)); 128 size_t tbslen)); 134 size_t tbslen)); 165 size_t tbslen)); 172 size_t tbslen)); 228 size_t tbslen)); 294 const unsigned char *tbs, size_t tbslen); 303 const unsigned char *tbs, size_t tbslen); 362 const unsigned char *tbs, size_t tbslen); [all …]
|
H A D | EVP_PKEY_verify.pod | 16 const unsigned char *tbs, size_t tbslen); 32 signed) is specified using the I<tbs> and I<tbslen> parameters.
|
H A D | EVP_PKEY_sign.pod | 16 const unsigned char *tbs, size_t tbslen); 31 I<tbslen> parameters. If I<sig> is NULL then the maximum size of the output
|
H A D | EVP_DigestVerifyInit.pod | 22 size_t siglen, const unsigned char *tbs, size_t tbslen); 118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
|
H A D | EVP_DigestSignInit.pod | 23 size_t tbslen); 131 EVP_DigestSign() signs I<tbslen> bytes of data at I<tbs> and places the
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 561 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 573 tbs, tbslen); in EVP_DigestSign() 577 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 580 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 654 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 665 tbs, tbslen); in EVP_DigestVerify() 669 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 672 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
H A D | signature.c | 632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 694 tbs, tbslen); in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
H A D | pmeth_lib.c | 1700 size_t tbslen)) in EVP_PKEY_meth_set_sign() argument 1712 size_t tbslen)) in EVP_PKEY_meth_set_verify() argument 1728 size_t tbslen)) in EVP_PKEY_meth_set_verify_recover() argument 1805 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument 1813 size_t tbslen)) in EVP_PKEY_meth_set_digestverify() argument 1889 size_t tbslen)) in EVP_PKEY_meth_get_sign() argument 1903 size_t tbslen)) in EVP_PKEY_meth_get_verify() argument 1921 size_t tbslen)) in EVP_PKEY_meth_get_verify_recover() argument 2012 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument 2021 size_t tbslen)) in EVP_PKEY_meth_get_digestverify() argument
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 29 size_t sigsize, const unsigned char *tbs, size_t tbslen); 35 const unsigned char *tbs, size_t tbslen); 55 size_t tbslen); 68 size_t tbslen); 211 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen> 233 is I<tbslen> bytes long. 289 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL, 323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
|
/openssl/include/openssl/ |
H A D | evp.h | 811 size_t tbslen); 821 size_t tbslen); 1897 const unsigned char *tbs, size_t tbslen); 1902 const unsigned char *tbs, size_t tbslen); 2016 const unsigned char *tbs, size_t tbslen)); 2020 const unsigned char *tbs, size_t tbslen)); 2025 size_t tbslen)); 2059 size_t tbslen)); 2085 const unsigned char *tbs, size_t tbslen)); 2095 size_t tbslen)); [all …]
|
H A D | core_dispatch.h | 712 size_t tbslen)) 719 size_t tbslen)) 735 size_t sigsize, const unsigned char *tbs, size_t tbslen)) 745 const unsigned char *tbs, size_t tbslen))
|
/openssl/include/crypto/ |
H A D | evp.h | 147 const unsigned char *tbs, size_t tbslen); 151 const unsigned char *tbs, size_t tbslen); 173 const unsigned char *tbs, size_t tbslen); 176 size_t tbslen);
|
/openssl/test/ |
H A D | fake_rsaprov.c | 211 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
|
H A D | enginetest.c | 197 size_t *siglen, const unsigned char *tbs, size_t tbslen) in test_encrypt() argument
|
/openssl/ssl/statem/ |
H A D | statem_srvr.c | 2686 size_t siglen = 0, tbslen; in tls_construct_server_key_exchange() local 2718 tbslen = construct_key_exchange_tbs(s, &tbs, in tls_construct_server_key_exchange() 2721 if (tbslen == 0) { in tls_construct_server_key_exchange() 2726 if (EVP_DigestSign(md_ctx, NULL, &siglen, tbs, tbslen) <=0 in tls_construct_server_key_exchange() 2728 || EVP_DigestSign(md_ctx, sigbytes1, &siglen, tbs, tbslen) <= 0 in tls_construct_server_key_exchange()
|
H A D | statem_lib.c | 2427 size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; in construct_key_exchange_tbs() local 2428 unsigned char *tbs = OPENSSL_malloc(tbslen); in construct_key_exchange_tbs() 2440 return tbslen; in construct_key_exchange_tbs()
|