/openssl/test/ |
H A D | ecdsatest.c | 226 || !TEST_int_gt(RAND_bytes(tbs, sizeof(tbs)), 0) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 272 tbs[0] ^= 1; in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 279 tbs[0] ^= 1; in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 313 dirt = tbs[1] ? tbs[1] : 1; in test_builtin() 317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() [all …]
|
H A D | evp_extra_test.c | 1106 unsigned char tbs[] = { in test_EVP_PKEY_sign() local 1135 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, in test_EVP_PKEY_sign() 1136 sizeof(tbs)), 0)) in test_EVP_PKEY_sign() 1141 || !TEST_int_le(EVP_PKEY_sign(ctx, sig, &shortsig_len, tbs, in test_EVP_PKEY_sign() 1142 sizeof(tbs)), 0) in test_EVP_PKEY_sign() 1143 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 1147 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 4004 const unsigned char *tbs, size_t tbslen); in custom_pmeth_sign() 4011 size_t *siglen, const unsigned char *tbs, in custom_pmeth_digestsign() argument 4015 const unsigned char *tbs, size_t tbslen); in custom_pmeth_digestsign() [all …]
|
H A D | fake_rsaprov.c | 211 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
|
/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 150 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument 168 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign() 187 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument 223 size_t siglen, const unsigned char *tbs, in ed25519_digest_verify() argument 234 return s390x_ed25519_digestverify(edkey, sig, tbs, tbslen); in ed25519_digest_verify() 237 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_digest_verify() 242 size_t siglen, const unsigned char *tbs, in ed448_digest_verify() argument 253 return s390x_ed448_digestverify(edkey, sig, tbs, tbslen); in ed448_digest_verify() 431 ¶m.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_ed25519_digestverify() 436 const unsigned char *tbs, in s390x_ed448_digestverify() argument [all …]
|
H A D | rsa_sig.c | 515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument 551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign() 574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign() 585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign() 627 prsactx->tbuf, tbs, in rsa_sign() 644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign() 762 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument 772 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, in rsa_verify() 810 ret = RSA_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs, in rsa_verify() 836 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify()
|
H A D | sm2_sig.c | 158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
H A D | dsa_sig.c | 231 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 253 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign() 262 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 270 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
|
H A D | ecdsa_sig.c | 170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign() 205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
|
/openssl/crypto/ec/ |
H A D | ecx_meth.c | 834 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 853 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 1191 const unsigned char *tbs, in s390x_pkey_ecd_digestsign25519() argument 1222 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() 1236 const unsigned char *tbs, in s390x_pkey_ecd_digestsign448() argument 1267 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); in s390x_pkey_ecd_digestsign448() 1284 const unsigned char *tbs, in s390x_pkey_ecd_digestverify25519() argument 1310 ¶m.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519() 1316 const unsigned char *tbs, in s390x_pkey_ecd_digestverify448() argument [all …]
|
H A D | ec_pmeth.c | 107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 134 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 185 rctx->tbuf, tbs, in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument 270 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify() 287 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, in pkey_rsa_verify() 305 if ((rslen != tbslen) || memcmp(tbs, rctx->tbuf, rslen)) in pkey_rsa_verify()
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_meth_new.pod | 64 const unsigned char *tbs, 71 const unsigned char *tbs, 82 char *tbs, 127 const unsigned char *tbs, 164 const unsigned char *tbs, 171 const unsigned char *tbs, 182 char *tbs, 294 const unsigned char *tbs, size_t tbslen); 303 const unsigned char *tbs, size_t tbslen); 362 const unsigned char *tbs, size_t tbslen); [all …]
|
H A D | EVP_PKEY_verify.pod | 16 const unsigned char *tbs, size_t tbslen); 32 signed) is specified using the I<tbs> and I<tbslen> parameters. 48 successfully (that is tbs did not match the original data or the signature was
|
H A D | EVP_PKEY_sign.pod | 16 const unsigned char *tbs, size_t tbslen); 30 using I<ctx>. The data to be signed is specified using the I<tbs> and
|
H A D | EVP_DigestVerifyInit.pod | 22 size_t siglen, const unsigned char *tbs, size_t tbslen); 118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature 128 did not verify successfully (that is, B<tbs> did not match the original data or
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 561 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 573 tbs, tbslen); in EVP_DigestSign() 577 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 580 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 654 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 665 tbs, tbslen); in EVP_DigestVerify() 669 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 672 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
H A D | signature.c | 632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 694 tbs, tbslen); in EVP_PKEY_verify() 703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
H A D | pmeth_lib.c | 1699 const unsigned char *tbs, in EVP_PKEY_meth_set_sign() argument 1711 const unsigned char *tbs, in EVP_PKEY_meth_set_verify() argument 1727 char *tbs, in EVP_PKEY_meth_set_verify_recover() argument 1805 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument 1812 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument 1888 const unsigned char *tbs, in EVP_PKEY_meth_get_sign() argument 1902 const unsigned char *tbs, in EVP_PKEY_meth_get_verify() argument 1920 char *tbs, in EVP_PKEY_meth_get_verify_recover() argument 2012 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument 2020 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_get_digestverify() argument
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 29 size_t sigsize, const unsigned char *tbs, size_t tbslen); 35 const unsigned char *tbs, size_t tbslen); 54 size_t sigsize, const unsigned char *tbs, 67 size_t siglen, const unsigned char *tbs, 211 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen> 232 The data that the signature covers is pointed to be the I<tbs> parameter which 289 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL, 323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
|
/openssl/include/openssl/ |
H A D | evp.h | 810 size_t *siglen, const unsigned char *tbs, 820 size_t siglen, const unsigned char *tbs, 1897 const unsigned char *tbs, size_t tbslen); 1902 const unsigned char *tbs, size_t tbslen); 2016 const unsigned char *tbs, size_t tbslen)); 2020 const unsigned char *tbs, size_t tbslen)); 2054 const unsigned char *tbs, size_t tbslen)); 2058 size_t siglen, const unsigned char *tbs, 2085 const unsigned char *tbs, size_t tbslen)); 2125 const unsigned char *tbs, size_t tbslen)); [all …]
|
H A D | core_dispatch.h | 711 const unsigned char *tbs, 718 const unsigned char *tbs, 735 size_t sigsize, const unsigned char *tbs, size_t tbslen)) 745 const unsigned char *tbs, size_t tbslen))
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 210 openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 214 openssl md5 -c tbs 215 MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5
|
/openssl/include/crypto/ |
H A D | evp.h | 147 const unsigned char *tbs, size_t tbslen); 151 const unsigned char *tbs, size_t tbslen); 173 const unsigned char *tbs, size_t tbslen); 175 size_t siglen, const unsigned char *tbs,
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 2428 unsigned char *tbs = OPENSSL_malloc(tbslen); in construct_key_exchange_tbs() local 2430 if (tbs == NULL) { in construct_key_exchange_tbs() 2434 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2435 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs() 2437 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs() 2439 *ptbs = tbs; in construct_key_exchange_tbs()
|