Home
last modified time | relevance | path

Searched refs:tbs (Results 1 – 25 of 30) sorted by relevance

12

/openssl/test/
H A Decdsatest.c226 || !TEST_int_gt(RAND_bytes(tbs, sizeof(tbs)), 0) in test_builtin()
251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin()
257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
272 tbs[0] ^= 1; in test_builtin()
275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
279 tbs[0] ^= 1; in test_builtin()
282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
313 dirt = tbs[1] ? tbs[1] : 1; in test_builtin()
317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
[all …]
H A Devp_extra_test.c1106 unsigned char tbs[] = { in test_EVP_PKEY_sign() local
1135 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, in test_EVP_PKEY_sign()
1136 sizeof(tbs)), 0)) in test_EVP_PKEY_sign()
1141 || !TEST_int_le(EVP_PKEY_sign(ctx, sig, &shortsig_len, tbs, in test_EVP_PKEY_sign()
1142 sizeof(tbs)), 0) in test_EVP_PKEY_sign()
1143 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign()
1147 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign()
4004 const unsigned char *tbs, size_t tbslen); in custom_pmeth_sign()
4011 size_t *siglen, const unsigned char *tbs, in custom_pmeth_digestsign() argument
4015 const unsigned char *tbs, size_t tbslen); in custom_pmeth_digestsign()
[all …]
H A Dfake_rsaprov.c211 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
/openssl/providers/implementations/signature/
H A Deddsa_sig.c150 const unsigned char *tbs, size_t tbslen) in ed25519_digest_sign() argument
168 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_digest_sign()
187 const unsigned char *tbs, size_t tbslen) in ed448_digest_sign() argument
223 size_t siglen, const unsigned char *tbs, in ed25519_digest_verify() argument
234 return s390x_ed25519_digestverify(edkey, sig, tbs, tbslen); in ed25519_digest_verify()
237 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_digest_verify()
242 size_t siglen, const unsigned char *tbs, in ed448_digest_verify() argument
253 return s390x_ed448_digestverify(edkey, sig, tbs, tbslen); in ed448_digest_verify()
431 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_ed25519_digestverify()
436 const unsigned char *tbs, in s390x_ed448_digestverify() argument
[all …]
H A Drsa_sig.c515 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument
551 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign()
574 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign()
585 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign()
627 prsactx->tbuf, tbs, in rsa_sign()
644 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign()
762 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument
772 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, in rsa_verify()
810 ret = RSA_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs, in rsa_verify()
836 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify()
H A Dsm2_sig.c158 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
177 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
186 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
193 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
H A Ddsa_sig.c231 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
253 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa); in dsa_sign()
262 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
270 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify()
H A Decdsa_sig.c170 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument
196 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, ctx->ec); in ecdsa_sign()
205 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
212 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify()
/openssl/crypto/ec/
H A Decx_meth.c834 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument
853 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448()
874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
1191 const unsigned char *tbs, in s390x_pkey_ecd_digestsign25519() argument
1222 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519()
1236 const unsigned char *tbs, in s390x_pkey_ecd_digestsign448() argument
1267 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen); in s390x_pkey_ecd_digestsign448()
1284 const unsigned char *tbs, in s390x_pkey_ecd_digestverify25519() argument
1310 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519()
1316 const unsigned char *tbs, in s390x_pkey_ecd_digestverify448() argument
[all …]
H A Dec_pmeth.c107 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
136 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
146 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
162 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/openssl/crypto/rsa/
H A Drsa_pmeth.c134 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument
156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
170 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
185 rctx->tbuf, tbs, in pkey_rsa_sign()
195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
257 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
270 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify()
287 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, in pkey_rsa_verify()
305 if ((rslen != tbslen) || memcmp(tbs, rctx->tbuf, rslen)) in pkey_rsa_verify()
/openssl/crypto/dsa/
H A Ddsa_pmeth.c78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
104 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/openssl/doc/man3/
H A DEVP_PKEY_meth_new.pod64 const unsigned char *tbs,
71 const unsigned char *tbs,
82 char *tbs,
127 const unsigned char *tbs,
164 const unsigned char *tbs,
171 const unsigned char *tbs,
182 char *tbs,
294 const unsigned char *tbs, size_t tbslen);
303 const unsigned char *tbs, size_t tbslen);
362 const unsigned char *tbs, size_t tbslen);
[all …]
H A DEVP_PKEY_verify.pod16 const unsigned char *tbs, size_t tbslen);
32 signed) is specified using the I<tbs> and I<tbslen> parameters.
48 successfully (that is tbs did not match the original data or the signature was
H A DEVP_PKEY_sign.pod16 const unsigned char *tbs, size_t tbslen);
30 using I<ctx>. The data to be signed is specified using the I<tbs> and
H A DEVP_DigestVerifyInit.pod22 size_t siglen, const unsigned char *tbs, size_t tbslen);
118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
128 did not verify successfully (that is, B<tbs> did not match the original data or
/openssl/crypto/evp/
H A Dm_sigver.c561 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
573 tbs, tbslen); in EVP_DigestSign()
577 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
580 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
654 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
665 tbs, tbslen); in EVP_DigestVerify()
669 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
672 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
H A Dsignature.c632 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
650 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
676 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
694 tbs, tbslen); in EVP_PKEY_verify()
703 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
H A Dpmeth_lib.c1699 const unsigned char *tbs, in EVP_PKEY_meth_set_sign() argument
1711 const unsigned char *tbs, in EVP_PKEY_meth_set_verify() argument
1727 char *tbs, in EVP_PKEY_meth_set_verify_recover() argument
1805 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument
1812 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument
1888 const unsigned char *tbs, in EVP_PKEY_meth_get_sign() argument
1902 const unsigned char *tbs, in EVP_PKEY_meth_get_verify() argument
1920 char *tbs, in EVP_PKEY_meth_get_verify_recover() argument
2012 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument
2020 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_get_digestverify() argument
/openssl/doc/man7/
H A Dprovider-signature.pod29 size_t sigsize, const unsigned char *tbs, size_t tbslen);
35 const unsigned char *tbs, size_t tbslen);
54 size_t sigsize, const unsigned char *tbs,
67 size_t siglen, const unsigned char *tbs,
211 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen>
232 The data that the signature covers is pointed to be the I<tbs> parameter which
289 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL,
323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
/openssl/include/openssl/
H A Devp.h810 size_t *siglen, const unsigned char *tbs,
820 size_t siglen, const unsigned char *tbs,
1897 const unsigned char *tbs, size_t tbslen);
1902 const unsigned char *tbs, size_t tbslen);
2016 const unsigned char *tbs, size_t tbslen));
2020 const unsigned char *tbs, size_t tbslen));
2054 const unsigned char *tbs, size_t tbslen));
2058 size_t siglen, const unsigned char *tbs,
2085 const unsigned char *tbs, size_t tbslen));
2125 const unsigned char *tbs, size_t tbslen));
[all …]
H A Dcore_dispatch.h711 const unsigned char *tbs,
718 const unsigned char *tbs,
735 size_t sigsize, const unsigned char *tbs, size_t tbslen))
745 const unsigned char *tbs, size_t tbslen))
/openssl/doc/man1/
H A Dopenssl-rsautl.pod.in210 openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4
214 openssl md5 -c tbs
215 MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5
/openssl/include/crypto/
H A Devp.h147 const unsigned char *tbs, size_t tbslen);
151 const unsigned char *tbs, size_t tbslen);
173 const unsigned char *tbs, size_t tbslen);
175 size_t siglen, const unsigned char *tbs,
/openssl/ssl/statem/
H A Dstatem_lib.c2428 unsigned char *tbs = OPENSSL_malloc(tbslen); in construct_key_exchange_tbs() local
2430 if (tbs == NULL) { in construct_key_exchange_tbs()
2434 memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2435 memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); in construct_key_exchange_tbs()
2437 memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); in construct_key_exchange_tbs()
2439 *ptbs = tbs; in construct_key_exchange_tbs()

Completed in 148 milliseconds

12