/openssl/crypto/pem/ |
H A D | pem_sign.c | 29 unsigned int *siglen, EVP_PKEY *pkey) in PEM_SignFinal() argument 43 *siglen = i; in PEM_SignFinal()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_verify_recover.pod | 20 const unsigned char *sig, size_t siglen); 44 I<siglen> parameters. If I<rout> is NULL then the maximum size of the output 86 size_t routlen, siglen; 90 * NB: assumes verify_key, sig and siglen are already set up 104 if (EVP_PKEY_verify_recover(ctx, NULL, &routlen, sig, siglen) <= 0) 112 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0)
|
H A D | RSA_sign.pod | 16 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 19 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 29 stores the signature in B<sigret> and the signature size in B<siglen>. 42 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
H A D | DSA_sign.pod | 16 unsigned char *sigret, unsigned int *siglen, DSA *dsa); 21 unsigned char *sigbuf, int siglen, DSA *dsa); 32 *B<siglen>. B<sigret> must point to DSA_size(B<dsa>) bytes of memory. 41 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
H A D | EVP_DigestSignInit.pod | 19 int EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen); 22 size_t *siglen, const unsigned char *tbs, 126 the I<siglen> parameter. If I<sig> is not NULL then before the call the 127 I<siglen> parameter should contain the length of the I<sig> buffer. If the 129 written to I<siglen>. 134 bytes and places the signature in a buffer I<sig> of size I<siglen>. 136 to the I<siglen> parameter.
|
H A D | EVP_VerifyInit.pod | 16 unsigned int siglen, EVP_PKEY *pkey, 18 int EVP_VerifyFinal(EVP_MD_CTX *ctx, unsigned char *sigbuf, unsigned int siglen, 37 I<pkey> and I<siglen> bytes in I<sigbuf>.
|
H A D | ECDSA_sign.pod | 21 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); 26 const unsigned char *sig, int siglen, EC_KEY *eckey); 35 unsigned char *sig, unsigned int *siglen, 65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 136 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument 208 *siglen = ret; in pkey_rsa_sign() 214 const unsigned char *sig, size_t siglen) in pkey_rsa_verifyrecover() argument 229 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, rsa, in pkey_rsa_verifyrecover() 248 sig, siglen, rsa); in pkey_rsa_verifyrecover() 256 ret = RSA_public_decrypt(siglen, sig, rout, rsa, rctx->pad_mode); in pkey_rsa_verifyrecover() 265 const unsigned char *sig, size_t siglen, in pkey_rsa_verify() argument 281 sig, siglen, rsa); in pkey_rsa_verify() 292 if (pkey_rsa_verifyrecover(ctx, NULL, &rslen, sig, siglen) <= 0) in pkey_rsa_verify() 298 ret = RSA_public_decrypt(siglen, sig, rctx->tbuf, in pkey_rsa_verify() [all …]
|
H A D | rsa_meth.c | 228 unsigned char *sigret, unsigned int *siglen, in RSA_meth_get_sign() 237 unsigned char *sigret, unsigned int *siglen, in RSA_meth_set_sign() argument 247 unsigned int siglen, const RSA *rsa) in RSA_meth_get_verify() 256 unsigned int siglen, const RSA *rsa)) in RSA_meth_set_verify() argument
|
H A D | rsa_local.h | 134 unsigned char *sigret, unsigned int *siglen, 138 unsigned int siglen, const RSA *rsa);
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument 103 *siglen = sltmp; in pkey_dsa_sign() 108 const unsigned char *sig, size_t siglen, in pkey_dsa_verify() argument 128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/openssl/include/crypto/ |
H A D | sm2.h | 54 unsigned char *sig, unsigned int *siglen, 61 const unsigned char *sig, int siglen,
|
H A D | evp.h | 156 int (*sign) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 160 const unsigned char *sig, size_t siglen, 165 const unsigned char *sig, size_t siglen); 167 int (*signctx) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 170 int (*verifyctx) (EVP_PKEY_CTX *ctx, const unsigned char *sig, int siglen, 182 int (*digestsign) (EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, 185 size_t siglen, const unsigned char *tbs,
|
H A D | dsa.h | 34 unsigned char *sig, unsigned int *siglen, DSA *dsa,
|
/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 104 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, in pkey_ec_sign() argument 123 *siglen = (size_t)sig_sz; in pkey_ec_sign() 127 if (*siglen < (size_t)sig_sz) { in pkey_ec_sign() 138 *siglen = (size_t)sltmp; in pkey_ec_sign() 143 const unsigned char *sig, size_t siglen, in pkey_ec_verify() argument 160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
H A D | ecdsa_ossl.c | 75 unsigned char *sig, unsigned int *siglen, in ossl_ecdsa_sign() argument 81 *siglen = ECDSA_size(eckey); in ossl_ecdsa_sign() 87 *siglen = 0; in ossl_ecdsa_sign() 90 *siglen = i2d_ECDSA_SIG(s, sig != NULL ? &sig : NULL); in ossl_ecdsa_sign() 96 unsigned char *sig, unsigned int *siglen, in ossl_ecdsa_deterministic_sign() argument 114 *siglen = 0; in ossl_ecdsa_deterministic_sign() 123 *siglen = i2d_ECDSA_SIG(s, &sig); in ossl_ecdsa_deterministic_sign()
|
/openssl/include/openssl/ |
H A D | rsa.h | 361 unsigned int *siglen, RSA *rsa); 365 unsigned int siglen, RSA *rsa); 374 unsigned char *sigret, unsigned int *siglen, 379 unsigned char *sigbuf, unsigned int siglen, 571 unsigned int *siglen, 577 unsigned char *sigret, unsigned int *siglen, 584 unsigned int siglen, 591 unsigned int siglen, const RSA *rsa));
|
H A D | evp.h | 820 size_t *siglen, const unsigned char *tbs, 824 unsigned int siglen, EVP_PKEY *pkey); 826 unsigned int siglen, EVP_PKEY *pkey, 830 size_t siglen, const unsigned char *tbs, 842 size_t *siglen); 853 size_t siglen); 1936 unsigned char *sig, size_t *siglen, 1949 const unsigned char *sig, size_t siglen, 2117 size_t siglen, const unsigned char *tbs, 2164 int siglen, EVP_MD_CTX *mctx)); [all …]
|
H A D | core_dispatch.h | 757 size_t *siglen, size_t sigsize, 766 size_t *siglen, size_t sigsize)) 771 size_t siglen, 787 size_t routsize, const unsigned char *sig, size_t siglen)) 794 (void *ctx, unsigned char *sig, size_t *siglen, 797 (void *ctx, unsigned char *sigret, size_t *siglen, 805 (void *ctx, const unsigned char *sig, size_t siglen)) 807 (void *ctx, const unsigned char *sig, size_t siglen,
|
/openssl/apps/ |
H A D | pkeyutl.c | 40 int filesize, unsigned char *sig, int siglen, 120 int buf_inlen = 0, siglen = -1; in pkeyutl_main() local 440 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main() 442 if (siglen < 0) { in pkeyutl_main() 480 rv = do_raw_keyop(pkey_op, mctx, pkey, in, filesize, sig, siglen, in pkeyutl_main() 483 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, in pkeyutl_main() 769 int filesize, unsigned char *sig, int siglen, in do_raw_keyop() argument 793 rv = EVP_DigestVerify(mctx, sig, (size_t)siglen, mbuf, buf_len); in do_raw_keyop() 827 rv = EVP_DigestVerifyFinal(mctx, sig, (size_t)siglen); in do_raw_keyop()
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 31 int OSSL_FUNC_signature_sign(void *ctx, unsigned char *sig, size_t *siglen, 72 unsigned char *sig, size_t *siglen, 84 size_t siglen); 249 The length of the signature should be written to I<*siglen>. 251 I<*siglen>. 281 The length of the signature should be written to I<*siglen>. 283 I<*siglen>. 378 the signature should be written to I<*siglen>. 387 length of the signature should be written to I<*siglen>. 412 verified is in I<sig> which is I<siglen> bytes long. [all …]
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 460 size_t siglen = sizeof(sig); in self_test_digest_sign() local 508 siglen = t->sig_expected_len; in self_test_digest_sign() 515 if (EVP_DigestSign(mctx, sig, &siglen, t->msg, t->msg_len) <= 0) in self_test_digest_sign() 519 || EVP_DigestSignFinal(mctx, sig, &siglen) <= 0) in self_test_digest_sign() 524 && (siglen != t->sig_expected_len in self_test_digest_sign() 535 if (EVP_DigestVerify(mctx, sig, siglen, t->msg, t->msg_len) <= 0) in self_test_digest_sign() 539 || EVP_DigestVerifyFinal(mctx, sig, siglen) <= 0) in self_test_digest_sign()
|
/openssl/test/ |
H A D | provider_pkey_test.c | 84 size_t siglen; in test_pkey_sig() local 103 if (!TEST_int_eq(EVP_PKEY_sign(ctx, NULL, &siglen, NULL, 0), 1) in test_pkey_sig() 104 || !TEST_size_t_eq(siglen, 256)) in test_pkey_sig()
|
H A D | dsatest.c | 69 unsigned int siglen; in dsa_test() local 114 if (!TEST_true(DSA_sign(0, str1, 20, sig, &siglen, dsa))) in dsa_test() 116 if (TEST_int_gt(DSA_verify(0, str1, 20, sig, siglen, dsa), 0)) in dsa_test()
|
/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 1701 unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_sign() argument 1713 size_t siglen, in EVP_PKEY_meth_set_verify() argument 1728 size_t *siglen, in EVP_PKEY_meth_set_verify_recover() argument 1742 size_t *siglen, in EVP_PKEY_meth_set_signctx() argument 1754 int siglen, in EVP_PKEY_meth_set_verifyctx() argument 1807 int (*digestsign) (EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, in EVP_PKEY_meth_set_digestsign() argument 1815 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument 1904 size_t siglen, in EVP_PKEY_meth_get_verify() argument 1937 size_t *siglen, in EVP_PKEY_meth_get_signctx() argument 1951 int siglen, in EVP_PKEY_meth_get_verifyctx() argument [all …]
|