/openssl/doc/man3/ |
H A D | EVP_DigestSignInit.pod | 6 EVP_DigestSignFinal, EVP_DigestSign - EVP signing functions 21 int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sig, 131 EVP_DigestSign() is similar to a single call to EVP_DigestSignUpdate() and 133 Unless I<sig> is NULL, EVP_DigestSign() signs the data I<tbs> of length I<tbslen> 141 EVP_DigestSign() return 1 for success and 0 for failure. 151 EVP_DigestSign() is a one shot operation which signs a single block of data 181 EVP_DigestSign() can not be called again, once a signature is generated (by 187 EVP_DigestSignUpdate(), EVP_DigestSignFinal(), or EVP_DigestSign().
|
H A D | EVP_SignInit.pod | 94 The previous two bugs are fixed in the newer EVP_DigestSign*() functions.
|
H A D | EVP_PKEY_meth_new.pod | 323 a B<EVP_MD_CTX> object. They are called by the EVP_DigestSign functions. See 368 a signature in a one-shot mode. They could be called by L<EVP_DigestSign(3)>
|
H A D | EVP_DigestInit.pod | 608 Some functions such as EVP_DigestSign only finalise copies of internal
|
/openssl/demos/signature/ |
H A D | EVP_ED_Signature_demo.c | 60 if (!EVP_DigestSign(sign_context, NULL, &sig_len, tbs, tbs_len)) { in demo_sign() 70 if (!EVP_DigestSign(sign_context, sig_value, &sig_len, tbs, tbs_len)) { in demo_sign()
|
/openssl/crypto/asn1/ |
H A D | a_sign.c | 263 if (!EVP_DigestSign(ctx, NULL, &outll, buf_in, inl)) { in ASN1_item_sign_ctx() 275 if (!EVP_DigestSign(ctx, buf_out, &outl, buf_in, inl)) { in ASN1_item_sign_ctx()
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 110 EVP_DigestSign() and EVP_DigestVerify() functions. 157 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 160 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
H A D | evp.pod | 19 The L<B<EVP_DigestSign>I<XXX>|EVP_DigestSignInit(3)> and
|
H A D | ossl-guide-migration.pod | 215 L<EVP_DigestSign(3)> and L<EVP_DigestVerify(3)>. 1117 L<EVP_DigestSign(3)> and L<EVP_DigestVerify(3)>.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa_sigalg.txt | 132 # That command uses the EVP_DigestSign API.
|
/openssl/apps/ |
H A D | pkeyutl.c | 835 rv = EVP_DigestSign(mctx, NULL, poutlen, mbuf, buf_len); in do_raw_keyop() 838 rv = EVP_DigestSign(mctx, *out, poutlen, mbuf, buf_len); in do_raw_keyop()
|
H A D | speed.c | 1302 ret = EVP_DigestSign(edctx[testnum], eddsasig, eddsasigsize, buf, 20); in EdDSA_sign_loop() 1364 ret = EVP_DigestSign(sm2ctx[testnum], sm2sig, &sm2sigsize, in SM2_sign_loop() 3673 st = EVP_DigestSign(loopargs[i].eddsa_ctx[testnum], in speed_main() 3804 st = EVP_DigestSign(loopargs[i].sm2_ctx[testnum], in speed_main()
|
/openssl/test/ |
H A D | rsa_test.c | 502 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen))); in test_EVP_rsa_legacy_key()
|
H A D | ecdsatest.c | 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin()
|
H A D | evp_extra_test.c | 1791 if (!TEST_true(EVP_DigestSign(md_ctx, NULL, &sig_len, kMsg, in test_EVP_DigestSignInit() 1797 if (!TEST_false(EVP_DigestSign(md_ctx, sig, &shortsig_len, kMsg, in test_EVP_DigestSignInit() 1807 if (!TEST_true(EVP_DigestSign(md_ctx, sig, &sig_len, kMsg, in test_EVP_DigestSignInit() 5110 if (!TEST_true(EVP_DigestSign(ctx, res, &reslen, msg, sizeof(msg)))) in test_custom_pmeth() 5561 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) in test_ecx_not_private_key() 5567 if (!TEST_int_eq(EVP_DigestSign(ctx, mac, &maclen, msg, sizeof(msg)), 0)) in test_ecx_not_private_key()
|
H A D | acvp_test.c | 111 || !TEST_int_gt(EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len), 0)) in sig_gen()
|
H A D | evp_test.c | 4486 if (!EVP_DigestSign(expected->ctx, NULL, &got_len, in oneshot_digestsign_test_run() 4496 if (!EVP_DigestSign(expected->ctx, got, &got_len, in oneshot_digestsign_test_run()
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 573 int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, in EVP_DigestSign() function
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 776 || EVP_DigestSign(hctx, hmac, &hmaclen, data, in tls_parse_ctos_cookie() 1873 || EVP_DigestSign(hctx, hmac, &hmaclen, cookie, in tls_construct_stoc_cookie()
|
H A D | statem_lib.c | 392 if (EVP_DigestSign(mctx, NULL, &siglen, hdata, hdatalen) <= 0) { in tls_construct_cert_verify() 398 || EVP_DigestSign(mctx, sig, &siglen, hdata, hdatalen) <= 0) { in tls_construct_cert_verify()
|
H A D | statem_srvr.c | 2801 if (EVP_DigestSign(md_ctx, NULL, &siglen, tbs, tbslen) <=0 in tls_construct_server_key_exchange() 2803 || EVP_DigestSign(md_ctx, sigbytes1, &siglen, tbs, tbslen) <= 0 in tls_construct_server_key_exchange()
|
/openssl/include/openssl/ |
H A D | evp.h | 840 __owur int EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret,
|
/openssl/util/ |
H A D | libcrypto.num | 4144 EVP_DigestSign 4236 3_0_0 EXIST::FUNCTION:
|
/openssl/ |
H A D | CHANGES.md | 2786 * Corrected the documentation of the return values from the `EVP_DigestSign*` 3373 functionality such as `EVP_DigestSign*` and `EVP_DigestVerify*`. 10639 allows HMAC to be handled via the `EVP_DigestSign*()` interface. The
|