/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 328 unsigned char *sig, size_t *siglen, size_t sigsize, in dsa_sign_directly() argument 350 if (sigsize < dsasize) in dsa_sign_directly() 379 size_t *siglen, size_t sigsize) in dsa_sign_message_final() argument 402 return dsa_sign_directly(vpdsactx, sig, siglen, sigsize, digest, dlen); in dsa_sign_message_final() 410 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 420 return dsa_sign_message_final(pdsactx, sig, siglen, sigsize); in dsa_sign() 424 return dsa_sign_message_final(pdsactx, sig, siglen, sigsize); in dsa_sign() 426 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign() 568 size_t *siglen, size_t sigsize) in dsa_digest_sign_final() argument 579 ok = dsa_sign_message_final(pdsactx, sig, siglen, sigsize); in dsa_digest_sign_final()
|
H A D | ecdsa_sig.c | 316 unsigned char *sig, size_t *siglen, size_t sigsize, in ecdsa_sign_directly() argument 337 if (sigsize < (size_t)ecsize) in ecdsa_sign_directly() 376 size_t *siglen, size_t sigsize) in ecdsa_sign_message_final() argument 393 return ecdsa_sign_directly(vctx, sig, siglen, sigsize, digest, dlen); in ecdsa_sign_message_final() 401 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 411 return ecdsa_sign_message_final(ctx, sig, siglen, sigsize); in ecdsa_sign() 415 return ecdsa_sign_message_final(ctx, sig, siglen, sigsize); in ecdsa_sign() 417 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); in ecdsa_sign() 560 size_t sigsize) in ecdsa_digest_sign_final() argument 571 ok = ecdsa_sign_message_final(ctx, sig, siglen, sigsize); in ecdsa_digest_sign_final()
|
H A D | eddsa_sig.c | 382 unsigned char *sigret, size_t *siglen, size_t sigsize, in ed25519_sign() argument 397 if (sigsize < ED25519_SIGSIZE) { in ed25519_sign() 490 unsigned char *sigret, size_t *siglen, size_t sigsize, in ed448_sign() argument 505 if (sigsize < ED448_SIGSIZE) { in ed448_sign() 692 unsigned char *sigret, size_t *siglen, size_t sigsize, in ed25519_digest_sign() argument 695 return ed25519_sign(vpeddsactx, sigret, siglen, sigsize, tbs, tbslen); in ed25519_digest_sign() 726 unsigned char *sigret, size_t *siglen, size_t sigsize, in ed448_digest_sign() argument 729 return ed448_sign(vpeddsactx, sigret, siglen, sigsize, tbs, tbslen); in ed448_digest_sign()
|
H A D | sm2_sig.c | 162 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 175 if (sigsize < (size_t)ecsize) in sm2sig_sign() 292 size_t sigsize) in sm2sig_digest_sign_final() argument 311 return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen); in sm2sig_digest_sign_final()
|
H A D | rsa_sig.c | 677 unsigned char *sig, size_t *siglen, size_t sigsize, in rsa_sign_directly() argument 692 if (sigsize < rsasize) { in rsa_sign_directly() 694 "is %zu, should be at least %zu", sigsize, rsasize); in rsa_sign_directly() 849 size_t *siglen, size_t sigsize) in rsa_sign_message_final() argument 881 return rsa_sign_directly(prsactx, sig, siglen, sigsize, digest, dlen); in rsa_sign_message_final() 889 size_t sigsize, const unsigned char *tbs, size_t tbslen) in rsa_sign() argument 906 return rsa_sign_message_final(prsactx, sig, siglen, sigsize); in rsa_sign() 909 && rsa_sign_message_final(prsactx, sig, siglen, sigsize); in rsa_sign() 911 return rsa_sign_directly(prsactx, sig, siglen, sigsize, tbs, tbslen); in rsa_sign() 1252 size_t *siglen, size_t sigsize) in rsa_digest_sign_final() argument [all …]
|
/openssl/test/ |
H A D | fake_rsaprov.c | 333 size_t *siglen, size_t sigsize, in fake_rsa_sig_sign() argument 345 if (!TEST_int_ge(sigsize, *siglen)) in fake_rsa_sig_sign() 436 size_t *siglen, size_t sigsize) in fake_rsa_dgstsgnvfy_final() argument 458 if (!TEST_int_ge(sigsize, *siglen)) in fake_rsa_dgstsgnvfy_final() 479 size_t sigsize, const unsigned char *tbs, in fake_rsa_dgstsgn() argument 485 return fake_rsa_dgstsgnvfy_final(ctx, sig, siglen, sigsize); in fake_rsa_dgstsgn()
|
H A D | tls-provider.c | 2738 size_t sigsize, const unsigned char *tbs, size_t tbslen) in xor_sig_sign() argument 2878 size_t sigsize) in xor_sig_digest_sign_final() argument 2894 return xor_sig_sign(vpxor_sigctx, sig, siglen, sigsize, digest, (size_t)dlen); in xor_sig_digest_sign_final()
|
/openssl/apps/ |
H A D | speed.c | 536 size_t sigsize; member 1078 size_t *rsa_num = &tempargs->sigsize; in RSA_sign_loop() 1100 size_t rsa_num = tempargs->sigsize; in RSA_verify_loop() 1185 size_t *dsa_num = &tempargs->sigsize; in DSA_sign_loop() 1207 size_t dsa_num = tempargs->sigsize; in DSA_verify_loop() 1229 size_t *ecdsa_num = &tempargs->sigsize; in ECDSA_sign_loop() 1251 size_t ecdsa_num = tempargs->sigsize; in ECDSA_verify_loop() 1319 size_t eddsasigsize = tempargs->sigsize; in EdDSA_verify_loop() 1373 tempargs->sigsize = sm2sigsize; in SM2_sign_loop() 1385 size_t sm2sigsize = tempargs->sigsize; in SM2_verify_loop() [all …]
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 32 size_t sigsize, const unsigned char *tbs, size_t tbslen); 38 size_t *siglen, size_t sigsize); 70 size_t *siglen, size_t sigsize); 73 size_t sigsize, const unsigned char *tbs, 248 to by the I<sig> parameter and it should not exceed I<sigsize> bytes in length. 280 to by I<sig>, and it should not exceed I<sigsize> bytes in length. 376 and it should not exceed I<sigsize> bytes in length. The length of the signature 385 parameter and it should not exceed I<sigsize> bytes in length. The length of the
|
/openssl/include/openssl/ |
H A D | core_dispatch.h | 759 size_t *siglen, size_t sigsize, 768 size_t *siglen, size_t sigsize)) 797 size_t sigsize)) 800 size_t sigsize, const unsigned char *tbs, size_t tbslen))
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_sign.pod | 22 size_t *siglen, size_t sigsize); 66 bytes doesn't surpass the size given by I<sigsize>.
|