Home
last modified time | relevance | path

Searched refs:tbs (Results 1 – 25 of 34) sorted by relevance

12

/openssl/test/
H A Decdsatest.c226 || !TEST_int_gt(RAND_bytes(tbs, sizeof(tbs)), 0) in test_builtin()
251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin()
257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
272 tbs[0] ^= 1; in test_builtin()
275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin()
279 tbs[0] ^= 1; in test_builtin()
282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
313 dirt = tbs[1] ? tbs[1] : 1; in test_builtin()
317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
[all …]
H A Dfake_rsaprov.c334 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
479 size_t sigsize, const unsigned char *tbs, in fake_rsa_dgstsgn() argument
482 if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) in fake_rsa_dgstsgn()
H A Devp_extra_test.c1506 unsigned char tbs[] = { in test_EVP_PKEY_sign() local
1536 sizeof(tbs)), 0)) in test_EVP_PKEY_sign()
1542 sizeof(tbs)), 0) in test_EVP_PKEY_sign()
1543 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign()
1547 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign()
1573 unsigned char tbs[] = { in test_EVP_PKEY_sign_with_app_method() local
1611 sizeof(tbs)), 0)) in test_EVP_PKEY_sign_with_app_method()
1617 sizeof(tbs)), 0) in test_EVP_PKEY_sign_with_app_method()
1618 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign_with_app_method()
1622 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign_with_app_method()
[all …]
/openssl/providers/implementations/signature/
H A Deddsa_sig.c427 tbs, tbslen, md, &mdlen) in ed25519_sign()
432 tbs = md; in ed25519_sign()
489 const unsigned char *tbs, size_t tbslen) in ed448_sign() argument
534 tbs = md; in ed448_sign()
547 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, in ed448_sign()
592 tbs, tbslen, md, &mdlen) in ed25519_verify()
597 tbs = md; in ed25519_verify()
610 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_verify()
649 tbs = md; in ed448_verify()
1118 const unsigned char *tbs, in s390x_ed448_digestverify() argument
[all …]
H A Decdsa_sig.c314 const unsigned char *tbs, size_t tbslen) in ecdsa_sign_directly() argument
345 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp, in ecdsa_sign_directly()
350 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, in ecdsa_sign_directly()
398 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument
410 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_sign()
414 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); in ecdsa_sign()
430 const unsigned char *tbs, size_t tbslen) in ecdsa_verify_directly() argument
437 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify_directly()
479 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
486 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_verify()
[all …]
H A Ddsa_sig.c327 const unsigned char *tbs, size_t tbslen) in dsa_sign_directly() argument
354 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, in dsa_sign_directly()
408 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
420 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_sign()
424 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign()
436 const unsigned char *tbs, size_t tbslen) in dsa_verify_directly() argument
444 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify_directly()
489 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
496 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_verify()
500 return dsa_verify_directly(pdsactx, sig, siglen, tbs, tbslen); in dsa_verify()
H A Drsa_sig.c678 const unsigned char *tbs, size_t tbslen) in rsa_sign_directly() argument
736 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign_directly()
814 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign_directly()
908 return rsa_signverify_message_update(prsactx, tbs, tbslen) in rsa_sign()
1030 const unsigned char *tbs, size_t tbslen) in rsa_verify_directly() argument
1039 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, in rsa_verify_directly()
1079 ret = ossl_rsa_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs, in rsa_verify_directly()
1112 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify_directly()
1167 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument
1180 && rsa_signverify_message_update(prsactx, tbs, tbslen) in rsa_verify()
[all …]
H A Dsm2_sig.c163 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
182 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
191 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
198 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
/openssl/demos/signature/
H A DEVP_ED_Signature_demo.c29 const unsigned char *tbs, size_t tbs_len, in demo_sign() argument
60 if (!EVP_DigestSign(sign_context, NULL, &sig_len, tbs, tbs_len)) { in demo_sign()
70 if (!EVP_DigestSign(sign_context, sig_value, &sig_len, tbs, tbs_len)) { in demo_sign()
88 const unsigned char *tbs, size_t tbs_len, in demo_verify() argument
115 tbs, tbs_len)) { in demo_verify()
/openssl/crypto/ec/
H A Decx_meth.c824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, in pkey_ecd_digestsign25519()
834 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument
853 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448()
874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
1189 const unsigned char *tbs, in s390x_pkey_ecd_digestsign25519() argument
1234 const unsigned char *tbs, in s390x_pkey_ecd_digestsign448() argument
1265 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen); in s390x_pkey_ecd_digestsign448()
1282 const unsigned char *tbs, in s390x_pkey_ecd_digestverify25519() argument
1308 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519()
1314 const unsigned char *tbs, in s390x_pkey_ecd_digestverify448() argument
[all …]
H A Dec_pmeth.c105 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
134 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
144 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/openssl/crypto/rsa/
H A Drsa_pmeth.c136 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument
165 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
179 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
186 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
194 rctx->tbuf, tbs, in pkey_rsa_sign()
204 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
266 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
280 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify()
302 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, in pkey_rsa_verify()
320 if ((rslen != tbslen) || memcmp(tbs, rctx->tbuf, rslen)) in pkey_rsa_verify()
/openssl/doc/man3/
H A DEVP_PKEY_meth_new.pod64 const unsigned char *tbs,
71 const unsigned char *tbs,
82 char *tbs,
127 const unsigned char *tbs,
164 const unsigned char *tbs,
171 const unsigned char *tbs,
182 char *tbs,
294 const unsigned char *tbs, size_t tbslen);
303 const unsigned char *tbs, size_t tbslen);
362 const unsigned char *tbs, size_t tbslen);
[all …]
H A DEVP_DigestVerifyInit.pod22 size_t siglen, const unsigned char *tbs, size_t tbslen);
118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
128 did not verify successfully (that is, B<tbs> did not match the original data or
H A DEVP_PKEY_verify.pod27 const unsigned char *tbs, size_t tbslen);
76 followed by a single EVP_PKEY_verify_update() call with I<tbs> and I<tbslen>,
144 that the signature did not verify successfully (that is tbs did not match the
/openssl/crypto/dsa/
H A Ddsa_pmeth.c78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument
99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
109 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/openssl/crypto/evp/
H A Dm_sigver.c613 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
632 tbs, tbslen); in EVP_DigestSign()
642 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen);
645 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0)
737 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
754 tbs, tbslen); in EVP_DigestVerify()
764 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen);
766 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0)
H A Dsignature.c885 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
909 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
920 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
1011 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
1035 tbs, tbslen); in EVP_PKEY_verify()
1044 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
H A Dpmeth_lib.c1702 const unsigned char *tbs, in EVP_PKEY_meth_set_sign() argument
1714 const unsigned char *tbs, in EVP_PKEY_meth_set_verify() argument
1730 char *tbs, in EVP_PKEY_meth_set_verify_recover() argument
1808 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument
1815 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument
1891 const unsigned char *tbs, in EVP_PKEY_meth_get_sign() argument
1905 const unsigned char *tbs, in EVP_PKEY_meth_get_verify() argument
1923 char *tbs, in EVP_PKEY_meth_get_verify_recover() argument
2015 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument
2023 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_get_digestverify() argument
/openssl/include/crypto/
H A Decx.h99 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *tbs, size_t tbs_len,
105 ossl_ed25519_verify(const uint8_t *tbs, size_t tbs_len,
H A Devp.h157 const unsigned char *tbs, size_t tbslen);
161 const unsigned char *tbs, size_t tbslen);
183 const unsigned char *tbs, size_t tbslen);
185 size_t siglen, const unsigned char *tbs,
/openssl/include/openssl/
H A Devp.h820 size_t *siglen, const unsigned char *tbs,
830 size_t siglen, const unsigned char *tbs,
1937 const unsigned char *tbs, size_t tbslen);
1950 const unsigned char *tbs, size_t tbslen);
2075 const unsigned char *tbs, size_t tbslen));
2079 const unsigned char *tbs, size_t tbslen));
2113 const unsigned char *tbs, size_t tbslen));
2117 size_t siglen, const unsigned char *tbs,
2144 const unsigned char *tbs, size_t tbslen));
2184 const unsigned char *tbs, size_t tbslen));
[all …]
H A Dcore_dispatch.h758 const unsigned char *tbs,
772 const unsigned char *tbs,
798 size_t sigsize, const unsigned char *tbs, size_t tbslen))
808 const unsigned char *tbs, size_t tbslen))
/openssl/doc/man7/
H A Dprovider-signature.pod32 size_t sigsize, const unsigned char *tbs, size_t tbslen);
44 const unsigned char *tbs, size_t tbslen);
73 size_t sigsize, const unsigned char *tbs,
86 size_t siglen, const unsigned char *tbs,
245 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen>
275 case, I<tbs> is expected to be the whole message to be signed, I<tbslen> bytes
298 The data that the signature covers is pointed to be the I<tbs> parameter which
328 that case, I<tbs> is expected to be the whole message to be verified on,
383 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL,
417 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
/openssl/doc/man1/
H A Dopenssl-rsautl.pod.in217 openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4
221 openssl md5 -c tbs
222 MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5

Completed in 110 milliseconds

12