/openssl/test/ |
H A D | ecdsatest.c | 226 || !TEST_int_gt(RAND_bytes(tbs, sizeof(tbs)), 0) in test_builtin() 251 || !TEST_true(EVP_DigestSign(mctx, sig, &sig_len, tbs, sizeof(tbs))) in test_builtin() 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 272 tbs[0] ^= 1; in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 279 tbs[0] ^= 1; in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 313 dirt = tbs[1] ? tbs[1] : 1; in test_builtin() 317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() [all …]
|
H A D | fake_rsaprov.c | 334 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument 479 size_t sigsize, const unsigned char *tbs, in fake_rsa_dgstsgn() argument 482 if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) in fake_rsa_dgstsgn()
|
H A D | evp_extra_test.c | 1506 unsigned char tbs[] = { in test_EVP_PKEY_sign() local 1536 sizeof(tbs)), 0)) in test_EVP_PKEY_sign() 1542 sizeof(tbs)), 0) in test_EVP_PKEY_sign() 1543 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 1547 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign() 1573 unsigned char tbs[] = { in test_EVP_PKEY_sign_with_app_method() local 1611 sizeof(tbs)), 0)) in test_EVP_PKEY_sign_with_app_method() 1617 sizeof(tbs)), 0) in test_EVP_PKEY_sign_with_app_method() 1618 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign_with_app_method() 1622 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), in test_EVP_PKEY_sign_with_app_method() [all …]
|
/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 429 tbs, tbslen, md, &mdlen) in ed25519_sign() 434 tbs = md; in ed25519_sign() 491 const unsigned char *tbs, size_t tbslen) in ed448_sign() argument 536 tbs = md; in ed448_sign() 549 if (ossl_ed448_sign(peddsactx->libctx, sigret, tbs, tbslen, in ed448_sign() 594 tbs, tbslen, md, &mdlen) in ed25519_verify() 599 tbs = md; in ed25519_verify() 612 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in ed25519_verify() 651 tbs = md; in ed448_verify() 1122 const unsigned char *tbs, in s390x_ed448_digestverify() argument [all …]
|
H A D | ecdsa_sig.c | 317 const unsigned char *tbs, size_t tbslen) in ecdsa_sign_directly() argument 348 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp, in ecdsa_sign_directly() 353 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, in ecdsa_sign_directly() 401 size_t sigsize, const unsigned char *tbs, size_t tbslen) in ecdsa_sign() argument 413 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_sign() 417 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); in ecdsa_sign() 433 const unsigned char *tbs, size_t tbslen) in ecdsa_verify_directly() argument 440 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify_directly() 482 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument 489 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_verify() [all …]
|
H A D | dsa_sig.c | 329 const unsigned char *tbs, size_t tbslen) in dsa_sign_directly() argument 356 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, in dsa_sign_directly() 410 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 422 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_sign() 426 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign() 438 const unsigned char *tbs, size_t tbslen) in dsa_verify_directly() argument 446 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify_directly() 491 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument 498 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_verify() 502 return dsa_verify_directly(pdsactx, sig, siglen, tbs, tbslen); in dsa_verify()
|
H A D | rsa_sig.c | 678 const unsigned char *tbs, size_t tbslen) in rsa_sign_directly() argument 736 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign_directly() 814 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign_directly() 908 return rsa_signverify_message_update(prsactx, tbs, tbslen) in rsa_sign() 1030 const unsigned char *tbs, size_t tbslen) in rsa_verify_directly() argument 1039 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, in rsa_verify_directly() 1079 ret = ossl_rsa_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs, in rsa_verify_directly() 1112 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify_directly() 1167 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument 1180 && rsa_signverify_message_update(prsactx, tbs, tbslen) in rsa_verify() [all …]
|
H A D | sm2_sig.c | 162 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 190 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
/openssl/demos/signature/ |
H A D | EVP_ED_Signature_demo.c | 29 const unsigned char *tbs, size_t tbs_len, in demo_sign() argument 60 if (!EVP_DigestSign(sign_context, NULL, &sig_len, tbs, tbs_len)) { in demo_sign() 70 if (!EVP_DigestSign(sign_context, sig_value, &sig_len, tbs, tbs_len)) { in demo_sign() 88 const unsigned char *tbs, size_t tbs_len, in demo_verify() argument 115 tbs, tbs_len)) { in demo_verify()
|
/openssl/crypto/ec/ |
H A D | ecx_meth.c | 824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, in pkey_ecd_digestsign25519() 834 size_t *siglen, const unsigned char *tbs, in pkey_ecd_digestsign448() argument 853 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 1189 const unsigned char *tbs, in s390x_pkey_ecd_digestsign25519() argument 1234 const unsigned char *tbs, in s390x_pkey_ecd_digestsign448() argument 1265 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); in s390x_pkey_ecd_digestsign448() 1282 const unsigned char *tbs, in s390x_pkey_ecd_digestverify25519() argument 1308 ¶m.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519() 1314 const unsigned char *tbs, in s390x_pkey_ecd_digestverify448() argument [all …]
|
H A D | ec_pmeth.c | 105 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 134 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 144 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 136 size_t *siglen, const unsigned char *tbs, in pkey_rsa_sign() argument 165 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 179 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 186 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 194 rctx->tbuf, tbs, in pkey_rsa_sign() 204 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 266 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument 280 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify() 302 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, in pkey_rsa_verify() 320 if ((rslen != tbslen) || memcmp(tbs, rctx->tbuf, rslen)) in pkey_rsa_verify()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_meth_new.pod | 64 const unsigned char *tbs, 71 const unsigned char *tbs, 82 char *tbs, 127 const unsigned char *tbs, 164 const unsigned char *tbs, 171 const unsigned char *tbs, 182 char *tbs, 294 const unsigned char *tbs, size_t tbslen); 303 const unsigned char *tbs, size_t tbslen); 362 const unsigned char *tbs, size_t tbslen); [all …]
|
H A D | EVP_DigestVerifyInit.pod | 22 size_t siglen, const unsigned char *tbs, size_t tbslen); 118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature 128 did not verify successfully (that is, B<tbs> did not match the original data or
|
H A D | EVP_PKEY_verify.pod | 27 const unsigned char *tbs, size_t tbslen); 76 followed by a single EVP_PKEY_verify_update() call with I<tbs> and I<tbslen>, 144 that the signature did not verify successfully (that is tbs did not match the
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 78 size_t *siglen, const unsigned char *tbs, in pkey_dsa_sign() argument 99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 109 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 574 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 593 tbs, tbslen); in EVP_DigestSign() 598 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 601 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 683 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 700 tbs, tbslen); in EVP_DigestVerify() 705 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 707 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
H A D | signature.c | 885 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 909 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 920 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 1011 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 1035 tbs, tbslen); in EVP_PKEY_verify() 1044 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
H A D | pmeth_lib.c | 1702 const unsigned char *tbs, in EVP_PKEY_meth_set_sign() argument 1714 const unsigned char *tbs, in EVP_PKEY_meth_set_verify() argument 1730 char *tbs, in EVP_PKEY_meth_set_verify_recover() argument 1808 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument 1815 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_set_digestverify() argument 1891 const unsigned char *tbs, in EVP_PKEY_meth_get_sign() argument 1905 const unsigned char *tbs, in EVP_PKEY_meth_get_verify() argument 1923 char *tbs, in EVP_PKEY_meth_get_verify_recover() argument 2015 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument 2023 size_t siglen, const unsigned char *tbs, in EVP_PKEY_meth_get_digestverify() argument
|
/openssl/include/crypto/ |
H A D | ecx.h | 99 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *tbs, size_t tbs_len, 105 ossl_ed25519_verify(const uint8_t *tbs, size_t tbs_len,
|
H A D | evp.h | 157 const unsigned char *tbs, size_t tbslen); 161 const unsigned char *tbs, size_t tbslen); 183 const unsigned char *tbs, size_t tbslen); 185 size_t siglen, const unsigned char *tbs,
|
/openssl/include/openssl/ |
H A D | evp.h | 820 size_t *siglen, const unsigned char *tbs, 830 size_t siglen, const unsigned char *tbs, 1937 const unsigned char *tbs, size_t tbslen); 1950 const unsigned char *tbs, size_t tbslen); 2075 const unsigned char *tbs, size_t tbslen)); 2079 const unsigned char *tbs, size_t tbslen)); 2113 const unsigned char *tbs, size_t tbslen)); 2117 size_t siglen, const unsigned char *tbs, 2144 const unsigned char *tbs, size_t tbslen)); 2184 const unsigned char *tbs, size_t tbslen)); [all …]
|
H A D | core_dispatch.h | 760 const unsigned char *tbs, 774 const unsigned char *tbs, 800 size_t sigsize, const unsigned char *tbs, size_t tbslen)) 810 const unsigned char *tbs, size_t tbslen))
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 32 size_t sigsize, const unsigned char *tbs, size_t tbslen); 44 const unsigned char *tbs, size_t tbslen); 73 size_t sigsize, const unsigned char *tbs, 86 size_t siglen, const unsigned char *tbs, 245 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen> 275 case, I<tbs> is expected to be the whole message to be signed, I<tbslen> bytes 298 The data that the signature covers is pointed to be the I<tbs> parameter which 328 that case, I<tbs> is expected to be the whole message to be verified on, 383 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL, 417 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 217 openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 221 openssl md5 -c tbs 222 MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5
|