Home
last modified time | relevance | path

Searched refs:tbslen (Results 1 – 25 of 29) sorted by relevance

12

/openssl/providers/implementations/signature/
H A Deddsa_sig.c429 tbs, tbslen, md, &mdlen) in ed25519_sign()
435 tbslen = mdlen; in ed25519_sign()
436 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed25519_sign()
537 tbslen = mdlen; in ed448_sign()
538 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed448_sign()
594 tbs, tbslen, md, &mdlen) in ed25519_verify()
600 tbslen = mdlen; in ed25519_verify()
601 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed25519_verify()
652 tbslen = mdlen; in ed448_verify()
653 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed448_verify()
[all …]
H A Decdsa_sig.c317 const unsigned char *tbs, size_t tbslen) in ecdsa_sign_directly() argument
340 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign_directly()
348 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp, in ecdsa_sign_directly()
353 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, in ecdsa_sign_directly()
413 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_sign()
417 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); in ecdsa_sign()
433 const unsigned char *tbs, size_t tbslen) in ecdsa_verify_directly() argument
440 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); in ecdsa_verify_directly()
482 const unsigned char *tbs, size_t tbslen) in ecdsa_verify() argument
489 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) in ecdsa_verify()
[all …]
H A Ddsa_sig.c329 const unsigned char *tbs, size_t tbslen) in dsa_sign_directly() argument
353 if (mdsize != 0 && tbslen != mdsize) in dsa_sign_directly()
356 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, in dsa_sign_directly()
422 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_sign()
426 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign()
438 const unsigned char *tbs, size_t tbslen) in dsa_verify_directly() argument
443 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify_directly()
446 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify_directly()
491 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
498 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_verify()
[all …]
H A Drsa_sig.c699 if (tbslen != mdsize) { in rsa_sign_directly()
726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign_directly()
736 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign_directly()
738 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign_directly()
814 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign_directly()
908 return rsa_signverify_message_update(prsactx, tbs, tbslen) in rsa_sign()
1063 if (tbslen != mdsize) { in rsa_verify_directly()
1066 mdsize, tbslen); in rsa_verify_directly()
1112 if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen)) in rsa_verify_directly()
1167 const unsigned char *tbs, size_t tbslen) in rsa_verify() argument
[all …]
H A Dsm2_sig.c162 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
190 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
/openssl/crypto/dsa/
H A Ddsa_pmeth.c79 size_t tbslen) in pkey_dsa_sign() argument
95 if (tbslen != (size_t)md_size) in pkey_dsa_sign()
99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
109 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
124 if (tbslen != (size_t)md_size) in pkey_dsa_verify()
128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/openssl/crypto/rsa/
H A Drsa_pmeth.c137 size_t tbslen) in pkey_rsa_sign() argument
156 if (tbslen != (size_t)md_size) { in pkey_rsa_sign()
171 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
179 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
181 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign()
186 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
204 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
266 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
280 return RSA_verify(EVP_MD_get_type(rctx->md), tbs, tbslen, in pkey_rsa_verify()
287 if (tbslen != (size_t)md_size) { in pkey_rsa_verify()
[all …]
/openssl/crypto/ec/
H A Decx_meth.c806 size_t tbslen) in pkey_ecd_digestsign25519() argument
835 size_t tbslen) in pkey_ecd_digestsign448() argument
862 size_t tbslen) in pkey_ecd_digestverify25519() argument
874 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
882 size_t tbslen) in pkey_ecd_digestverify448() argument
1190 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument
1235 size_t tbslen) in s390x_pkey_ecd_digestsign448() argument
1283 size_t tbslen) in s390x_pkey_ecd_digestverify25519() argument
1308 &param.ed25519, tbs, tbslen) == 0 ? 1 : 0; in s390x_pkey_ecd_digestverify25519()
1315 size_t tbslen) in s390x_pkey_ecd_digestverify448() argument
[all …]
H A Dec_pmeth.c105 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
134 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
144 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/openssl/doc/man3/
H A DEVP_PKEY_meth_new.pod65 size_t tbslen));
72 size_t tbslen));
128 size_t tbslen));
134 size_t tbslen));
165 size_t tbslen));
172 size_t tbslen));
228 size_t tbslen));
294 const unsigned char *tbs, size_t tbslen);
303 const unsigned char *tbs, size_t tbslen);
362 const unsigned char *tbs, size_t tbslen);
[all …]
H A DEVP_PKEY_sign.pod25 const unsigned char *tbs, size_t tbslen);
73 or EVP_PKEY_sign_init_ex2(), the data specified by I<tbs> and I<tbslen> is
76 specified by I<tbs> and I<tbslen> is digested by the implied message digest
H A DEVP_DigestVerifyInit.pod22 size_t siglen, const unsigned char *tbs, size_t tbslen);
118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
H A DEVP_DigestSignInit.pod23 size_t tbslen);
133 Unless I<sig> is NULL, EVP_DigestSign() signs the data I<tbs> of length I<tbslen>
H A DEVP_PKEY_verify.pod27 const unsigned char *tbs, size_t tbslen);
76 followed by a single EVP_PKEY_verify_update() call with I<tbs> and I<tbslen>,
/openssl/crypto/evp/
H A Dm_sigver.c574 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
593 tbs, tbslen); in EVP_DigestSign()
598 return ctx->pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
601 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
683 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
700 tbs, tbslen); in EVP_DigestVerify()
705 return ctx->pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
707 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
H A Dsignature.c885 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
909 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
920 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
1011 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
1035 tbs, tbslen); in EVP_PKEY_verify()
1044 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
H A Dpmeth_lib.c1703 size_t tbslen)) in EVP_PKEY_meth_set_sign() argument
1715 size_t tbslen)) in EVP_PKEY_meth_set_verify() argument
1731 size_t tbslen)) in EVP_PKEY_meth_set_verify_recover() argument
1808 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument
1816 size_t tbslen)) in EVP_PKEY_meth_set_digestverify() argument
1892 size_t tbslen)) in EVP_PKEY_meth_get_sign() argument
1906 size_t tbslen)) in EVP_PKEY_meth_get_verify() argument
1924 size_t tbslen)) in EVP_PKEY_meth_get_verify_recover() argument
2015 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument
2024 size_t tbslen)) in EVP_PKEY_meth_get_digestverify() argument
/openssl/test/
H A Dfake_rsaprov.c334 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
480 size_t tbslen) in fake_rsa_dgstsgn() argument
482 if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) in fake_rsa_dgstsgn()
H A Denginetest.c197 size_t *siglen, const unsigned char *tbs, size_t tbslen) in test_encrypt() argument
H A Dtls-provider.c2738 size_t sigsize, const unsigned char *tbs, size_t tbslen) in xor_sig_sign() argument
2766 xorkey->privkey, XOR_KEY_SIZE, tbs, tbslen, in xor_sig_sign()
2781 const unsigned char *tbs, size_t tbslen) in xor_sig_verify() argument
2804 xorkey->privkey, XOR_KEY_SIZE, tbs, tbslen, in xor_sig_verify()
/openssl/include/openssl/
H A Devp.h821 size_t tbslen);
831 size_t tbslen);
1937 const unsigned char *tbs, size_t tbslen);
1950 const unsigned char *tbs, size_t tbslen);
2075 const unsigned char *tbs, size_t tbslen));
2079 const unsigned char *tbs, size_t tbslen));
2084 size_t tbslen));
2118 size_t tbslen));
2144 const unsigned char *tbs, size_t tbslen));
2154 size_t tbslen));
[all …]
H A Dcore_dispatch.h761 size_t tbslen))
775 size_t tbslen))
800 size_t sigsize, const unsigned char *tbs, size_t tbslen))
810 const unsigned char *tbs, size_t tbslen))
/openssl/doc/man7/
H A Dprovider-signature.pod32 size_t sigsize, const unsigned char *tbs, size_t tbslen);
44 const unsigned char *tbs, size_t tbslen);
74 size_t tbslen);
87 size_t tbslen);
245 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen>
275 case, I<tbs> is expected to be the whole message to be signed, I<tbslen> bytes
299 is I<tbslen> bytes long.
329 I<tbslen> bytes long.
383 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL,
417 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
/openssl/include/crypto/
H A Devp.h157 const unsigned char *tbs, size_t tbslen);
161 const unsigned char *tbs, size_t tbslen);
183 const unsigned char *tbs, size_t tbslen);
186 size_t tbslen);
/openssl/ssl/statem/
H A Dstatem_srvr.c2761 size_t siglen = 0, tbslen; in tls_construct_server_key_exchange() local
2793 tbslen = construct_key_exchange_tbs(s, &tbs, in tls_construct_server_key_exchange()
2796 if (tbslen == 0) { in tls_construct_server_key_exchange()
2801 if (EVP_DigestSign(md_ctx, NULL, &siglen, tbs, tbslen) <=0 in tls_construct_server_key_exchange()
2803 || EVP_DigestSign(md_ctx, sigbytes1, &siglen, tbs, tbslen) <= 0 in tls_construct_server_key_exchange()

Completed in 109 milliseconds

12