/openbsd/regress/lib/libcrypto/ecdsa/ |
H A D | ecdsatest.c | 175 if ((sig_len = ECDSA_size(eckey)) == 0) in test_builtin() 177 if ((signature = malloc(sig_len)) == NULL) in test_builtin() 192 if (ECDSA_verify(0, digest, 20, signature, sig_len, in test_builtin() 199 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, in test_builtin() 206 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, in test_builtin() 220 sig_len)) == NULL) in test_builtin() 251 if ((sig_len = i2d_ECDSA_SIG(ecdsa_sig, NULL)) <= 0) in test_builtin() 254 if ((signature = calloc(1, sig_len)) == NULL) in test_builtin() 273 if ((sig_len = i2d_ECDSA_SIG(ecdsa_sig, NULL)) <= 0) in test_builtin() 276 if ((signature = calloc(1, sig_len)) == NULL) in test_builtin() [all …]
|
/openbsd/lib/libcrypto/ct/ |
H A D | ct_sct.c | 248 SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument 252 sct->sig_len = sig_len; in SCT_set0_signature() 258 SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument 262 sct->sig_len = 0; in SCT_set1_signature() 265 if (sig != NULL && sig_len > 0) { in SCT_set1_signature() 266 sct->sig = malloc(sig_len); in SCT_set1_signature() 271 memcpy(sct->sig, sig, sig_len); in SCT_set1_signature() 272 sct->sig_len = sig_len; in SCT_set1_signature() 339 return sct->sig_len; in SCT_get0_signature() 360 sct->sig != NULL && sct->sig_len > 0; in SCT_signature_is_complete()
|
H A D | ct_oct.c | 234 len = 4 + sct->sig_len; in i2o_SCT_signature() 251 s2n(sct->sig_len, p); in i2o_SCT_signature() 252 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature() 278 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
|
H A D | ct.h | 290 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len); 297 size_t sig_len);
|
H A D | ct_local.h | 114 size_t sig_len; member
|
H A D | ct_vfy.c | 188 if ((ret = EVP_DigestVerifyFinal(ctx, sct->sig, sct->sig_len)) == 0) in SCT_CTX_verify()
|
H A D | ct_prn.c | 192 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); in SCT_print()
|
/openbsd/regress/lib/libcrypto/sm2/ |
H A D | sm2evptest.c | 110 size_t sig_len = 0; in test_EVP_SM2() local 172 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, NULL, &sig_len)); in test_EVP_SM2() 174 CHECK_GOTO(sig_len == (size_t) EVP_PKEY_size(pkey)); in test_EVP_SM2() 176 sig = malloc(sig_len); in test_EVP_SM2() 179 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, sig, &sig_len)); in test_EVP_SM2() 201 CHECK_GOTO(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len)); in test_EVP_SM2()
|
/openbsd/lib/libcrypto/ecdsa/ |
H A D | ecdsa.c | 604 const unsigned char *sigbuf, int sig_len, EC_KEY *key) in ecdsa_verify() argument 616 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) in ecdsa_verify() 620 if ((der_len = i2d_ECDSA_SIG(s, &der)) != sig_len) in ecdsa_verify() 636 const unsigned char *sigbuf, int sig_len, EC_KEY *key) in ECDSA_verify() argument 642 return key->meth->verify(type, digest, digest_len, sigbuf, sig_len, key); in ECDSA_verify()
|
/openbsd/lib/libcrypto/sm2/ |
H A D | sm2_sign.c | 425 int sig_len, EC_KEY *eckey) in SM2_verify() argument 439 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) { in SM2_verify() 446 if (derlen != sig_len || memcmp(sig, der, derlen) != 0) { in SM2_verify()
|
/openbsd/lib/libcrypto/cms/ |
H A D | cms_sd.c | 784 size_t sig_len = 0; in CMS_SignerInfo_sign() local 812 if (!EVP_DigestSign(si->mctx, NULL, &sig_len, buf, buf_len)) in CMS_SignerInfo_sign() 814 if ((sig = calloc(1, sig_len)) == NULL) in CMS_SignerInfo_sign() 816 if (!EVP_DigestSign(si->mctx, sig, &sig_len, buf, buf_len)) in CMS_SignerInfo_sign() 825 ASN1_STRING_set0(si->signature, sig, sig_len); in CMS_SignerInfo_sign() 833 freezero(sig, sig_len); in CMS_SignerInfo_sign()
|
/openbsd/lib/libcrypto/ec/ |
H A D | ec_kmeth.c | 243 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_set_verify() argument 319 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_get_verify() argument
|
H A D | ec_local.h | 320 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey); 332 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
|
H A D | ecx_methods.c | 855 size_t sig_len, const unsigned char *message, size_t message_len) in pkey_ecx_digestverify() argument 865 if (sig_len != ecx_sig_size(pkey_ctx->pkey)) in pkey_ecx_digestverify()
|
/openbsd/lib/libssl/ |
H A D | tls13_client.c | 913 size_t sig_len, sig_content_len; in tls13_client_certificate_verify_send() local 955 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) in tls13_client_certificate_verify_send() 957 if ((sig = calloc(1, sig_len)) == NULL) in tls13_client_certificate_verify_send() 959 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) in tls13_client_certificate_verify_send() 966 if (!CBB_add_bytes(&sig_cbb, sig, sig_len)) in tls13_client_certificate_verify_send()
|
H A D | tls13_server.c | 715 size_t sig_len, sig_content_len; in tls13_server_certificate_verify_send() local 757 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) in tls13_server_certificate_verify_send() 759 if ((sig = calloc(1, sig_len)) == NULL) in tls13_server_certificate_verify_send() 761 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) in tls13_server_certificate_verify_send() 768 if (!CBB_add_bytes(&sig_cbb, sig, sig_len)) in tls13_server_certificate_verify_send()
|
/openbsd/usr.bin/ssh/ |
H A D | sk-usbhid.c | 909 size_t sig_len; in pack_sig_ecdsa() local 913 sig_len = fido_assert_sig_len(assert, 0); in pack_sig_ecdsa() 914 if ((sig = d2i_ECDSA_SIG(NULL, &cp, sig_len)) == NULL) { in pack_sig_ecdsa()
|
H A D | sshkey.c | 2245 size_t i, ca_len, sig_len; in sshkey_certify_custom() local 2320 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify_custom() 2324 if ((ret = sshkey_get_sigtype(sig_blob, sig_len, &sigtype)) != 0) in sshkey_certify_custom() 2335 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_certify_custom()
|
/openbsd/gnu/usr.bin/gcc/gcc/java/ |
H A D | gjavah.c | 1487 int sig_len = JPOOL_UTF_LENGTH (jcf, signature_index); 1490 signature, sig_len)) 1495 unsigned char *limit = signature + sig_len;
|