Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 19 of 19) sorted by relevance

/openbsd/regress/lib/libcrypto/ecdsa/
H A Decdsatest.c175 if ((sig_len = ECDSA_size(eckey)) == 0) in test_builtin()
177 if ((signature = malloc(sig_len)) == NULL) in test_builtin()
192 if (ECDSA_verify(0, digest, 20, signature, sig_len, in test_builtin()
199 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, in test_builtin()
206 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, in test_builtin()
220 sig_len)) == NULL) in test_builtin()
251 if ((sig_len = i2d_ECDSA_SIG(ecdsa_sig, NULL)) <= 0) in test_builtin()
254 if ((signature = calloc(1, sig_len)) == NULL) in test_builtin()
273 if ((sig_len = i2d_ECDSA_SIG(ecdsa_sig, NULL)) <= 0) in test_builtin()
276 if ((signature = calloc(1, sig_len)) == NULL) in test_builtin()
[all …]
/openbsd/lib/libcrypto/ct/
H A Dct_sct.c248 SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) in SCT_set0_signature() argument
252 sct->sig_len = sig_len; in SCT_set0_signature()
258 SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) in SCT_set1_signature() argument
262 sct->sig_len = 0; in SCT_set1_signature()
265 if (sig != NULL && sig_len > 0) { in SCT_set1_signature()
266 sct->sig = malloc(sig_len); in SCT_set1_signature()
271 memcpy(sct->sig, sig, sig_len); in SCT_set1_signature()
272 sct->sig_len = sig_len; in SCT_set1_signature()
339 return sct->sig_len; in SCT_get0_signature()
360 sct->sig != NULL && sct->sig_len > 0; in SCT_signature_is_complete()
H A Dct_oct.c234 len = 4 + sct->sig_len; in i2o_SCT_signature()
251 s2n(sct->sig_len, p); in i2o_SCT_signature()
252 memcpy(p, sct->sig, sct->sig_len); in i2o_SCT_signature()
278 len = 43 + sct->ext_len + 4 + sct->sig_len; in i2o_SCT()
H A Dct.h290 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len);
297 size_t sig_len);
H A Dct_local.h114 size_t sig_len; member
H A Dct_vfy.c188 if ((ret = EVP_DigestVerifyFinal(ctx, sct->sig, sct->sig_len)) == 0) in SCT_CTX_verify()
H A Dct_prn.c192 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); in SCT_print()
/openbsd/regress/lib/libcrypto/sm2/
H A Dsm2evptest.c110 size_t sig_len = 0; in test_EVP_SM2() local
172 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, NULL, &sig_len)); in test_EVP_SM2()
174 CHECK_GOTO(sig_len == (size_t) EVP_PKEY_size(pkey)); in test_EVP_SM2()
176 sig = malloc(sig_len); in test_EVP_SM2()
179 CHECK_GOTO(EVP_DigestSignFinal(md_ctx, sig, &sig_len)); in test_EVP_SM2()
201 CHECK_GOTO(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len)); in test_EVP_SM2()
/openbsd/lib/libcrypto/ecdsa/
H A Decdsa.c604 const unsigned char *sigbuf, int sig_len, EC_KEY *key) in ecdsa_verify() argument
616 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) in ecdsa_verify()
620 if ((der_len = i2d_ECDSA_SIG(s, &der)) != sig_len) in ecdsa_verify()
636 const unsigned char *sigbuf, int sig_len, EC_KEY *key) in ECDSA_verify() argument
642 return key->meth->verify(type, digest, digest_len, sigbuf, sig_len, key); in ECDSA_verify()
/openbsd/lib/libcrypto/sm2/
H A Dsm2_sign.c425 int sig_len, EC_KEY *eckey) in SM2_verify() argument
439 if (d2i_ECDSA_SIG(&s, &p, sig_len) == NULL) { in SM2_verify()
446 if (derlen != sig_len || memcmp(sig, der, derlen) != 0) { in SM2_verify()
/openbsd/lib/libcrypto/cms/
H A Dcms_sd.c784 size_t sig_len = 0; in CMS_SignerInfo_sign() local
812 if (!EVP_DigestSign(si->mctx, NULL, &sig_len, buf, buf_len)) in CMS_SignerInfo_sign()
814 if ((sig = calloc(1, sig_len)) == NULL) in CMS_SignerInfo_sign()
816 if (!EVP_DigestSign(si->mctx, sig, &sig_len, buf, buf_len)) in CMS_SignerInfo_sign()
825 ASN1_STRING_set0(si->signature, sig, sig_len); in CMS_SignerInfo_sign()
833 freezero(sig, sig_len); in CMS_SignerInfo_sign()
/openbsd/lib/libcrypto/ec/
H A Dec_kmeth.c243 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_set_verify() argument
319 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey), in EC_KEY_METHOD_get_verify() argument
H A Dec_local.h320 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
332 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey);
H A Decx_methods.c855 size_t sig_len, const unsigned char *message, size_t message_len) in pkey_ecx_digestverify() argument
865 if (sig_len != ecx_sig_size(pkey_ctx->pkey)) in pkey_ecx_digestverify()
/openbsd/lib/libssl/
H A Dtls13_client.c913 size_t sig_len, sig_content_len; in tls13_client_certificate_verify_send() local
955 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) in tls13_client_certificate_verify_send()
957 if ((sig = calloc(1, sig_len)) == NULL) in tls13_client_certificate_verify_send()
959 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) in tls13_client_certificate_verify_send()
966 if (!CBB_add_bytes(&sig_cbb, sig, sig_len)) in tls13_client_certificate_verify_send()
H A Dtls13_server.c715 size_t sig_len, sig_content_len; in tls13_server_certificate_verify_send() local
757 if (!EVP_DigestSign(mdctx, NULL, &sig_len, sig_content, sig_content_len)) in tls13_server_certificate_verify_send()
759 if ((sig = calloc(1, sig_len)) == NULL) in tls13_server_certificate_verify_send()
761 if (!EVP_DigestSign(mdctx, sig, &sig_len, sig_content, sig_content_len)) in tls13_server_certificate_verify_send()
768 if (!CBB_add_bytes(&sig_cbb, sig, sig_len)) in tls13_server_certificate_verify_send()
/openbsd/usr.bin/ssh/
H A Dsk-usbhid.c909 size_t sig_len; in pack_sig_ecdsa() local
913 sig_len = fido_assert_sig_len(assert, 0); in pack_sig_ecdsa()
914 if ((sig = d2i_ECDSA_SIG(NULL, &cp, sig_len)) == NULL) { in pack_sig_ecdsa()
H A Dsshkey.c2245 size_t i, ca_len, sig_len; in sshkey_certify_custom() local
2320 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify_custom()
2324 if ((ret = sshkey_get_sigtype(sig_blob, sig_len, &sigtype)) != 0) in sshkey_certify_custom()
2335 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_certify_custom()
/openbsd/gnu/usr.bin/gcc/gcc/java/
H A Dgjavah.c1487 int sig_len = JPOOL_UTF_LENGTH (jcf, signature_index);
1490 signature, sig_len))
1495 unsigned char *limit = signature + sig_len;