/reactos/dll/3rdparty/mbedtls/ |
H A D | pk_wrap.c | 110 if( sig_len < rsa_len ) in rsa_verify_wrap() 123 if( sig_len > rsa_len ) in rsa_verify_wrap() 131 unsigned char *sig, size_t *sig_len, in rsa_sign_wrap() argument 141 *sig_len = mbedtls_rsa_get_len( rsa ); in rsa_sign_wrap() 259 unsigned char *sig, size_t *sig_len, 281 unsigned char *sig, size_t *sig_len, in eckey_sign_wrap() argument 307 unsigned char *sig, size_t *sig_len, 379 unsigned char *sig, size_t *sig_len, in eckey_sign_rs_wrap() argument 536 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 646 *sig_len = rsa_alt->key_len_func( rsa_alt->key ); in rsa_alt_sign_wrap() [all …]
|
H A D | pk.c | 271 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 295 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx ); in mbedtls_pk_verify_restartable() 310 sig, sig_len ) ); in mbedtls_pk_verify_restartable() 318 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument 321 sig, sig_len, NULL ) ); in mbedtls_pk_verify() 330 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument 359 if( sig_len < mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 371 if( sig_len > mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 393 unsigned char *sig, size_t *sig_len, in mbedtls_pk_sign_restartable() argument 433 sig, sig_len, f_rng, p_rng ) ); in mbedtls_pk_sign_restartable() [all …]
|
H A D | pkcs11.c | 199 size_t sig_len = 0, asn_len = 0, oid_size = 0; in mbedtls_pkcs11_sign() local 222 sig_len = ctx->len; in mbedtls_pkcs11_sign() 223 if( hashlen > sig_len || asn_len > sig_len || in mbedtls_pkcs11_sign() 224 hashlen + asn_len > sig_len ) in mbedtls_pkcs11_sign() 257 asn_len + hashlen, sig, &sig_len ) != CKR_OK ) in mbedtls_pkcs11_sign()
|
H A D | x509write_csr.c | 208 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 280 if( ( ret = mbedtls_pk_sign( ctx->key, ctx->md_alg, hash, 0, sig, &sig_len, in x509write_csr_der_internal() 313 sig, sig_len ) ); in x509write_csr_der_internal()
|
H A D | x509write_crt.c | 393 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local 534 hash, 0, sig, &sig_len, in mbedtls_x509write_crt_der() 550 sig_oid, sig_oid_len, sig, sig_len ) ); in mbedtls_x509write_crt_der()
|
H A D | rsa.c | 2395 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local 2406 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2415 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2416 ( encoded_expected = mbedtls_calloc( 1, sig_len ) ) == NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2422 if( ( ret = rsa_rsassa_pkcs1_v15_encode( md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2441 sig_len ) ) != 0 ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2451 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2457 mbedtls_platform_zeroize( encoded_expected, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
H A D | ssl_cli.c | 2754 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 2824 sig_len = ( p[0] << 8 ) | p[1]; in ssl_parse_server_key_exchange() 2827 if( p != end - sig_len ) in ssl_parse_server_key_exchange() 2837 MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len ); in ssl_parse_server_key_exchange() 2906 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange()
|
H A D | ssl_srv.c | 4045 size_t i, sig_len; in ssl_parse_certificate_verify() local 4181 sig_len = ( ssl->in_msg[i] << 8 ) | ssl->in_msg[i+1]; in ssl_parse_certificate_verify() 4184 if( i + sig_len != ssl->in_hslen ) in ssl_parse_certificate_verify() 4195 ssl->in_msg + i, sig_len ) ) != 0 ) in ssl_parse_certificate_verify()
|
/reactos/sdk/include/reactos/libs/mbedtls/ |
H A D | pk_internal.h | 78 const unsigned char *sig, size_t sig_len ); 83 unsigned char *sig, size_t *sig_len, 91 const unsigned char *sig, size_t sig_len, 97 unsigned char *sig, size_t *sig_len,
|
H A D | pk.h | 358 const unsigned char *sig, size_t sig_len ); 383 const unsigned char *sig, size_t sig_len, 418 const unsigned char *sig, size_t sig_len ); 451 unsigned char *sig, size_t *sig_len, 484 unsigned char *sig, size_t *sig_len,
|
/reactos/base/applications/mstsc/ |
H A D | secure.c | 633 uint32 sig_len; in sec_parse_public_sig() local 640 sig_len = len - 8; in sec_parse_public_sig() 641 in_uint8a(s, signature, sig_len); in sec_parse_public_sig() 643 … (char *)signature_, SEC_MODULUS_SIZE, (char *)signature, sig_len, (char *)g_testkey)) in sec_parse_public_sig()
|
/reactos/dll/win32/crypt32/ |
H A D | cert.c | 2596 …OL CNG_PrepareSignatureECC(BYTE *encoded_sig, DWORD encoded_size, BYTE **sig_value, DWORD *sig_len) in CNG_PrepareSignatureECC() argument 2613 *sig_len = ecc_sig->r.cbData + ecc_sig->s.cbData; in CNG_PrepareSignatureECC() 2614 if (!(*sig_value = CryptMemAlloc(*sig_len))) in CNG_PrepareSignatureECC() 2631 BYTE **sig_value, DWORD *sig_len) in CNG_PrepareSignature() argument 2653 … ret = CNG_PrepareSignatureECC(encoded_sig, signedCert->Signature.cbData, sig_value, sig_len); in CNG_PrepareSignature() 2669 DWORD hash_len, sig_len; in CNG_VerifySignature() local 2679 ret = CNG_PrepareSignature(pubKeyInfo, signedCert, &sig_value, &sig_len); in CNG_VerifySignature() 2682 … status = BCryptVerifySignature(key, NULL, hash_value, hash_len, sig_value, sig_len, 0); in CNG_VerifySignature()
|