/external/chromium_org/crypto/ |
ec_signature_creator_openssl.cc | 31 size_t sig_len = 0; local 35 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) { 39 signature->resize(sig_len); 40 if (!EVP_DigestSignFinal(ctx.get(), &signature->front(), &sig_len)) 46 signature->resize(sig_len);
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdsa/ |
ecdsatest.c | 296 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 387 sig_len = ECDSA_size(eckey); 388 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 406 if (ECDSA_verify(0, digest, 20, signature, sig_len, 415 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 424 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, 437 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL) 470 sig_len = i2d_ECDSA_SIG(ecdsa_sig, &sig_ptr2) [all...] |
ecs_vrf.c | 84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err;
|
/external/openssl/crypto/ecdsa/ |
ecdsatest.c | 296 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local 387 sig_len = ECDSA_size(eckey); 388 if ((signature = OPENSSL_malloc(sig_len)) == NULL) 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) 406 if (ECDSA_verify(0, digest, 20, signature, sig_len, 415 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, 424 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, 437 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL) 470 sig_len = i2d_ECDSA_SIG(ecdsa_sig, &sig_ptr2) [all...] |
ecs_vrf.c | 84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) 91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err;
|
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils_openssl.cc | 58 size_t sig_len; variable 59 if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) { 63 scoped_ptr<uint8[]> der_sig(new uint8[sig_len]); 64 if (!EVP_DigestSignFinal(&md_ctx, der_sig.get(), &sig_len)) { 70 d2i_ECDSA_SIG(NULL, const_cast<const uint8**>(&derp), sig_len));
|
/system/core/libmincrypt/ |
dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
|
/system/core/include/mincrypt/ |
dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 173 * sig_len : Signed data length 179 size_t sig_len; member in struct:keymaster_sign_data_resp
|
keymaster_qcom.cpp | 532 resp->sig_len = KM_KEY_SIZE_MAX; 554 UniquePtr<uint8_t> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(resp->sig_len))); 561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len); 563 *signedDataLength = resp->sig_len;
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
channelid.patch | 100 + size_t sig_len; 149 + if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) 155 + der_sig = OPENSSL_malloc(sig_len); 162 + if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len)) 169 + sig = d2i_ECDSA_SIG(NULL, (const unsigned char**)&derp, sig_len); [all...] |
/external/openssl/patches/ |
0004-channelid.patch | 167 + size_t sig_len; 235 + if (!EVP_DigestSignFinal(&md_ctx, NULL, &sig_len)) 241 + der_sig = OPENSSL_malloc(sig_len); 248 + if (!EVP_DigestSignFinal(&md_ctx, der_sig, &sig_len)) 255 + sig = d2i_ECDSA_SIG(NULL, (const unsigned char**) &derp, sig_len); [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_clnt.c | 3422 size_t sig_len; local [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 3496 size_t sig_len; local [all...] |