HomeSort by relevance Sort by last modified time
    Searched refs:sig_len (Results 1 - 25 of 27) sorted by null

1 2

  /system/core/include/mincrypt/
dsa_sig.h 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
  /external/openssl/crypto/ecdsa/
ecs_vrf.c 84 const unsigned char *sigbuf, int sig_len, EC_KEY *eckey)
91 if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err;
ecdsatest.c 296 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local
387 sig_len = ECDSA_size(eckey);
388 if ((signature = OPENSSL_malloc(sig_len)) == NULL)
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1)
406 if (ECDSA_verify(0, digest, 20, signature, sig_len,
415 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len,
424 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1,
437 if ((ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len)) == NULL)
470 sig_len = i2d_ECDSA_SIG(ecdsa_sig, &sig_ptr2)
    [all...]
  /external/chromium_org/crypto/
ec_signature_creator_openssl.cc 38 size_t sig_len = 0; local
42 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) {
46 signature->resize(sig_len);
47 if (!EVP_DigestSignFinal(ctx.get(), &signature->front(), &sig_len))
53 signature->resize(sig_len);
  /external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
ecdsa_test.c 75 unsigned int sig_len, degree, r_len, s_len, bn_len, buf_len; local
153 sig_len = ECDSA_size(eckey);
154 signature = OPENSSL_malloc(sig_len);
158 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) {
165 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) {
172 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) {
179 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) {
186 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) {
197 ecdsa_sig = d2i_ECDSA_SIG(NULL, &sig_ptr, sig_len);
232 sig_len = i2d_ECDSA_SIG(ecdsa_sig, &sig_ptr2)
    [all...]
ecdsa.c 64 unsigned int *sig_len, EC_KEY *eckey) {
66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
74 const uint8_t *sig, size_t sig_len, EC_KEY *eckey) {
79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
83 if (s == NULL || d2i_ECDSA_SIG(&s, &sig, sig_len) == NULL) {
463 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv,
469 *sig_len = 0;
475 *sig_len = 0;
478 *sig_len = i2d_ECDSA_SIG(s, &sig)
    [all...]
  /system/core/libmincrypt/
dsa_sig.c 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) {
82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) {
87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
  /external/chromium_org/content/child/webcrypto/openssl/
rsa_ssa_openssl.cc 75 size_t sig_len = 0;
79 !EVP_DigestSignFinal(ctx.get(), NULL, &sig_len)) {
83 buffer->resize(sig_len);
84 if (!EVP_DigestSignFinal(ctx.get(), &buffer->front(), &sig_len))
87 buffer->resize(sig_len);
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
sign.c 84 size_t sig_len = EVP_PKEY_size(pkey); local
103 EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len) <= 0) {
106 *out_sig_len = sig_len;
129 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len,
156 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
digestsign.c 190 size_t sig_len) {
202 r = tmp_ctx.pctx->pmeth->verifyctx(tmp_ctx.pctx, sig, sig_len, &tmp_ctx);
211 return EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
example_sign.c 105 size_t sig_len = 0; local
115 sig = malloc(sig_len);
123 if (EVP_DigestSignFinal(&md_ctx, NULL, &sig_len) != 1) {
127 if (sig_len != RSA_size(rsa)) {
128 fprintf(stderr, "sig_len mismatch\n");
132 sig = malloc(sig_len);
136 if (EVP_DigestSignFinal(&md_ctx, sig, &sig_len) != 1) {
evp_ctx.c 251 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len,
262 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len);
283 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len,
294 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ecdsa.h 73 * space. On successful exit, |*sig_len| is set to the actual number of bytes
78 unsigned int *sig_len, EC_KEY *key);
80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid
86 size_t sig_len, EC_KEY *key);
149 unsigned int *sig_len, const BIGNUM *kinv,
dsa.h 204 size_t sig_len, const DSA *dsa);
214 size_t sig_len, const DSA *dsa);
ec_key.h 266 unsigned int *sig_len, EC_KEY *eckey);
270 size_t sig_len, EC_KEY *eckey);
evp.h 270 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid
277 size_t sig_len);
335 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid
344 size_t sig_len, EVP_PKEY *pkey);
440 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of
442 * |sig| and |*sig_len| updated with the true length.
450 size_t *sig_len, const uint8_t *data,
459 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a valid signature
464 size_t sig_len, const uint8_t *data,
    [all...]
rsa.h 205 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid, PKCS#1
217 const uint8_t *sig, size_t sig_len, RSA *rsa);
  /external/chromium_org/net/quic/test_tools/
crypto_test_utils_openssl.cc 48 size_t sig_len; variable
49 if (!EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)) {
53 scoped_ptr<uint8[]> der_sig(new uint8[sig_len]);
54 if (!EVP_DigestSignFinal(md_ctx.get(), der_sig.get(), &sig_len)) {
60 d2i_ECDSA_SIG(NULL, const_cast<const uint8**>(&derp), sig_len));
  /external/chromium_org/third_party/boringssl/src/tool/
speed.cc 138 unsigned sig_len; local
141 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool {
143 sig.get(), &sig_len, key);
152 [key, &fake_sha256_hash, &sig, sig_len]() -> bool {
154 sizeof(fake_sha256_hash), sig.get(), sig_len, key);
  /external/chromium_org/third_party/boringssl/src/crypto/dsa/
dsa.c 243 const uint8_t *sig, size_t sig_len, const DSA *dsa) {
252 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) {
270 size_t digest_len, const uint8_t *sig, size_t sig_len,
280 if (d2i_DSA_SIG(&s, &sig, sig_len) == NULL) {
  /hardware/qcom/keymaster/
keymaster_qcom.h 173 * sig_len : Signed data length
179 size_t sig_len; member in struct:keymaster_sign_data_resp
keymaster_qcom.cpp 532 resp->sig_len = KM_KEY_SIZE_MAX;
554 UniquePtr<uint8_t> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(resp->sig_len)));
561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len);
563 *signedDataLength = resp->sig_len;
  /external/chromium_org/net/ssl/
openssl_platform_key_mac.cc 365 unsigned int* sig_len,
374 // TODO(davidben): Fix BoringSSL to make sig_len a size_t*.
380 *sig_len = out_len;
387 size_t sig_len,
  /external/chromium_org/net/android/
keystore_openssl.cc 457 unsigned int* sig_len,
485 *sig_len = signature.size();
492 size_t sig_len,
  /external/chromium_org/third_party/boringssl/src/crypto/rsa/
rsa.c 443 const uint8_t *sig, size_t sig_len, RSA *rsa) {
452 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa);
455 if (sig_len != rsa_size) {
471 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len,

Completed in 1222 milliseconds

1 2