/external/boringssl/src/crypto/evp/ |
p_ed25519.c | 27 size_t *siglen, const uint8_t *tbs, 35 *siglen = 64; 44 size_t siglen, const uint8_t *tbs, 47 if (siglen != 64 ||
|
p_ec.c | 117 static int pkey_ec_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 123 *siglen = ECDSA_size(ec); 125 } else if (*siglen < (size_t)ECDSA_size(ec)) { 133 *siglen = (size_t)sltmp; 137 static int pkey_ec_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, 139 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->pkey->pkey.ec);
|
internal.h | 199 int (*sign)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 202 int (*sign_message)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 205 int (*verify)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, 208 int (*verify_message)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen,
|
p_rsa.c | 166 static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, 173 *siglen = key_len; 177 if (*siglen < key_len) { 189 *siglen = out_len; 193 return RSA_sign_pss_mgf1(rsa, siglen, sig, *siglen, tbs, tbslen, 201 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); 205 size_t siglen, const uint8_t *tbs, 213 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa) [all...] |
/system/core/trusty/keymaster/ |
trusty_keymaster_device_test.cpp | 186 size_t siglen; local 188 &signature, &siglen)); 190 EXPECT_EQ(message_len, siglen); 205 size_t siglen; local 207 message_len, &signature, &siglen)); 222 size_t siglen; local 224 message_len, &signature, &siglen)); 238 size_t siglen; local 240 array_size(message) - 1, &signature, &siglen)); 242 EXPECT_GT(siglen, 69U) 257 size_t siglen; local 278 size_t siglen; local 299 size_t siglen; local 320 size_t siglen; local 343 size_t siglen; local 365 size_t siglen; local 387 size_t siglen; local 407 size_t siglen; local 428 size_t siglen; local 459 size_t siglen; local 480 size_t siglen; local 523 size_t siglen; local 551 size_t siglen; local [all...] |
/system/keymaster/ |
hmac_operation.cpp | 183 size_t siglen = signature.available_read(); local 184 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8) 186 if (siglen < min_mac_length_) 188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
|
ecdsa_operation.cpp | 149 size_t siglen; 160 siglen = siglen_tmp; 162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 164 if (!output->Reinitialize(siglen)) 166 if (EVP_DigestSignFinal(&digest_ctx_, output->peek_write(), &siglen) <= 0) 169 if (!output->advance_write(siglen))
|
rsa_operation.cpp | 371 size_t siglen; local 372 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 375 if (!output->Reinitialize(siglen)) 378 if (EVP_DigestSignFinal(&digest_ctx_, output->peek_write(), &siglen) <= 0) 380 if (!output->advance_write(siglen))
|
/external/openssh/ |
ssh-rsa.c | 165 const u_char *sig, size_t siglen, const u_char *data, size_t datalen) 176 sig == NULL || siglen == 0) 179 if ((b = sshbuf_from(sig, siglen)) == NULL) 308 u_char *sigbuf, size_t siglen, RSA *rsa) 325 siglen == 0 || siglen > rsasize) { 333 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
|
key.c | 139 size_t siglen; local 145 if ((r = sshkey_sign(key, &sig, &siglen, 151 if (siglen > INT_MAX) 152 fatal("%s: giant len %zu", __func__, siglen); 156 *lenp = siglen;
|
sshkey.h | 200 const u_char *sig, size_t siglen, const u_char *data, size_t datalen);
|
monitor.c | 604 size_t datlen, siglen, alglen; local 662 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg, 668 if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen, 677 is_proof ? "KEX" : "hostkey proof", signature, siglen); 680 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) [all...] |
sshconnect2.c | 1733 size_t siglen = 0, keylen = 0; local [all...] |
/external/boringssl/src/crypto/dsa/ |
dsa_test.cc | 225 unsigned int siglen; local 277 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa.get())) { 280 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa.get()) !=
|
/external/openssh/regress/unittests/sshkey/ |
test_sshkey.c | 60 size_t siglen; local 102 ASSERT_INT_EQ(sshkey_sign(sign_key, &sigblob, &siglen, 104 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */
|
/external/boringssl/src/include/openssl/ |
rsa.h | 578 uint8_t *sigret, unsigned int *siglen, const RSA *rsa);
|
evp.h | 585 size_t siglen); [all...] |
/bionic/libc/include/arpa/ |
nameser.h | 268 int siglen; member in struct:ns_tcp_tsig_state
|
/development/ndk/platforms/android-21/include/arpa/ |
nameser.h | 272 int siglen; member in struct:ns_tcp_tsig_state
|
/device/linaro/bootloader/edk2/StdLib/Include/arpa/ |
nameser.h | 264 int siglen;
member in struct:ns_tcp_tsig_state
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/arpa/ |
nameser.h | 237 int siglen; member in struct:ns_tcp_tsig_state
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/arpa/ |
nameser.h | 237 int siglen; member in struct:ns_tcp_tsig_state
|
/prebuilts/ndk/r10/platforms/android-21/arch-arm/usr/include/arpa/ |
nameser.h | 272 int siglen; member in struct:ns_tcp_tsig_state
|
/prebuilts/ndk/r10/platforms/android-21/arch-arm64/usr/include/arpa/ |
nameser.h | 272 int siglen; member in struct:ns_tcp_tsig_state
|
/prebuilts/ndk/r10/platforms/android-21/arch-mips/usr/include/arpa/ |
nameser.h | 272 int siglen; member in struct:ns_tcp_tsig_state
|