/freebsd/crypto/libecc/include/libecc/sig/ |
H A D | sig_algs.h | 50 const ec_key_pair *key_pair, 55 ATTRIBUTE_WARN_UNUSED_RET int ec_sign_init(struct ec_sign_context *ctx, const ec_key_pair *key_pair, 63 ATTRIBUTE_WARN_UNUSED_RET int _ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, 69 ATTRIBUTE_WARN_UNUSED_RET int ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair,
|
H A D | bip0340.h | 47 ATTRIBUTE_WARN_UNUSED_RET int _bip0340_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair,
|
H A D | sig_algs_internal.h | 65 ATTRIBUTE_WARN_UNUSED_RET int (*sign) (u8 *sig, u8 siglen, const ec_key_pair *key_pair, 157 const ec_key_pair *key_pair; member 239 ATTRIBUTE_WARN_UNUSED_RET int generic_ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair,
|
H A D | eddsa.h | 91 ATTRIBUTE_WARN_UNUSED_RET int _eddsa_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair,
|
/freebsd/crypto/libecc/src/sig/ |
H A D | sig_algs.c | 295 const ec_key_pair *key_pair, in _ec_sign_init() argument 307 ret = key_pair_check_initialized_and_type(key_pair, sig_type); EG(ret, err); in _ec_sign_init() 361 ctx->key_pair = key_pair; in _ec_sign_init() 388 int ec_sign_init(struct ec_sign_context *ctx, const ec_key_pair *key_pair, in ec_sign_init() argument 392 return _ec_sign_init(ctx, key_pair, NULL, sig_type, hash_type, in ec_sign_init() 454 int generic_ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, in generic_ec_sign() argument 463 ret = _ec_sign_init(&ctx, key_pair, rand, sig_type, in generic_ec_sign() 473 int _ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, in _ec_sign() argument 485 ret = sm->sign(sig, siglen, key_pair, m, mlen, rand, in _ec_sign() 497 int ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, in ec_sign() argument [all …]
|
H A D | eddsa.c | 216 ATTRIBUTE_WARN_UNUSED_RET static int eddsa_key_pair_sanity_check(const ec_key_pair *key_pair) in eddsa_key_pair_sanity_check() argument 220 MUST_HAVE((key_pair != NULL), ret, err); in eddsa_key_pair_sanity_check() 221 ret = eddsa_priv_key_sanity_check(&(key_pair->priv_key)); EG(ret, err); in eddsa_key_pair_sanity_check() 222 ret = eddsa_pub_key_sanity_check(&(key_pair->pub_key)); EG(ret, err); in eddsa_key_pair_sanity_check() 223 MUST_HAVE((key_pair->priv_key.key_type == key_pair->pub_key.key_type), ret, err); in eddsa_key_pair_sanity_check() 1119 const ec_key_pair *key_pair; local 1126 key_pair = ctx->key_pair; 1128 key_type = ctx->key_pair->priv_key.key_type; 1144 ret = eddsa_key_pair_sanity_check(key_pair); EG(ret, err); 1149 …MUST_HAVE((key_type == key_pair->pub_key.key_type) && (h->type == get_eddsa_hash_type(key_type)), … [all …]
|
H A D | ecsdsa_common.c | 163 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __ecsdsa_sign_init() 168 priv_key = &(ctx->key_pair->priv_key); in __ecsdsa_sign_init() 178 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in __ecsdsa_sign_init() 299 priv_key = &(ctx->key_pair->priv_key); in __ecsdsa_sign_finalize()
|
H A D | ecfsdsa.c | 140 ret = key_pair_check_initialized_and_type(ctx->key_pair, ECFSDSA); EG(ret, err); in _ecfsdsa_sign_init() 145 priv_key = &(ctx->key_pair->priv_key); in _ecfsdsa_sign_init() 159 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in _ecfsdsa_sign_init() 283 priv_key = &(ctx->key_pair->priv_key); in _ecfsdsa_sign_finalize() 286 p_bit_len = ctx->key_pair->priv_key.params->ec_fp.p_bitlen; in _ecfsdsa_sign_finalize() 287 q_bit_len = ctx->key_pair->priv_key.params->ec_gen_order_bitlen; in _ecfsdsa_sign_finalize()
|
H A D | sm2.c | 257 ret = key_pair_check_initialized_and_type(ctx->key_pair, SM2); EG(ret, err); in _sm2_sign_init() 273 &(ctx->key_pair->pub_key), ctx->h->type); EG(ret, err); in _sm2_sign_init() 342 priv_key = &(ctx->key_pair->priv_key); in _sm2_sign_finalize() 354 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in _sm2_sign_finalize()
|
H A D | bign_common.c | 418 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __bign_sign_init() 457 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __bign_sign_update() 505 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __bign_sign_finalize() 511 priv_key = &(ctx->key_pair->priv_key); in __bign_sign_finalize() 536 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in __bign_sign_finalize()
|
H A D | ecdsa_common.c | 273 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __ecdsa_sign_init() 307 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __ecdsa_sign_update() 350 ret = key_pair_check_initialized_and_type(ctx->key_pair, key_type); EG(ret, err); in __ecdsa_sign_finalize() 356 priv_key = &(ctx->key_pair->priv_key); in __ecdsa_sign_finalize() 377 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in __ecdsa_sign_finalize()
|
H A D | ecrdsa.c | 157 ret = key_pair_check_initialized_and_type(ctx->key_pair, ECRDSA); EG(ret, err); in _ecrdsa_sign_init() 229 priv_key = &(ctx->key_pair->priv_key); in _ecrdsa_sign_finalize() 249 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in _ecrdsa_sign_finalize()
|
H A D | ecgdsa.c | 140 ret = key_pair_check_initialized_and_type(ctx->key_pair, ECGDSA); EG(ret, err); in _ecgdsa_sign_init() 215 priv_key = &(ctx->key_pair->priv_key); in _ecgdsa_sign_finalize() 239 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in _ecgdsa_sign_finalize()
|
H A D | fuzzing_ecgdsa.c | 75 priv_key = &(ctx->key_pair->priv_key); in ecgdsa_sign_raw() 92 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in ecgdsa_sign_raw()
|
H A D | fuzzing_ecdsa.c | 75 priv_key = &(ctx->key_pair->priv_key); in ecdsa_sign_raw() 87 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in ecdsa_sign_raw()
|
H A D | fuzzing_ecrdsa.c | 116 priv_key = &(ctx->key_pair->priv_key); in ecrdsa_sign_raw() 133 dbg_pub_key_print("Y", &(ctx->key_pair->pub_key)); in ecrdsa_sign_raw()
|
H A D | eckcdsa.c | 216 ret = key_pair_check_initialized_and_type(ctx->key_pair, ECKCDSA); EG(ret, err); in _eckcdsa_sign_init() 221 pub_key = &(ctx->key_pair->pub_key); in _eckcdsa_sign_init() 332 priv_key = &(ctx->key_pair->priv_key); in _eckcdsa_sign_finalize()
|
H A D | bip0340.c | 161 int _bip0340_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, in _bip0340_sign() argument 190 MUST_HAVE((key_pair != NULL) && (sig != NULL) && (adata == NULL), ret, err); in _bip0340_sign() 196 ret = key_pair_check_initialized_and_type(key_pair, BIP0340); EG(ret, err); in _bip0340_sign() 204 priv_key = &(key_pair->priv_key); in _bip0340_sign() 205 pub_key = &(key_pair->pub_key); in _bip0340_sign()
|
/freebsd/crypto/libecc/src/tests/ |
H A D | ec_utils.c | 655 ec_key_pair key_pair; in sign_bin_file() local 704 ret = ec_structured_key_pair_import_from_priv_key_buf(&key_pair, in sign_bin_file() 757 ret = ec_sign_init(&sig_ctx, &key_pair, sig_type, hash_type, (const u8*)adata, adata_len); in sign_bin_file() 898 …ret = ec_sign(sig, siglen, &key_pair, allocated_buff, (u32)offset, sig_type, hash_type, (const u8*… in sign_bin_file()
|
H A D | ec_self_tests_core.c | 123 …TE_WARN_UNUSED_RET static int random_split_ec_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair, in random_split_ec_sign() argument 135 MUST_HAVE(key_pair != NULL, ret, err); in random_split_ec_sign() 139 ret = _ec_sign_init(&ctx, key_pair, rand, sig_type, hash_type, adata, adata_len); in random_split_ec_sign()
|