| /freebsd/crypto/openssl/providers/implementations/signature/ |
| H A D | eddsa_sig.c | 35 const unsigned char *tbs, size_t tbslen); 37 const unsigned char *tbs, size_t tbslen); 40 const unsigned char *tbs, size_t tbslen); 43 const unsigned char *tbs, size_t tbslen); 386 const unsigned char *tbs, size_t tbslen) in ed25519_sign() argument 420 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_sign() 432 tbs, tbslen, md, &mdlen) in ed25519_sign() 438 tbslen = mdlen; in ed25519_sign() 439 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed25519_sign() 450 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_sign() [all …]
|
| H A D | ecdsa_sig.c | 325 const unsigned char *tbs, size_t tbslen) argument 348 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) 356 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp, 361 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r, 409 size_t sigsize, const unsigned char *tbs, size_t tbslen) argument 421 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0) 425 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen); 441 const unsigned char *tbs, size_t tbslen) argument 445 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) 448 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec); [all …]
|
| H A D | dsa_sig.c | 333 const unsigned char *tbs, size_t tbslen) in dsa_sign_directly() argument 357 if (mdsize != 0 && tbslen != mdsize) in dsa_sign_directly() 360 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, in dsa_sign_directly() 414 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument 426 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_sign() 430 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign() 442 const unsigned char *tbs, size_t tbslen) in dsa_verify_directly() argument 447 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify_directly() 450 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify_directly() 494 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument [all …]
|
| H A D | rsa_sig.c | 678 const unsigned char *tbs, size_t tbslen) in rsa_sign_directly() argument 699 if (tbslen != mdsize) { in rsa_sign_directly() 713 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign_directly() 726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign_directly() 729 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign_directly() 736 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign_directly() 737 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign_directly() 738 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign_directly() 745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign_directly() 810 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign_directly() [all …]
|
| H A D | sm2_sig.c | 162 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument 178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign() 190 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument 194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
|
| H A D | ml_dsa_sig.c | 209 const uint8_t *tbs, size_t tbslen) in ml_dsa_digest_sign() argument 211 return ml_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); in ml_dsa_digest_sign() 233 const uint8_t *tbs, size_t tbslen) in ml_dsa_digest_verify() argument 235 return ml_dsa_verify(vctx, sig, siglen, tbs, tbslen); in ml_dsa_digest_verify()
|
| H A D | slh_dsa_sig.c | 231 const uint8_t *tbs, size_t tbslen) in slh_dsa_digest_sign() argument 233 return slh_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); in slh_dsa_digest_sign() 254 const uint8_t *tbs, size_t tbslen) in slh_dsa_digest_verify() argument 256 return slh_dsa_verify(vctx, sig, siglen, tbs, tbslen); in slh_dsa_digest_verify()
|
| /freebsd/crypto/openssl/fuzz/ |
| H A D | ml-dsa.c | 305 size_t sig_len = 0, tbslen; in ml_dsa_sign_verify() local 315 if (!consume_size_t(*buf, len, &tbslen)) { in ml_dsa_sign_verify() 320 tbslen = (tbslen % 2048) + 1; in ml_dsa_sign_verify() 322 if ((tbs = OPENSSL_malloc(tbslen)) == NULL in ml_dsa_sign_verify() 324 || !RAND_bytes_ex(NULL, tbs, tbslen, 0)) { in ml_dsa_sign_verify() 337 || EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, tbslen) <= 0 in ml_dsa_sign_verify() 339 || EVP_PKEY_sign(ctx, sig, &sig_len, tbs, tbslen) <= 0) { in ml_dsa_sign_verify() 350 || EVP_PKEY_verify(ctx, sig, sig_len, tbs, tbslen) <= 0) { in ml_dsa_sign_verify() 384 size_t sig_len, tbslen; in ml_dsa_digest_sign_verify() local 392 if (!consume_size_t(*buf, len, &tbslen)) { in ml_dsa_digest_sign_verify() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | openssl-compat.c | 93 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 96 if (EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 107 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 109 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_pmeth.c | 79 size_t tbslen) in pkey_dsa_sign() argument 95 if (tbslen != (size_t)md_size) in pkey_dsa_sign() 99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign() 109 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument 124 if (tbslen != (size_t)md_size) in pkey_dsa_verify() 128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_pmeth.c | 136 size_t tbslen) in pkey_rsa_sign() argument 155 if (tbslen != (size_t)md_size) { in pkey_rsa_sign() 164 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 170 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 178 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign() 179 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign() 180 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign() 185 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 203 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 265 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument [all …]
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ecx_meth.c | 806 size_t tbslen) in pkey_ecd_digestsign25519() argument 824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, in pkey_ecd_digestsign25519() 836 size_t tbslen) in pkey_ecd_digestsign448() argument 854 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448() 864 size_t tbslen) in pkey_ecd_digestverify25519() argument 876 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519() 884 size_t tbslen) in pkey_ecd_digestverify448() argument 896 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448() 1223 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument 1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() [all …]
|
| H A D | ec_pmeth.c | 105 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument 134 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign() 144 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument 160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_meth_new.pod | 65 size_t tbslen)); 72 size_t tbslen)); 83 size_t tbslen)); 128 size_t tbslen)); 134 size_t tbslen)); 165 size_t tbslen)); 172 size_t tbslen)); 183 size_t tbslen)); 228 size_t tbslen)); 234 size_t tbslen)); [all …]
|
| H A D | EVP_PKEY_sign.pod | 25 const unsigned char *tbs, size_t tbslen); 73 or EVP_PKEY_sign_init_ex2(), the data specified by I<tbs> and I<tbslen> is 76 specified by I<tbs> and I<tbslen> is digested by the implied message digest
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | m_sigver.c | 616 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument 643 sigret == NULL ? 0 : *siglen, tbs, tbslen); in EVP_DigestSign() 653 return pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign() 656 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign() 753 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 777 ret = signature->digest_verify(pctx->op.sig.algctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 787 return pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify() 789 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
|
| H A D | signature.c | 990 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument 1019 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign() 1031 …oarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign() 1143 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument 1172 tbs, tbslen); in EVP_PKEY_verify() 1184 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
|
| H A D | pmeth_lib.c | 1708 size_t tbslen)) in EVP_PKEY_meth_set_sign() argument 1720 size_t tbslen)) in EVP_PKEY_meth_set_verify() argument 1735 size_t tbslen)) in EVP_PKEY_meth_set_verify_recover() argument 1812 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument 1820 size_t tbslen)) in EVP_PKEY_meth_set_digestverify() argument 1896 size_t tbslen)) in EVP_PKEY_meth_get_sign() argument 1910 size_t tbslen)) in EVP_PKEY_meth_get_verify() argument 1927 size_t tbslen)) in EVP_PKEY_meth_get_verify_recover() argument 2018 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument 2027 size_t tbslen)) in EVP_PKEY_meth_get_digestverify() argument
|
| /freebsd/contrib/libfido2/src/ |
| H A D | eddsa.c | 46 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument 52 (void)tbslen; in EVP_DigestVerify()
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | functions-for-explicitly-fetched-signature-algorithms.md | 83 #define EVP_PKEY_sign_message(ctx,sig,siglen,tbs,tbslen) \ 84 EVP_PKEY_sign(ctx,sig,siglen,tbs,tbslen) 112 #define EVP_PKEY_verify_message(ctx,sig,siglen,tbs,tbslen) \ 113 EVP_PKEY_verify(ctx,sig,siglen,tbs,tbslen)
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | evp.h | 849 size_t tbslen); 859 size_t tbslen); 1985 const unsigned char *tbs, size_t tbslen); 1998 const unsigned char *tbs, size_t tbslen); 2117 const unsigned char *tbs, size_t tbslen)); 2120 const unsigned char *tbs, size_t tbslen)); 2124 size_t tbslen)); 2143 const unsigned char *tbs, size_t tbslen)); 2147 size_t tbslen)); 2161 const unsigned char *tbs, size_t tbslen)); [all …]
|
| H A D | core_dispatch.h | 773 …*ctx, unsigned char *sig, size_t *siglen, size_t sigsize, const unsigned char *tbs, size_t tbslen)) 782 …ify, (void *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen)) 807 size_t sigsize, const unsigned char *tbs, size_t tbslen)) 817 const unsigned char *tbs, size_t tbslen))
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | provider-signature.pod | 32 size_t sigsize, const unsigned char *tbs, size_t tbslen); 44 const unsigned char *tbs, size_t tbslen); 74 size_t tbslen); 87 size_t tbslen); 317 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen> 347 case, I<tbs> is expected to be the whole message to be signed, I<tbslen> bytes 371 is I<tbslen> bytes long. 401 I<tbslen> bytes long. 455 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL, 489 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | evp.h | 157 const unsigned char *tbs, size_t tbslen); 161 const unsigned char *tbs, size_t tbslen); 183 const unsigned char *tbs, size_t tbslen); 186 size_t tbslen);
|
| /freebsd/crypto/openssl/test/ |
| H A D | fake_rsaprov.c | 341 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument 487 size_t tbslen) in fake_rsa_dgstsgn() argument 489 if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) in fake_rsa_dgstsgn()
|