Home
last modified time | relevance | path

Searched refs:tbslen (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/crypto/openssl/providers/implementations/signature/
H A Deddsa_sig.c35 const unsigned char *tbs, size_t tbslen);
37 const unsigned char *tbs, size_t tbslen);
40 const unsigned char *tbs, size_t tbslen);
43 const unsigned char *tbs, size_t tbslen);
386 const unsigned char *tbs, size_t tbslen) in ed25519_sign() argument
420 if (s390x_ed25519_digestsign(edkey, sigret, tbs, tbslen) == 0) { in ed25519_sign()
432 tbs, tbslen, md, &mdlen) in ed25519_sign()
438 tbslen = mdlen; in ed25519_sign()
439 } else if (tbslen != EDDSA_PREHASH_OUTPUT_LEN) { in ed25519_sign()
450 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_sign()
[all …]
H A Decdsa_sig.c325 const unsigned char *tbs, size_t tbslen) argument
348 if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
356 ret = ossl_ecdsa_deterministic_sign(tbs, tbslen, sig, &sltmp,
361 ret = ECDSA_sign_ex(0, tbs, tbslen, sig, &sltmp, ctx->kinv, ctx->r,
409 size_t sigsize, const unsigned char *tbs, size_t tbslen) argument
421 if (ecdsa_signverify_message_update(ctx, tbs, tbslen) <= 0)
425 return ecdsa_sign_directly(ctx, sig, siglen, sigsize, tbs, tbslen);
441 const unsigned char *tbs, size_t tbslen) argument
445 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize))
448 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->ec);
[all …]
H A Ddsa_sig.c333 const unsigned char *tbs, size_t tbslen) in dsa_sign_directly() argument
357 if (mdsize != 0 && tbslen != mdsize) in dsa_sign_directly()
360 ret = ossl_dsa_sign_int(0, tbs, tbslen, sig, &sltmp, pdsactx->dsa, in dsa_sign_directly()
414 size_t sigsize, const unsigned char *tbs, size_t tbslen) in dsa_sign() argument
426 if (dsa_signverify_message_update(pdsactx, tbs, tbslen) <= 0) in dsa_sign()
430 return dsa_sign_directly(pdsactx, sig, siglen, sigsize, tbs, tbslen); in dsa_sign()
442 const unsigned char *tbs, size_t tbslen) in dsa_verify_directly() argument
447 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify_directly()
450 return DSA_verify(0, tbs, tbslen, sig, siglen, pdsactx->dsa); in dsa_verify_directly()
494 const unsigned char *tbs, size_t tbslen) in dsa_verify() argument
[all …]
H A Drsa_sig.c678 const unsigned char *tbs, size_t tbslen) in rsa_sign_directly() argument
699 if (tbslen != mdsize) { in rsa_sign_directly()
713 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, in rsa_sign_directly()
726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign_directly()
729 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign_directly()
736 memcpy(prsactx->tbuf, tbs, tbslen); in rsa_sign_directly()
737 prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid); in rsa_sign_directly()
738 ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf, in rsa_sign_directly()
745 ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp, in rsa_sign_directly()
810 ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa, in rsa_sign_directly()
[all …]
H A Dsm2_sig.c162 size_t sigsize, const unsigned char *tbs, size_t tbslen) in sm2sig_sign() argument
178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
181 ret = ossl_sm2_internal_sign(tbs, tbslen, sig, &sltmp, ctx->ec); in sm2sig_sign()
190 const unsigned char *tbs, size_t tbslen) in sm2sig_verify() argument
194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
197 return ossl_sm2_internal_verify(tbs, tbslen, sig, siglen, ctx->ec); in sm2sig_verify()
H A Dml_dsa_sig.c209 const uint8_t *tbs, size_t tbslen) in ml_dsa_digest_sign() argument
211 return ml_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); in ml_dsa_digest_sign()
233 const uint8_t *tbs, size_t tbslen) in ml_dsa_digest_verify() argument
235 return ml_dsa_verify(vctx, sig, siglen, tbs, tbslen); in ml_dsa_digest_verify()
H A Dslh_dsa_sig.c231 const uint8_t *tbs, size_t tbslen) in slh_dsa_digest_sign() argument
233 return slh_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen); in slh_dsa_digest_sign()
254 const uint8_t *tbs, size_t tbslen) in slh_dsa_digest_verify() argument
256 return slh_dsa_verify(vctx, sig, siglen, tbs, tbslen); in slh_dsa_digest_verify()
/freebsd/crypto/openssl/fuzz/
H A Dml-dsa.c305 size_t sig_len = 0, tbslen; in ml_dsa_sign_verify() local
315 if (!consume_size_t(*buf, len, &tbslen)) { in ml_dsa_sign_verify()
320 tbslen = (tbslen % 2048) + 1; in ml_dsa_sign_verify()
322 if ((tbs = OPENSSL_malloc(tbslen)) == NULL in ml_dsa_sign_verify()
324 || !RAND_bytes_ex(NULL, tbs, tbslen, 0)) { in ml_dsa_sign_verify()
337 || EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, tbslen) <= 0 in ml_dsa_sign_verify()
339 || EVP_PKEY_sign(ctx, sig, &sig_len, tbs, tbslen) <= 0) { in ml_dsa_sign_verify()
350 || EVP_PKEY_verify(ctx, sig, sig_len, tbs, tbslen) <= 0) { in ml_dsa_sign_verify()
384 size_t sig_len, tbslen; in ml_dsa_digest_sign_verify() local
392 if (!consume_size_t(*buf, len, &tbslen)) { in ml_dsa_digest_sign_verify()
[all …]
/freebsd/crypto/openssh/openbsd-compat/
H A Dopenssl-compat.c93 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
96 if (EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
107 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
109 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
/freebsd/crypto/openssl/crypto/dsa/
H A Ddsa_pmeth.c79 size_t tbslen) in pkey_dsa_sign() argument
95 if (tbslen != (size_t)md_size) in pkey_dsa_sign()
99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); in pkey_dsa_sign()
109 const unsigned char *tbs, size_t tbslen) in pkey_dsa_verify() argument
124 if (tbslen != (size_t)md_size) in pkey_dsa_verify()
128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_pmeth.c136 size_t tbslen) in pkey_rsa_sign() argument
155 if (tbslen != (size_t)md_size) { in pkey_rsa_sign()
164 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
170 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
178 memcpy(rctx->tbuf, tbs, tbslen); in pkey_rsa_sign()
179 rctx->tbuf[tbslen] = RSA_X931_hash_id(EVP_MD_get_type(rctx->md)); in pkey_rsa_sign()
180 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, in pkey_rsa_sign()
185 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
203 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign()
265 const unsigned char *tbs, size_t tbslen) in pkey_rsa_verify() argument
[all …]
/freebsd/crypto/openssl/crypto/ec/
H A Decx_meth.c806 size_t tbslen) in pkey_ecd_digestsign25519() argument
824 if (ossl_ed25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, in pkey_ecd_digestsign25519()
836 size_t tbslen) in pkey_ecd_digestsign448() argument
854 if (ossl_ed448_sign(edkey->libctx, sig, tbs, tbslen, edkey->pubkey, in pkey_ecd_digestsign448()
864 size_t tbslen) in pkey_ecd_digestverify25519() argument
876 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify25519()
884 size_t tbslen) in pkey_ecd_digestverify448() argument
896 return ossl_ed448_verify(edkey->libctx, tbs, tbslen, sig, edkey->pubkey, in pkey_ecd_digestverify448()
1223 size_t tbslen) in s390x_pkey_ecd_digestsign25519() argument
1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519()
[all …]
H A Dec_pmeth.c105 const unsigned char *tbs, size_t tbslen) in pkey_ec_sign() argument
134 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); in pkey_ec_sign()
144 const unsigned char *tbs, size_t tbslen) in pkey_ec_verify() argument
160 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec); in pkey_ec_verify()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_meth_new.pod65 size_t tbslen));
72 size_t tbslen));
83 size_t tbslen));
128 size_t tbslen));
134 size_t tbslen));
165 size_t tbslen));
172 size_t tbslen));
183 size_t tbslen));
228 size_t tbslen));
234 size_t tbslen));
[all …]
H A DEVP_PKEY_sign.pod25 const unsigned char *tbs, size_t tbslen);
73 or EVP_PKEY_sign_init_ex2(), the data specified by I<tbs> and I<tbslen> is
76 specified by I<tbs> and I<tbslen> is digested by the implied message digest
/freebsd/crypto/openssl/crypto/evp/
H A Dm_sigver.c616 const unsigned char *tbs, size_t tbslen) in EVP_DigestSign() argument
643 sigret == NULL ? 0 : *siglen, tbs, tbslen); in EVP_DigestSign()
653 return pctx->pmeth->digestsign(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestSign()
656 if (sigret != NULL && EVP_DigestSignUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestSign()
753 size_t siglen, const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
777 ret = signature->digest_verify(pctx->op.sig.algctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
787 return pctx->pmeth->digestverify(ctx, sigret, siglen, tbs, tbslen); in EVP_DigestVerify()
789 if (EVP_DigestVerifyUpdate(ctx, tbs, tbslen) <= 0) in EVP_DigestVerify()
H A Dsignature.c990 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_sign() argument
1019 (sig == NULL) ? 0 : *siglen, tbs, tbslen); in EVP_PKEY_sign()
1031 …oarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
1143 const unsigned char *tbs, size_t tbslen) in EVP_PKEY_verify() argument
1172 tbs, tbslen); in EVP_PKEY_verify()
1184 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_verify()
H A Dpmeth_lib.c1708 size_t tbslen)) in EVP_PKEY_meth_set_sign() argument
1720 size_t tbslen)) in EVP_PKEY_meth_set_verify() argument
1735 size_t tbslen)) in EVP_PKEY_meth_set_verify_recover() argument
1812 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_set_digestsign() argument
1820 size_t tbslen)) in EVP_PKEY_meth_set_digestverify() argument
1896 size_t tbslen)) in EVP_PKEY_meth_get_sign() argument
1910 size_t tbslen)) in EVP_PKEY_meth_get_verify() argument
1927 size_t tbslen)) in EVP_PKEY_meth_get_verify_recover() argument
2018 const unsigned char *tbs, size_t tbslen)) in EVP_PKEY_meth_get_digestsign() argument
2027 size_t tbslen)) in EVP_PKEY_meth_get_digestverify() argument
/freebsd/contrib/libfido2/src/
H A Deddsa.c46 const unsigned char *tbs, size_t tbslen) in EVP_DigestVerify() argument
52 (void)tbslen; in EVP_DigestVerify()
/freebsd/crypto/openssl/doc/designs/
H A Dfunctions-for-explicitly-fetched-signature-algorithms.md83 #define EVP_PKEY_sign_message(ctx,sig,siglen,tbs,tbslen) \
84 EVP_PKEY_sign(ctx,sig,siglen,tbs,tbslen)
112 #define EVP_PKEY_verify_message(ctx,sig,siglen,tbs,tbslen) \
113 EVP_PKEY_verify(ctx,sig,siglen,tbs,tbslen)
/freebsd/crypto/openssl/include/openssl/
H A Devp.h849 size_t tbslen);
859 size_t tbslen);
1985 const unsigned char *tbs, size_t tbslen);
1998 const unsigned char *tbs, size_t tbslen);
2117 const unsigned char *tbs, size_t tbslen));
2120 const unsigned char *tbs, size_t tbslen));
2124 size_t tbslen));
2143 const unsigned char *tbs, size_t tbslen));
2147 size_t tbslen));
2161 const unsigned char *tbs, size_t tbslen));
[all …]
H A Dcore_dispatch.h773 …*ctx, unsigned char *sig, size_t *siglen, size_t sigsize, const unsigned char *tbs, size_t tbslen))
782 …ify, (void *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen))
807 size_t sigsize, const unsigned char *tbs, size_t tbslen))
817 const unsigned char *tbs, size_t tbslen))
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod32 size_t sigsize, const unsigned char *tbs, size_t tbslen);
44 const unsigned char *tbs, size_t tbslen);
74 size_t tbslen);
87 size_t tbslen);
317 The data to be signed is pointed to be the I<tbs> parameter which is I<tbslen>
347 case, I<tbs> is expected to be the whole message to be signed, I<tbslen> bytes
371 is I<tbslen> bytes long.
401 I<tbslen> bytes long.
455 signed is in I<tbs> which should be I<tbslen> bytes long. Unless I<sig> is NULL,
489 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
/freebsd/crypto/openssl/include/crypto/
H A Devp.h157 const unsigned char *tbs, size_t tbslen);
161 const unsigned char *tbs, size_t tbslen);
183 const unsigned char *tbs, size_t tbslen);
186 size_t tbslen);
/freebsd/crypto/openssl/test/
H A Dfake_rsaprov.c341 const unsigned char *tbs, size_t tbslen) in fake_rsa_sig_sign() argument
487 size_t tbslen) in fake_rsa_dgstsgn() argument
489 if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) in fake_rsa_dgstsgn()

12