Lines Matching defs:sigblock_len

726  * @param sigblock_len: length of sigblock data.
736 unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
762 sigblock_len == 1+2*SHA_DIGEST_LENGTH) {
763 if(!setup_dsa_sig(&sigblock, &sigblock_len)) {
778 if(!setup_ecdsa_sig(&sigblock, &sigblock_len)) {
819 res = EVP_VerifyFinal(ctx, sigblock, sigblock_len, evp_key);
828 res = EVP_DigestVerify(ctx, sigblock, sigblock_len,
1370 * @param sigblock_len: length of sigblock data.
1379 unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
1388 SECItem secsig = {siBuffer, sigblock, sigblock_len};
1406 if(sigblock_len == 1+2*SHA1_LENGTH) {
1756 unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1769 if(sigblock_len == 41) {
1778 if(asn1_der_iterator_first(&i, sigblock_len,
1845 unsigned int sigblock_len, uint8_t* key, unsigned int keylen)
1882 nettle_mpz_init_set_str_256_u(signature, sigblock_len, (uint8_t*)sigblock);
1925 unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1932 if (sigblock_len != 2*digest_size || keylen != 2*digest_size) {
1991 unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1995 if(sigblock_len != ED25519_SIGNATURE_SIZE) {
2018 * @param sigblock_len: length of sigblock data.
2027 unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
2032 if (sigblock_len == 0 || keylen == 0) {
2050 *reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
2076 sigblock_len, key, keylen);
2090 sigblock_len, key, keylen);
2098 *reason = _verify_nettle_ed25519(buf, sigblock, sigblock_len,