87897a8cea
This is the first structure to be implemented with the new BIGNUM ASN.1 routines. Object reuse in the legacy d2i/i2d functions is implemented by releasing whatever was in *out before and setting it to the newly-allocated object. As with the new d2i_SSL_SESSION, this is a weaker form of object reuse, but should suffice for reasonable callers. As ECDSA_SIG is more likely to be parsed alone than as part of another structure (and using CBB is slightly tedious), add convenient functions which take byte arrays. For consistency with SSL_SESSION, they are named to/from_bytes. from_bytes, unlike the CBS variant, rejects trailing data. Note this changes some test expectations: BER signatures now push an error code. That they didn't do this was probably a mistake. BUG=499653 Change-Id: I9ec74db53e70d9a989412cc9e2b599be0454caec Reviewed-on: https://boringssl-review.googlesource.com/5269 Reviewed-by: Adam Langley <agl@google.com>
19 lines
638 B
Plaintext
19 lines
638 B
Plaintext
ECDSA,function,106,ECDSA_SIG_from_bytes
|
|
ECDSA,function,107,ECDSA_SIG_marshal
|
|
ECDSA,function,108,ECDSA_SIG_parse
|
|
ECDSA,function,109,ECDSA_SIG_to_bytes
|
|
ECDSA,function,100,ECDSA_do_sign_ex
|
|
ECDSA,function,101,ECDSA_do_verify
|
|
ECDSA,function,102,ECDSA_sign_ex
|
|
ECDSA,function,110,ECDSA_verify
|
|
ECDSA,function,105,d2i_ECDSA_SIG
|
|
ECDSA,function,103,digest_to_bn
|
|
ECDSA,function,104,ecdsa_sign_setup
|
|
ECDSA,function,112,i2d_ECDSA_SIG
|
|
ECDSA,reason,100,BAD_SIGNATURE
|
|
ECDSA,reason,105,ENCODE_ERROR
|
|
ECDSA,reason,101,MISSING_PARAMETERS
|
|
ECDSA,reason,102,NEED_NEW_SETUP_VALUES
|
|
ECDSA,reason,103,NOT_IMPLEMENTED
|
|
ECDSA,reason,104,RANDOM_NUMBER_GENERATION_FAILED
|