/freebsd/crypto/openssl/crypto/evp/ |
H A D | signature.c | 25 if (signature == NULL) { in evp_signature_new() 36 signature->prov = prov; in evp_signature_new() 38 signature->refcnt = 1; in evp_signature_new() 40 return signature; in evp_signature_new() 274 return signature; in evp_signature_from_algorithm() 286 CRYPTO_DOWN_REF(&signature->refcnt, &i, signature->lock); in EVP_SIGNATURE_free() 299 CRYPTO_UP_REF(&signature->refcnt, &ref, signature->lock); in EVP_SIGNATURE_up_ref() 331 && evp_is_a(signature->prov, signature->name_id, NULL, name); in EVP_SIGNATURE_is_a() 471 signature = in evp_pkey_signature_init() 478 signature = in evp_pkey_signature_init() [all …]
|
H A D | m_sigver.c | 46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 148 EVP_SIGNATURE_free(signature); in do_sigver_init() 155 if (signature != NULL) in do_sigver_init() 160 signature = in do_sigver_init() 163 if (signature == NULL) in do_sigver_init() 167 if (signature == NULL) in do_sigver_init() 192 EVP_SIGNATURE_free(signature); in do_sigver_init() 202 locpctx->op.sig.signature = signature; in do_sigver_init() 206 = signature->newctx(ossl_provider_ctx(signature->prov), props); in do_sigver_init() [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | a_verify.c | 27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument 46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify() 75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify() 76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify() 90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument 97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument 105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex() 113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument 129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx() 145 ret = pkey->ameth->item_verify(ctx, it, data, alg, signature, pkey); in ASN1_item_verify_ctx() [all …]
|
H A D | a_sign.c | 99 OPENSSL_free(signature->data); in ASN1_sign() 100 signature->data = buf_out; in ASN1_sign() 102 signature->length = outl; in ASN1_sign() 107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign() 108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign() 217 outl = signature->length; in ASN1_item_sign_ctx() 287 OPENSSL_free(signature->data); in ASN1_item_sign_ctx() 288 signature->data = buf_out; in ASN1_item_sign_ctx() 290 signature->length = outl; in ASN1_item_sign_ctx() 295 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_item_sign_ctx() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SIGNATURE.pod | 21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 27 void (*fn)(EVP_SIGNATURE *signature, 30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 69 implementation for the given I<signature>. Note that the I<signature> may have 72 by the I<signature> object and should not be freed by the caller. 79 discretion of the I<signature> implementation. [all …]
|
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 44 All these functions are implemented as macros. The signature algorithm 50 If an application wishes to allow the setting of signature algorithms 55 signature algorithm in the client hello message. 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms 62 The client authentication signature algorithms set by a server are sent [all …]
|
H A D | ASN1_item_sign.pod | 14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 20 ASN1_BIT_STRING *signature, const void *data, 51 written before the signature is generated. 57 The generated signature is set into I<signature>. 68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal 89 All verify functions return 1 if the signature is valid and 0 if the signature 96 in an EVP_MD_CTX. The signature is written to MyObject.signature. The object is 112 * output signature. 118 ASN1_BIT_STRING *signature; 136 ASN1_SIMPLE(MyObject, signature, ASN1_BIT_STRING) [all …]
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 21 SSL_get_shared_sigalgs() returns information about the shared signature 23 of the shared signature algorithm to return starting from zero. The signature 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 45 signature algorithm it can just set B<idx> to zero. 50 signature algorithms can be determined: which can be zero. 61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are 69 If a signature algorithm is not recognised the corresponding NIDs [all …]
|
H A D | ECDSA_sign.pod | 7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm 49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature 50 created with the private EC key I<eckey>. To obtain the actual signature 69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is 93 ECDSA_size() returns the maximum length signature or 0 on error. 102 signature, 0 for an invalid signature and -1 on error. 107 Creating an ECDSA signature of a given SHA-256 hash value using the 124 Second step: compute the ECDSA signature of a SHA-256 hash value 142 Third step: verify the created ECDSA signature using ECDSA_do_verify(): 153 /* signature ok */ [all …]
|
H A D | X509_get0_signature.pod | 8 X509_get_signature_info, X509_SIG_INFO_get, X509_SIG_INFO_set - signature information 42 X509_get0_signature() sets B<*psig> to the signature of B<x> and B<*palg> 43 to the signature algorithm of B<x>. The values returned are internal 49 X509_get0_tbs_sigalg() returns the signature algorithm in the signed 52 X509_get_signature_nid() returns the NID corresponding to the signature 59 X509_get_signature_info() retrieves information about the signature of 66 about a signature in an B<X509_SIG_INFO> structure. They are only 68 signature information: most applications will never need to call 74 where an application wishes to analyse or generate a signature in a form 80 cases the actual security of the signature is less because the signing [all …]
|
/freebsd/usr.sbin/cpucontrol/ |
H A D | amd.c | 82 uint32_t signature; in amd_update() local 104 signature = idargs.data[0]; in amd_update() 107 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, in amd_update() 108 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in amd_update() 109 (signature >> 16) & 0x0f); in amd_update() 137 if (signature == fw_header->signature) { in amd_update()
|
H A D | via.c | 86 uint32_t signature; in via_update() local 112 signature = idargs.data[0]; in via_update() 130 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, in via_update() 131 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); in via_update() 139 if (fw_header->signature != VIA_HEADER_SIGNATURE || in via_update() 169 if (signature != fw_header->cpu_signature) in via_update()
|
H A D | amd10h.c | 55 uint32_t signature; in amd10h_probe() local 77 signature = idargs.data[0]; in amd10h_probe() 78 family = ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff); in amd10h_probe() 97 uint32_t signature; in amd10h_update() local 116 signature = idargs.data[0]; in amd10h_update() 126 selected_fw = ucode_amd_find(path, signature, revision, fw_image, in amd10h_update()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 5 provider-signature - The signature library E<lt>-E<gt> provider functions 150 set of "signature" functions, i.e. at least one of: 284 the signature should be written to I<*siglen>. 293 length of the signature should be written to I<*siglen>. 336 given provider side signature context I<ctx> to I<params>. 358 signature functions. 364 signature algorithm and digest algorithm for the signature operation. 369 calculated signature is invalid. 371 signature operation succeeds. 372 By default it retries until a signature is calculated. [all …]
|
H A D | EVP_SIGNATURE-DSA.pod | 6 - The B<EVP_PKEY> DSA signature implementation 15 The following signature parameters can be set using EVP_PKEY_CTX_set_params(). 25 The settable parameters are described in L<provider-signature(7)>. 29 The following signature parameters can be retrieved using 38 The gettable parameters are described in L<provider-signature(7)>. 47 L<provider-signature(7)>,
|
H A D | EVP_SIGNATURE-ECDSA.pod | 5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation. 14 The following signature parameters can be set using EVP_PKEY_CTX_set_params(). 24 These parameters are described in L<provider-signature(7)>. 28 The following signature parameters can be retrieved using 37 The parameters are described in L<provider-signature(7)>. 46 L<provider-signature(7)>,
|
/freebsd/sys/x86/x86/ |
H A D | ucode_subr.c | 97 ucode_amd_find(const char *path, uint32_t signature, uint32_t revision, in ucode_amd_find() argument 111 ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff), in ucode_amd_find() 112 (signature >> 4) & 0x0f, in ucode_amd_find() 113 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in ucode_amd_find() 114 (signature >> 16) & 0x0f); in ucode_amd_find() 165 signature, i, equiv_cpu_table[i].installed_cpu, in ucode_amd_find() 167 if (signature == equiv_cpu_table[i].installed_cpu) { in ucode_amd_find() 170 " equiv_cpu_table[%d] %8x", equiv_id, signature, in ucode_amd_find()
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 160 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign() 251 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES); in ossl_c448_ed448_sign() 252 memcpy(signature, nonce_point, sizeof(nonce_point)); in ossl_c448_ed448_sign() 253 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign() 269 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign_prehash() 282 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify() 309 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify() 311 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify() 353 &signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_verify() 366 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify_prehash() [all …]
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 15 The header MUST be present at the start of every signature. 16 Files containing the signature MUST start with the header. 18 signature. 43 string signature 46 public key used to make the signature using the usual SSH 54 interpretation domain for the signature, e.g. file signing. 60 (e.g. tags) into the signature. Implementations should ignore 69 The signature itself is made using the SSH signature algorithm and 76 armored signature. 79 3. Signed Data, of which the signature goes into the blob above [all …]
|
H A D | PROTOCOL.u2f | 12 type as both the inputs to the signature operation and the resultant 13 signature differ from those specified for SSH. For similar reasons, 113 string signature key 114 string signature 131 string signature key 132 string signature 159 string enrollment signature 169 string enrollment signature 215 For Ed25519 keys the signature is encoded as: 218 string signature [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 139 unsigned char *signature = NULL; in sign_and_verify() local 168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) in sign_and_verify() 171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { in sign_and_verify() 181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify() 187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 208 OPENSSL_free(signature); in sign_and_verify()
|
/freebsd/sys/contrib/openzfs/scripts/ |
H A D | commitcheck.sh | 10 …body=$(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -Ev "http(s)*://" | grep -E -m 1… 23 foundline=$(git log --no-show-signature -n 1 "$REF" | grep -E -m 1 "$regex") 38 long_subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '.{73}') 60 …subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '^Fix coverity defect… 73 subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | 89 for line in $(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -E '^CID'); do
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 33 $self->{signature} = ""; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 54 ASN1_BIT_STRING *signature; member 194 ASN1_BIT_STRING *signature; member 223 (o)->optionalSignature->signature, &(o)->tbsRequest,\ 229 (o)->signature, &(o)->tbsResponseData,\ 235 (o)->signature, &(o)->tbsResponseData, ctx) 240 (a)->optionalSignature->signature, &(a)->tbsRequest,\ 245 &(a)->signatureAlgorithm, (a)->signature,\
|