Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 569) sorted by relevance

12345678910>>...23

/freebsd/crypto/openssl/crypto/evp/
H A Dsignature.c25 if (signature == NULL) { in evp_signature_new()
36 signature->prov = prov; in evp_signature_new()
38 signature->refcnt = 1; in evp_signature_new()
40 return signature; in evp_signature_new()
274 return signature; in evp_signature_from_algorithm()
286 CRYPTO_DOWN_REF(&signature->refcnt, &i, signature->lock); in EVP_SIGNATURE_free()
299 CRYPTO_UP_REF(&signature->refcnt, &ref, signature->lock); in EVP_SIGNATURE_up_ref()
331 && evp_is_a(signature->prov, signature->name_id, NULL, name); in EVP_SIGNATURE_is_a()
471 signature = in evp_pkey_signature_init()
478 signature = in evp_pkey_signature_init()
[all …]
H A Dm_sigver.c46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local
85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init()
148 EVP_SIGNATURE_free(signature); in do_sigver_init()
155 if (signature != NULL) in do_sigver_init()
160 signature = in do_sigver_init()
163 if (signature == NULL) in do_sigver_init()
167 if (signature == NULL) in do_sigver_init()
192 EVP_SIGNATURE_free(signature); in do_sigver_init()
202 locpctx->op.sig.signature = signature; in do_sigver_init()
206 = signature->newctx(ossl_provider_ctx(signature->prov), props); in do_sigver_init()
[all …]
/freebsd/crypto/openssl/crypto/asn1/
H A Da_verify.c27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument
46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify()
75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify()
76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify()
90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument
97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument
105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex()
113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument
129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx()
145 ret = pkey->ameth->item_verify(ctx, it, data, alg, signature, pkey); in ASN1_item_verify_ctx()
[all …]
H A Da_sign.c99 OPENSSL_free(signature->data); in ASN1_sign()
100 signature->data = buf_out; in ASN1_sign()
102 signature->length = outl; in ASN1_sign()
107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign()
108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign()
217 outl = signature->length; in ASN1_item_sign_ctx()
287 OPENSSL_free(signature->data); in ASN1_item_sign_ctx()
288 signature->data = buf_out; in ASN1_item_sign_ctx()
290 signature->length = outl; in ASN1_item_sign_ctx()
295 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_item_sign_ctx()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SIGNATURE.pod21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
27 void (*fn)(EVP_SIGNATURE *signature,
30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
69 implementation for the given I<signature>. Note that the I<signature> may have
72 by the I<signature> object and should not be freed by the caller.
79 discretion of the I<signature> implementation.
[all …]
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
40 signature algorithms related to client authentication, otherwise they are
44 All these functions are implemented as macros. The signature algorithm
50 If an application wishes to allow the setting of signature algorithms
55 signature algorithm in the client hello message.
57 The supported signature algorithms set by a server are not sent to the
58 client but are used to determine the set of shared signature algorithms
62 The client authentication signature algorithms set by a server are sent
[all …]
H A DASN1_item_sign.pod14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
20 ASN1_BIT_STRING *signature, const void *data,
51 written before the signature is generated.
57 The generated signature is set into I<signature>.
68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal
89 All verify functions return 1 if the signature is valid and 0 if the signature
96 in an EVP_MD_CTX. The signature is written to MyObject.signature. The object is
112 * output signature.
118 ASN1_BIT_STRING *signature;
136 ASN1_SIMPLE(MyObject, signature, ASN1_BIT_STRING)
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
21 SSL_get_shared_sigalgs() returns information about the shared signature
23 of the shared signature algorithm to return starting from zero. The signature
25 sign and hash NID to B<*psignhash>. The raw signature and hash values
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
45 signature algorithm it can just set B<idx> to zero.
50 signature algorithms can be determined: which can be zero.
61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
69 If a signature algorithm is not recognised the corresponding NIDs
[all …]
H A DECDSA_sign.pod7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm
49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
50 created with the private EC key I<eckey>. To obtain the actual signature
69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
93 ECDSA_size() returns the maximum length signature or 0 on error.
102 signature, 0 for an invalid signature and -1 on error.
107 Creating an ECDSA signature of a given SHA-256 hash value using the
124 Second step: compute the ECDSA signature of a SHA-256 hash value
142 Third step: verify the created ECDSA signature using ECDSA_do_verify():
153 /* signature ok */
[all …]
H A DX509_get0_signature.pod8 X509_get_signature_info, X509_SIG_INFO_get, X509_SIG_INFO_set - signature information
42 X509_get0_signature() sets B<*psig> to the signature of B<x> and B<*palg>
43 to the signature algorithm of B<x>. The values returned are internal
49 X509_get0_tbs_sigalg() returns the signature algorithm in the signed
52 X509_get_signature_nid() returns the NID corresponding to the signature
59 X509_get_signature_info() retrieves information about the signature of
66 about a signature in an B<X509_SIG_INFO> structure. They are only
68 signature information: most applications will never need to call
74 where an application wishes to analyse or generate a signature in a form
80 cases the actual security of the signature is less because the signing
[all …]
/freebsd/usr.sbin/cpucontrol/
H A Damd.c82 uint32_t signature; in amd_update() local
104 signature = idargs.data[0]; in amd_update()
107 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, in amd_update()
108 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in amd_update()
109 (signature >> 16) & 0x0f); in amd_update()
137 if (signature == fw_header->signature) { in amd_update()
H A Dvia.c86 uint32_t signature; in via_update() local
112 signature = idargs.data[0]; in via_update()
130 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, in via_update()
131 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); in via_update()
139 if (fw_header->signature != VIA_HEADER_SIGNATURE || in via_update()
169 if (signature != fw_header->cpu_signature) in via_update()
H A Damd10h.c55 uint32_t signature; in amd10h_probe() local
77 signature = idargs.data[0]; in amd10h_probe()
78 family = ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff); in amd10h_probe()
97 uint32_t signature; in amd10h_update() local
116 signature = idargs.data[0]; in amd10h_update()
126 selected_fw = ucode_amd_find(path, signature, revision, fw_image, in amd10h_update()
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
150 set of "signature" functions, i.e. at least one of:
284 the signature should be written to I<*siglen>.
293 length of the signature should be written to I<*siglen>.
336 given provider side signature context I<ctx> to I<params>.
358 signature functions.
364 signature algorithm and digest algorithm for the signature operation.
369 calculated signature is invalid.
371 signature operation succeeds.
372 By default it retries until a signature is calculated.
[all …]
H A DEVP_SIGNATURE-DSA.pod6 - The B<EVP_PKEY> DSA signature implementation
15 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
25 The settable parameters are described in L<provider-signature(7)>.
29 The following signature parameters can be retrieved using
38 The gettable parameters are described in L<provider-signature(7)>.
47 L<provider-signature(7)>,
H A DEVP_SIGNATURE-ECDSA.pod5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation.
14 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
24 These parameters are described in L<provider-signature(7)>.
28 The following signature parameters can be retrieved using
37 The parameters are described in L<provider-signature(7)>.
46 L<provider-signature(7)>,
/freebsd/sys/x86/x86/
H A Ducode_subr.c97 ucode_amd_find(const char *path, uint32_t signature, uint32_t revision, in ucode_amd_find() argument
111 ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff), in ucode_amd_find()
112 (signature >> 4) & 0x0f, in ucode_amd_find()
113 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in ucode_amd_find()
114 (signature >> 16) & 0x0f); in ucode_amd_find()
165 signature, i, equiv_cpu_table[i].installed_cpu, in ucode_amd_find()
167 if (signature == equiv_cpu_table[i].installed_cpu) { in ucode_amd_find()
170 " equiv_cpu_table[%d] %8x", equiv_id, signature, in ucode_amd_find()
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Deddsa.c160 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign()
251 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES); in ossl_c448_ed448_sign()
252 memcpy(signature, nonce_point, sizeof(nonce_point)); in ossl_c448_ed448_sign()
253 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign()
269 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign_prehash()
282 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify()
309 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify()
311 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify()
353 &signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_verify()
366 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify_prehash()
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig15 The header MUST be present at the start of every signature.
16 Files containing the signature MUST start with the header.
18 signature.
43 string signature
46 public key used to make the signature using the usual SSH
54 interpretation domain for the signature, e.g. file signing.
60 (e.g. tags) into the signature. Implementations should ignore
69 The signature itself is made using the SSH signature algorithm and
76 armored signature.
79 3. Signed Data, of which the signature goes into the blob above
[all …]
H A DPROTOCOL.u2f12 type as both the inputs to the signature operation and the resultant
13 signature differ from those specified for SSH. For similar reasons,
113 string signature key
114 string signature
131 string signature key
132 string signature
159 string enrollment signature
169 string enrollment signature
215 For Ed25519 keys the signature is encoded as:
218 string signature
[all …]
/freebsd/crypto/openssl/test/
H A Ddsa_no_digest_size_test.c139 unsigned char *signature = NULL; in sign_and_verify() local
168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) in sign_and_verify()
171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { in sign_and_verify()
181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify()
187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify()
193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify()
198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify()
208 OPENSSL_free(signature); in sign_and_verify()
/freebsd/sys/contrib/openzfs/scripts/
H A Dcommitcheck.sh10 …body=$(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -Ev "http(s)*://" | grep -E -m 1…
23 foundline=$(git log --no-show-signature -n 1 "$REF" | grep -E -m 1 "$regex")
38 long_subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '.{73}')
60 …subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '^Fix coverity defect…
73 subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" |
89 for line in $(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -E '^CID'); do
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm33 $self->{signature} = "";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
/freebsd/crypto/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
/freebsd/crypto/openssl/crypto/ocsp/
H A Docsp_local.h54 ASN1_BIT_STRING *signature; member
194 ASN1_BIT_STRING *signature; member
223 (o)->optionalSignature->signature, &(o)->tbsRequest,\
229 (o)->signature, &(o)->tbsResponseData,\
235 (o)->signature, &(o)->tbsResponseData, ctx)
240 (a)->optionalSignature->signature, &(a)->tbsRequest,\
245 &(a)->signatureAlgorithm, (a)->signature,\

12345678910>>...23