/openssl/crypto/asn1/ |
H A D | x_long.c | 89 unsigned long utmp, sign; in long_i2c() local 101 sign = 0xff; in long_i2c() 104 sign = 0; in long_i2c() 133 unsigned long utmp = 0, sign = 0x100; in long_c2i() local 145 sign = 0xff; in long_c2i() 150 sign = 0; in long_c2i() 159 if (sign == 0x100) { in long_c2i() 162 sign = 0xff; in long_c2i() 164 sign = 0; in long_c2i() 172 utmp |= cont[i] ^ sign; in long_c2i() [all …]
|
/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 46 if (p7->d.sign == NULL || p7->d.sign->contents->d.ptr == NULL) in PKCS7_ctrl() 90 PKCS7_free(p7->d.sign->contents); in PKCS7_set_content() 91 p7->d.sign->contents = p7_data; in PKCS7_set_content() 125 PKCS7_SIGNED_free(p7->d.sign); in PKCS7_set_type() 126 p7->d.sign = NULL; in PKCS7_set_type() 199 signer_sk = p7->d.sign->signer_info; in PKCS7_add_signer() 200 md_sk = p7->d.sign->md_algs; in PKCS7_add_signer() 259 sk = &(p7->d.sign->cert); in PKCS7_add_certificate() 280 sk = &(p7->d.sign->crl); in PKCS7_add_crl() 419 return p7->d.sign->cert; in STACK_OF() [all …]
|
/openssl/crypto/ec/ |
H A D | ecp_nistp521.c | 1038 out[1] -= (1 & sign); in felem_contract() 1041 out[2] -= (1 & sign); in felem_contract() 1044 out[3] -= (1 & sign); in felem_contract() 1047 out[4] -= (1 & sign); in felem_contract() 1050 out[5] -= (1 & sign); in felem_contract() 1053 out[6] -= (1 & sign); in felem_contract() 1056 out[7] -= (1 & sign); in felem_contract() 1059 out[8] -= (1 & sign); in felem_contract() 1062 out[6] -= (1 & sign); in felem_contract() 1065 out[7] -= (1 & sign); in felem_contract() [all …]
|
H A D | ecdsa_sign.c | 45 if (eckey->meth->sign != NULL) in ECDSA_sign_ex() 46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
H A D | ecp_nistputil.c | 213 void ossl_ec_GFp_nistp_recode_scalar_bits(unsigned char *sign, in ossl_ec_GFp_nistp_recode_scalar_bits() argument 224 *sign = s & 1; in ossl_ec_GFp_nistp_recode_scalar_bits()
|
H A D | ec_kmeth.c | 234 int (*sign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_set_sign() 247 meth->sign = sign; in EC_KEY_METHOD_set_sign() 323 *psign = meth->sign; in EC_KEY_METHOD_get_sign()
|
/openssl/crypto/bn/ |
H A D | bn_gcd.c | 27 int sign; in bn_mod_inverse_no_branch() local 73 sign = -1; in bn_mod_inverse_no_branch() 150 sign = -sign; in bn_mod_inverse_no_branch() 161 if (sign < 0) { in bn_mod_inverse_no_branch() 203 int sign; in int_bn_mod_inverse() local 251 sign = -1; in int_bn_mod_inverse() 474 sign = -sign; in int_bn_mod_inverse() 486 if (sign < 0) { in int_bn_mod_inverse()
|
H A D | bn_intern.c | 26 int sign = 1; in bn_compute_wNAF() local 51 sign = -1; in bn_compute_wNAF() 118 r[j++] = sign * digit; in bn_compute_wNAF()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 12 # and continue until a blank line. Lines starting with a pound sign are ignored. 255 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 262 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 268 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 274 # Test sign with a 2048 bit SHA3 is allowed in fips mode 294 # Test sign with a 1024 bit key is not allowed in fips mode 302 # Test sign with SHA1 is not allowed in fips mode 310 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode 318 # Test sign with a 4096 bit key is not allowed in fips mode
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 25 [B<-sign>] 64 the B<-digest> option. This option can only be used with B<-sign> and 122 =item B<-sign> 225 The RSA algorithm generally supports the encrypt, decrypt, sign, 249 For B<pss> mode only sign and verify are supported and the digest type must be 275 supports the sign and verify operations with PSS padding. The following 307 The EC algorithm supports sign, verify and derive operations. The sign and 330 The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For 331 the sign and verify operations, SM2 requires an Distinguishing ID string to 355 openssl pkeyutl -sign -in file -inkey key.pem -out sig [all …]
|
H A D | openssl-dgst.pod.in | 22 [B<-sign> I<filename>|I<uri>] 115 =item B<-sign> I<filename>|I<uri> 117 Digitally sign the digest using the given private key. Note this option 123 The format of the key to sign with; unspecified by default. 128 Pass options to the signature algorithm during sign or verify operations. 226 To sign a file using SHA-256 with binary file output: 228 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt 230 openssl sha256 -sign privatekey.pem -out signature.sign file.txt 235 -signature signature.sign \
|
H A D | CA.pl.pod | 19 B<-sign> | 101 B<-sign> option. The PKCS#12 file can be imported directly into a browser. 107 =item B<-sign>, B<-signcert>, B<-xsign> 109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the 116 This option is the same as the B<-sign> option except it uses the 123 This option is the same as B<-sign> except it expects a self signed certificate 163 Complete certificate creation example: create a CA, create a request, sign 168 CA.pl -sign
|
H A D | openssl-cms.pod.in | 23 [B<-sign>] 184 =item B<-sign> 203 similar to the B<-sign> operation. 462 When used with B<-sign>, 669 B<-sign> operation if the content is not detached. 769 The use of PSS with B<-sign>. 780 openssl cms -sign -in message.txt -text -out mail.msg \ 791 openssl cms -sign -in in.txt -text -out mail.msg \ 796 openssl cms -sign -in message.txt -text -out mail.msg \ 801 openssl cms -sign -in in.txt -text -signer mycert.pem \ [all …]
|
/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 35 =item digest sign 156 …sign sign sign sign sign sign sign sign … 158 sign 206 <th style="border:1px solid" align="center">digest<br>sign</th> 281 <td style="border:1px solid" align="center">digest<br>sign</td> 282 <td style="border:1px solid" align="center">digest<br>sign</td> 283 <td style="border:1px solid" align="center">digest<br>sign</td> 284 <td style="border:1px solid" align="center">digest<br>sign</td> 285 <td style="border:1px solid" align="center">digest<br>sign</td> 286 <td style="border:1px solid" align="center">digest<br>sign</td> [all …]
|
H A D | EVP_SIGNATURE-ED25519.pod | 14 one-shot digest sign and digest verify using PureEdDSA and B<Ed25519> or B<Ed448> 40 The message to sign or verify must be passed using the one-shot 46 Applications wishing to sign certificates (or other structures such as 67 To sign a message using a ED25519 or ED448 key:
|
/openssl/test/ |
H A D | run_tests.pl | 110 my $sign = $1; 115 if ($sign eq '-' && $initial_arg) { 121 ($sign eq '-' ? "removal" : "addition"), 125 if ($sign eq '-') {
|
H A D | acvp_test.c | 216 if (sign == NULL) in get_ecdsa_sig_rs_bytes() 218 r1 = ECDSA_SIG_get0_r(sign); in get_ecdsa_sig_rs_bytes() 219 s1 = ECDSA_SIG_get0_s(sign); in get_ecdsa_sig_rs_bytes() 243 ECDSA_SIG_free(sign); in get_ecdsa_sig_rs_bytes() 279 ECDSA_SIG *sign = NULL; in ecdsa_sigver_test() local 306 ECDSA_SIG_free(sign); in ecdsa_sigver_test() 559 if (sign == NULL) in get_dsa_sig_rs_bytes() 561 DSA_SIG_get0(sign, &r1, &s1); in get_dsa_sig_rs_bytes() 585 DSA_SIG_free(sign); in get_dsa_sig_rs_bytes() 620 DSA_SIG *sign = NULL; in dsa_sigver_test() local [all …]
|
/openssl/apps/ |
H A D | pkcs7.c | 157 if (p7->d.sign != NULL) { in pkcs7_main() 158 certs = p7->d.sign->cert; in pkcs7_main() 159 crls = p7->d.sign->crl; in pkcs7_main()
|
/openssl/doc/ |
H A D | fingerprints.txt | 4 the fingerprints of team members who are "authorized" to sign the 13 currently in use to sign OpenSSL distributions:
|
/openssl/doc/man3/ |
H A D | X509_sign.pod | 8 sign certificate, certificate request, or CRL signature 31 sign certificate requests and CRLs, respectively. 36 public key and digest are not suitable. It can be used to sign keys using
|
H A D | X509_check_ca.pod | 16 to sign other certificates). The certificate must be a complete certificate 31 used to sign other certificates.
|
/openssl/providers/common/ |
H A D | securitycheck.c | 150 int ossl_dsa_check_key(OSSL_LIB_CTX *ctx, const DSA *dsa, int sign) in ossl_dsa_check_key() argument 174 if (!sign && L < 2048) in ossl_dsa_check_key()
|
/openssl/demos/signature/ |
H A D | rsa_pss_hash.c | 33 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() function 178 if (sign(libctx, &sig, &sig_len) == 0) in main()
|
H A D | rsa_pss_direct.c | 38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) in sign() function 193 if (sign(libctx, &sig, &sig_len) == 0) in main()
|
/openssl/crypto/evp/ |
H A D | signature.c | 78 if (signature->sign != NULL) in evp_signature_from_algorithm() 80 signature->sign = OSSL_FUNC_signature_sign(fns); in evp_signature_from_algorithm() 575 || (operation == EVP_PKEY_OP_SIGN && ctx->pmeth->sign == NULL) in evp_pkey_signature_init() 649 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign() 655 if (ctx->pmeth == NULL || ctx->pmeth->sign == NULL) { in EVP_PKEY_sign() 661 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
|