Home
last modified time | relevance | path

Searched refs:signature (Results 126 – 150 of 224) sorted by relevance

123456789

/openssl/doc/man7/
H A DEVP_MD-MD5-SHA1.pod32 This parameter is set by libssl in order to calculate a signature hash for an
H A Dopenssl-threads.pod65 while another thread is using that object, such as verifying a signature.
69 For example, two threads can calculate a signature using two different
H A DRSA-PSS.pod22 the corresponding signature parameters are set to the restrictions:
H A Dprovider.pod45 The initialization function must have the following signature:
79 and has the following signature:
198 L<provider-signature(7)>.
/openssl/doc/man3/
H A DOSSL_CMP_CTX_new.pod284 Note that a signature-based POPO can only be produced if a private key
290 for signature-based message protection and Proof-of-Possession (POPO).
340 validating signature-based protection in received CMP messages.
474 used for signature-based peer authentication.
496 related to the private key used for signature-based CMP message protection.
499 When using signature-based protection of CMP request messages
518 for inclusion in the extraCerts field of signature-protected messages.
525 This key is used create signature-based protection (protectionAlg = MSG_SIG_ALG)
533 protection (rather than applying signature-based protection)
544 When signature-based protection is used the senderKID will be set to
[all …]
H A DOCSP_resp_find_status.pod86 OCSP_resp_get0_signature() returns the signature from I<bs>.
123 the signature of I<bs> and fails on error. Then the function already returns
161 OCSP_resp_get0_signature() returns the signature from I<bs>.
H A DDSA_SIG_new.pod6 DSA_SIG_new, DSA_SIG_free - allocate and free DSA signature objects
H A DSMIME_write_CMS.pod38 be read twice: once to compute the signature in CMS_sign() and once to output
H A DSMIME_write_PKCS7.pod39 the data must be read twice: once to compute the signature in PKCS7_sign()
H A DSSL_get0_peer_rpk.pod48 Raw public keys have no subject, issuer, validity dates nor digital signature
H A DPKCS7_verify.pod42 be SignedData. There must be at least one signature on the data and if
66 and the signature is checked.
H A DEVP_PKEY_CTX_set_params.pod48 L<provider-signature(7)/Signature parameters>
/openssl/crypto/x509/
H A Dx509cset.c132 *psig = &crl->signature; in X509_CRL_get0_signature()
H A Dx_crl.c329 ASN1_EMBED(X509_CRL, signature, ASN1_BIT_STRING)
403 &crl->sig_alg, &crl->signature, &crl->crl, NULL, in def_crl_verify()
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_dsa_sigalg.txt57 # Modified signature
78 # Garbage after signature
92 # BER signature
H A Devppkey_dsa.txt57 # Modified signature
78 # Garbage after signature
91 # BER signature
/openssl/crypto/evp/
H A Dbuild.info4 m_sigver.c pmeth_lib.c signature.c p_lib.c pmeth_gn.c exchange.c \
/openssl/doc/man1/
H A Dopenssl-cmp.pod.in385 Note that a signature-based POPO can only be produced if a private key
603 when validating signature-based protection of CMP response messages.
628 when validating server certificates (checking signature-based
663 signature-based protection of incoming CMP messages.
697 with a signature key."
820 When performing signature-based message protection,
823 and the signature is done with the corresponding key.
1363 openssl cmp -section insta,signature
1380 openssl cmp -section insta,kur,signature
1382 using signature-based protection.
[all …]
H A Dopenssl-x509.pod.in133 which implies self-signature.
172 Pass options to the signature algorithm during verify operations.
180 the new certificate or certificate request, resulting in a self-signature.
234 public key, signature algorithms, issuer and subject names, serial number
492 Pass options to the signature algorithm during sign operations.
498 Corrupt the signature before writing it; this can be useful
671 Don't print out the signature algorithm used.
691 Don't give a hexadecimal dump of the certificate signature.
H A Dopenssl-ocsp.pod.in244 Don't attempt to verify the OCSP response signature or the nonce
256 Don't check the signature on the OCSP response. Since this option
365 Pass options to the signature algorithm when signing OCSP responses.
374 Corrupt the response signature before writing it; this can be useful
426 Initially the OCSP responder certificate is located and the signature on
/openssl/providers/
H A Dfips.module.sources226 crypto/evp/signature.c
659 providers/implementations/signature/dsa_sig.c
660 providers/implementations/signature/ecdsa_sig.c
661 providers/implementations/signature/eddsa_sig.c
662 providers/implementations/signature/mac_legacy_sig.c
663 providers/implementations/signature/rsa_sig.c
/openssl/doc/designs/
H A Dpassing-algorithmidentifier-parameters.md9 only support getting full AlgorithmIdentifier (`X509_ALGOR`) from signature
60 - `doc/man7/provider-signature.pod`
/openssl/providers/common/der/
H A DEC.asn115 -- Arc for ECDSA signature OIDS
/openssl/doc/internal/man3/
H A Dossl_cmp_msg_protect.pod35 If signature-based message protection is used it adds first the CMP signer cert
/openssl/include/openssl/
H A Devp.h1880 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
1881 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
1882 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
1885 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
1886 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
1887 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
1889 void (*fn)(EVP_SIGNATURE *signature,
1892 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,

Completed in 70 milliseconds

123456789