Home
last modified time | relevance | path

Searched refs:signature (Results 201 – 224 of 224) sorted by relevance

123456789

/openssl/doc/man7/
H A Dlife_cycle-pkey.pod37 This state represents the PKEY when it is ready to perform a private key signature
59 This state represents the PKEY when it is ready to verify a public key signature.
63 This state represents the PKEY when it is ready to recover a public key signature data.
H A Dossl-guide-migration.pod289 Added CAdES-BES signature verification support.
293 Added CAdES-BES signature scheme and attributes support (RFC 5126) to CMS API.
2478 that where the signature algorithms extension is missing from a ClientHello
2481 OpenSSL will fallback to a default set of signature algorithms. This default
/openssl/test/
H A DREADME.ssltest.md104 signature type used by server or client when signing messages
/openssl/apps/
H A Dopenssl-vms.cnf367 [signature] # Signature-based protection for Insta CA
H A Dopenssl.cnf367 [signature] # Signature-based protection for Insta CA
H A Dlist.c59 IS_FETCHABLE(signature, EVP_SIGNATURE) in IS_FETCHABLE()
H A Dspeed.c1700 IS_FETCHABLE(signature, EVP_SIGNATURE) in IS_FETCHABLE() argument
/openssl/crypto/x509/
H A Dv3_purp.c376 if (OBJ_find_sigid_algs(OBJ_obj2nid(subject->cert_info.signature.algorithm), in check_sig_alg_match()
H A Dx509_vfy.c620 CB_FAIL_IF(X509_ALGOR_cmp(&x->sig_alg, &x->cert_info.signature) != 0, in check_extensions()
/openssl/doc/man3/
H A DOSSL_CMP_exec_certreq.pod139 with infoType C<signKeyPairTypes> to obtain the set of signature
H A Dd2i_X509.pod507 Represents an ECDSA signature.
H A DX509_STORE_CTX_new.pod191 following signature:
H A DEVP_DigestInit.pod448 B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms are no
/openssl/apps/lib/
H A Dapps.c3259 void corrupt_signature(const ASN1_STRING *signature) in corrupt_signature() argument
3261 unsigned char *s = signature->data; in corrupt_signature()
3263 s[signature->length - 1] ^= 0x1; in corrupt_signature()
/openssl/include/openssl/
H A Dasn1.h.in749 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
754 const ASN1_BIT_STRING *signature, const void *data,
H A Dssl.h.in558 /* CA signature algorithms OK */
2667 /* Supported signature algorithms sent to peer */
2669 /* Shared signature algorithm */
2671 /* Sanity check signature algorithm allowed */
2673 /* Used to get mask of supported public key signature algorithms */
H A Dx509_vfy.h.in349 /* Check self-signed CA signature */
/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in54 It also does not change the default list of supported signature algorithms.
403 In particular the supported signature algorithms is reduced to support only
H A Dopenssl-ts.pod.in85 signature on it. It also checks if the token contains the same hash
H A Dopenssl-s_client.pod.in655 Specifies the list of signature algorithms that are sent by the client.
/openssl/crypto/ec/
H A Dcurve25519.c5560 const uint8_t signature[64], const uint8_t public_key[32], in ossl_ed25519_verify()
5592 r = signature; in ossl_ed25519_verify()
5593 s = signature + 32; in ossl_ed25519_verify()
/openssl/external/perl/Text-Template-1.56/
H A DLICENSE267 <signature of Ty Coon>, 1 April 1989
/openssl/doc/
H A Dbuild.info5038 DEPEND[html/man7/provider-signature.html]=man7/provider-signature.pod
5039 GENERATE[html/man7/provider-signature.html]=man7/provider-signature.pod
5040 DEPEND[man/man7/provider-signature.7]=man7/provider-signature.pod
5041 GENERATE[man/man7/provider-signature.7]=man7/provider-signature.pod
5206 html/man7/provider-signature.html \
5353 man/man7/provider-signature.7 \
/openssl/providers/fips/
H A Dself_test_data.inc1635 /* Hash DRBG inputs for signature KATs */

Completed in 146 milliseconds

123456789