Searched refs:signature (Results 201 – 224 of 224) sorted by relevance
123456789
/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 37 This state represents the PKEY when it is ready to perform a private key signature 59 This state represents the PKEY when it is ready to verify a public key signature. 63 This state represents the PKEY when it is ready to recover a public key signature data.
|
H A D | ossl-guide-migration.pod | 289 Added CAdES-BES signature verification support. 293 Added CAdES-BES signature scheme and attributes support (RFC 5126) to CMS API. 2478 that where the signature algorithms extension is missing from a ClientHello 2481 OpenSSL will fallback to a default set of signature algorithms. This default
|
/openssl/test/ |
H A D | README.ssltest.md | 104 signature type used by server or client when signing messages
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 367 [signature] # Signature-based protection for Insta CA
|
H A D | openssl.cnf | 367 [signature] # Signature-based protection for Insta CA
|
H A D | list.c | 59 IS_FETCHABLE(signature, EVP_SIGNATURE) in IS_FETCHABLE()
|
H A D | speed.c | 1700 IS_FETCHABLE(signature, EVP_SIGNATURE) in IS_FETCHABLE() argument
|
/openssl/crypto/x509/ |
H A D | v3_purp.c | 376 if (OBJ_find_sigid_algs(OBJ_obj2nid(subject->cert_info.signature.algorithm), in check_sig_alg_match()
|
H A D | x509_vfy.c | 620 CB_FAIL_IF(X509_ALGOR_cmp(&x->sig_alg, &x->cert_info.signature) != 0, in check_extensions()
|
/openssl/doc/man3/ |
H A D | OSSL_CMP_exec_certreq.pod | 139 with infoType C<signKeyPairTypes> to obtain the set of signature
|
H A D | d2i_X509.pod | 507 Represents an ECDSA signature.
|
H A D | X509_STORE_CTX_new.pod | 191 following signature:
|
H A D | EVP_DigestInit.pod | 448 B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms are no
|
/openssl/apps/lib/ |
H A D | apps.c | 3259 void corrupt_signature(const ASN1_STRING *signature) in corrupt_signature() argument 3261 unsigned char *s = signature->data; in corrupt_signature() 3263 s[signature->length - 1] ^= 0x1; in corrupt_signature()
|
/openssl/include/openssl/ |
H A D | asn1.h.in | 749 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 754 const ASN1_BIT_STRING *signature, const void *data,
|
H A D | ssl.h.in | 558 /* CA signature algorithms OK */ 2667 /* Supported signature algorithms sent to peer */ 2669 /* Shared signature algorithm */ 2671 /* Sanity check signature algorithm allowed */ 2673 /* Used to get mask of supported public key signature algorithms */
|
H A D | x509_vfy.h.in | 349 /* Check self-signed CA signature */
|
/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 54 It also does not change the default list of supported signature algorithms. 403 In particular the supported signature algorithms is reduced to support only
|
H A D | openssl-ts.pod.in | 85 signature on it. It also checks if the token contains the same hash
|
H A D | openssl-s_client.pod.in | 655 Specifies the list of signature algorithms that are sent by the client.
|
/openssl/crypto/ec/ |
H A D | curve25519.c | 5560 const uint8_t signature[64], const uint8_t public_key[32], in ossl_ed25519_verify() 5592 r = signature; in ossl_ed25519_verify() 5593 s = signature + 32; in ossl_ed25519_verify()
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | LICENSE | 267 <signature of Ty Coon>, 1 April 1989
|
/openssl/doc/ |
H A D | build.info | 5038 DEPEND[html/man7/provider-signature.html]=man7/provider-signature.pod 5039 GENERATE[html/man7/provider-signature.html]=man7/provider-signature.pod 5040 DEPEND[man/man7/provider-signature.7]=man7/provider-signature.pod 5041 GENERATE[man/man7/provider-signature.7]=man7/provider-signature.pod 5206 html/man7/provider-signature.html \ 5353 man/man7/provider-signature.7 \
|
/openssl/providers/fips/ |
H A D | self_test_data.inc | 1635 /* Hash DRBG inputs for signature KATs */
|
Completed in 146 milliseconds
123456789