Home
last modified time | relevance | path

Searched refs:signature (Results 26 – 50 of 215) sorted by relevance

123456789

/openssl/doc/man3/
H A DDSA_sign.pod29 DSA_sign() computes a digital signature on the B<len> byte message
31 encoding at B<sigret>. The length of the signature is places in
38 cause overhead, and does not affect the actual signature
41 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
55 DSA_verify() returns 1 for a valid signature, 0 for an incorrect
56 signature and -1 on error. The error codes can be obtained by
H A DEVP_PKEY_verify.pod6 - signature verification using a public key algorithm
30 using I<ctx>. The signature is specified using the I<sig> and
47 EVP_PKEY_verify() only indicates that the signature did not verify
48 successfully (that is tbs did not match the original data or the signature was
51 A negative value indicates an error other that signature verification failure.
57 Verify signature using PKCS#1 and SHA256 digest:
H A DX509_STORE_CTX_get_error.pod123 unable to decrypt certificate's signature>
130 unable to decrypt CRL's signature>
132 The CRL signature could not be decrypted: this means that the actual signature
144 The signature of the certificate is invalid.
148 The signature of the CRL is invalid.
297 key usage does not include digital signature>
411 CA signature digest algorithm too weak.
443 unsupported signature algorithm>
445 Cannot find certificate signature algorithm.
454 cert info signature and signature algorithm mismatch>
[all …]
H A DRSA_sign.pod29 stores the signature in B<sigret> and the signature size in B<siglen>.
39 an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
42 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
44 the message digest algorithm that was used to generate the signature.
H A DSSL_check_chain.pod31 B<CERT_PKEY_EE_SIGNATURE>: the signature algorithm of the EE certificate is
34 B<CERT_PKEY_CA_SIGNATURE>: the signature algorithms of all CA certificates
43 can be used explicitly for signing (i.e. it is mentioned in the signature
66 usable. An application supporting multiple chains with different CA signature
72 signature algorithm, supported curves and in the case of client authentication
75 Since the supported signature algorithms extension is only used in TLS 1.2,
H A DRSA_private_encrypt.pod5 RSA_private_encrypt, RSA_public_decrypt - low-level signature operations
32 B<rsa> and stores the signature in B<to>. B<to> must point to
48 Raw RSA signature. This mode should I<only> be used to implement
55 bytes long signature at B<from> using the signer's public key
62 RSA_private_encrypt() returns the size of the signature (i.e.,
H A DDSA_size.pod5 DSA_size, DSA_bits, DSA_security_bits - get DSA signature size, key bits or security bits
30 DSA_size() returns the maximum size of an ASN.1 encoded DSA signature
32 be allocated for a DSA signature.
45 DSA_size() returns the signature size in bytes, or -1 if I<dsa> doesn't
H A DEVP_PKEY_get_default_digest_nid.pod6 - get default signature digest
19 name for the public key signature operations associated with key
25 digest NID for the public key signature operations associated with key
26 I<pkey>. Note that some signature algorithms (i.e. Ed25519 and Ed448)
H A DEVP_PKEY_digestsign_supports_digest.pod5 EVP_PKEY_digestsign_supports_digest - indicate support for signature digest
16 digest I<name> is supported for public key signature operations associated with
23 digest algorithm identified by I<name> can be used for public key signature
H A DEVP_DigestSignInit.pod27 The EVP signature routines are a high-level interface to digital signatures.
32 used is passed to the provider of the signature algorithm in use. How that
120 signature context I<ctx>. This function can be called several times on the
124 and places the signature in I<sig>.
128 call is successful the signature is written to I<sig> and the amount of data
134 bytes and places the signature in a buffer I<sig> of size I<siglen>.
135 If I<sig> is NULL, the maximum necessary size of the signature buffer is written
181 EVP_DigestSign() can not be called again, once a signature is generated (by
190 signature operations may have a signature length which depends on the
192 which indicates the maximum possible signature for any set of parameters.
H A DEVP_DigestVerifyInit.pod6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions
26 The EVP signature routines are a high-level interface to digital signatures.
27 Input data is digested first before the signature verification takes place.
31 be used is passed to the provider of the signature algorithm in use. How that
108 supplied the ENGINE B<e> will be used for the signature verification and digest
115 EVP_DigestVerifyFinal() verifies the data in B<ctx> against the signature in
118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature
127 value indicates failure. A return value of zero indicates that the signature
129 the signature had an invalid form), while other values indicate a more serious
130 error (and sometimes also indicate an invalid signature form).
H A DX509_sign.pod9 sign certificate, certificate request, or CRL signature
32 digest I<md> and sets the signature in I<x>. X509_sign_ctx() also signs
53 signature and signing will always update the encoding.
57 All functions return the size of the signature
H A DSSL_get_peer_signature_nid.pod23 SSL_get_peer_signature_type_nid() sets B<*psigtype_nid> to the signature
24 type used by the peer to sign TLS messages. Currently the signature type
36 possible reasons for failure: the cipher suite has no signature (e.g. it
/openssl/doc/man7/
H A DEVP_SIGNATURE-RSA.pod6 - The EVP_PKEY RSA signature implementation
15 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
25 These common parameters are described in L<provider-signature(7)>.
80 The following signature parameters can be retrieved using
87 This common parameter is described in L<provider-signature(7)>.
106 L<provider-signature(7)>,
H A DEVP_PKEY-SM2.pod6 - EVP_PKEY keytype support for the Chinese SM2 signature and encryption algorithms
13 both signature and encryption schemes via the EVP interface.
15 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier
42 as such the B<OSSL_PKEY_PARAM_PUB_KEY> option must be set on any key used in signature
45 Before computing an B<SM2> signature, an B<EVP_PKEY_CTX> needs to be created,
67 a message with the SM2 signature algorithm and the SM3 hash algorithm:
H A DEVP_SIGNATURE-HMAC.pod7 - The legacy B<EVP_PKEY> MAC signature implementations
17 The same signature parameters can be set using EVP_PKEY_CTX_set_params() as can
38 L<provider-signature(7)>,
H A DEVP_SIGNATURE-ED25519.pod15 signature scheme described in RFC 8032. It has associated private and
74 The following signature parameters can be retrieved using
87 The parameters are described in L<provider-signature(7)>.
92 other signature algorithms using, for example, EVP_DigestUpdate().
140 /* Calculate the required size for the signature by passing a NULL buffer. */
153 L<provider-signature(7)>,
/openssl/crypto/x509/
H A Dx_all.c35 if (X509_ALGOR_cmp(&a->sig_alg, &a->cert_info.signature) != 0) in X509_verify()
39 &a->signature, &a->cert_info, in X509_verify()
63 if (X509_ALGOR_cmp(&a->sig_alg, &a->acinfo->signature) != 0) in X509_ACERT_verify()
67 &a->signature, a->acinfo, in X509_ACERT_verify()
74 &a->sig_algor, a->signature, a->spkac, r); in NETSCAPE_SPKI_verify()
111 &x->cert_info.signature, in X509_sign_ctx()
147 x->signature, &x->req_info, NULL, in X509_REQ_sign()
171 &x->sig_alg, &x->signature, &x->crl, NULL, in X509_CRL_sign()
196 &x->acinfo->signature, in X509_ACERT_sign()
197 &x->signature, x->acinfo, NULL, in X509_ACERT_sign()
[all …]
H A Dx509_req.c284 *psig = req->signature; in X509_REQ_get0_signature()
291 if (req->signature) in X509_REQ_set0_signature()
292 ASN1_BIT_STRING_free(req->signature); in X509_REQ_set0_signature()
293 req->signature = psig; in X509_REQ_set0_signature()
/openssl/demos/
H A DREADME.txt71 signature:
72 EVP_EC_Signature_demo.c Compute and verify an EC signature.
73 EVP_DSA_Signature_demo.c Compute and verify a DSA signature.
74 EVP_ED_Signature_demo.c Compute and verify an ED25519 signature.
75 rsa_pss_direct.c Compute and verify an RSA-PSS signature from a hash
76 rsa_pss_hash.c Compute and verify an RSA-PSS signature over a buffer
/openssl/doc/
H A Dfingerprints.txt7 The signature is a detached cleartxt signature, with the same name
9 1.0.1h can be found in openssl-1.0.1h.tar.gz with the signature
/openssl/crypto/evp/
H A Dpmeth_lib.c359 EVP_SIGNATURE_free(ctx->op.sig.signature); in evp_pkey_ctx_free_old_ops()
361 ctx->op.sig.signature = NULL; in evp_pkey_ctx_free_old_ops()
500 if (pctx->op.sig.signature != NULL) { in EVP_PKEY_CTX_dup()
501 rctx->op.sig.signature = pctx->op.sig.signature; in EVP_PKEY_CTX_dup()
509 if (pctx->op.sig.signature->dupctx != NULL) in EVP_PKEY_CTX_dup()
515 rctx->op.sig.signature = NULL; in EVP_PKEY_CTX_dup()
674 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_set_params()
718 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_get_params()
758 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_gettable_params()
795 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_settable_params()
[all …]
/openssl/include/crypto/
H A Dx509_acert.h57 X509_ALGOR signature; member
68 ASN1_BIT_STRING signature; member
/openssl/crypto/asn1/
H A Dt_spki.c46 n = spki->signature->length; in NETSCAPE_SPKI_print()
47 s = (char *)spki->signature->data; in NETSCAPE_SPKI_print()
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_rsa.txt110 # MD5/SHA-1 combination, wrong signature digest length
129 # MD5/SHA-1 combination, wrong input and signature digest length
136 # DigestInfo-wrapped MDC-2 signature
149 # Signing with MDC-2 uses an OCTET STRING of the input to produce a signature
156 # Legacy OCTET STRING MDC-2 signature
169 # Legacy OCTET STRING MDC-2 signature, digest mismatch
177 # Legacy OCTET STRING MDC-2 signature, wrong input digest length
185 # Legacy OCTET STRING MDC-2 signature, wrong signature digest length
200 # Legacy OCTET STRING MDC-2 signature, wrong input and signature digest length

Completed in 75 milliseconds

123456789