/openssl/doc/man3/ |
H A D | DSA_sign.pod | 29 DSA_sign() computes a digital signature on the B<len> byte message 31 encoding at B<sigret>. The length of the signature is places in 38 cause overhead, and does not affect the actual signature 41 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen> 55 DSA_verify() returns 1 for a valid signature, 0 for an incorrect 56 signature and -1 on error. The error codes can be obtained by
|
H A D | EVP_PKEY_verify.pod | 6 - signature verification using a public key algorithm 30 using I<ctx>. The signature is specified using the I<sig> and 47 EVP_PKEY_verify() only indicates that the signature did not verify 48 successfully (that is tbs did not match the original data or the signature was 51 A negative value indicates an error other that signature verification failure. 57 Verify signature using PKCS#1 and SHA256 digest:
|
H A D | X509_STORE_CTX_get_error.pod | 123 unable to decrypt certificate's signature> 130 unable to decrypt CRL's signature> 132 The CRL signature could not be decrypted: this means that the actual signature 144 The signature of the certificate is invalid. 148 The signature of the CRL is invalid. 297 key usage does not include digital signature> 411 CA signature digest algorithm too weak. 443 unsupported signature algorithm> 445 Cannot find certificate signature algorithm. 454 cert info signature and signature algorithm mismatch> [all …]
|
H A D | RSA_sign.pod | 29 stores the signature in B<sigret> and the signature size in B<siglen>. 39 an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding 42 RSA_verify() verifies that the signature B<sigbuf> of size B<siglen> 44 the message digest algorithm that was used to generate the signature.
|
H A D | SSL_check_chain.pod | 31 B<CERT_PKEY_EE_SIGNATURE>: the signature algorithm of the EE certificate is 34 B<CERT_PKEY_CA_SIGNATURE>: the signature algorithms of all CA certificates 43 can be used explicitly for signing (i.e. it is mentioned in the signature 66 usable. An application supporting multiple chains with different CA signature 72 signature algorithm, supported curves and in the case of client authentication 75 Since the supported signature algorithms extension is only used in TLS 1.2,
|
H A D | RSA_private_encrypt.pod | 5 RSA_private_encrypt, RSA_public_decrypt - low-level signature operations 32 B<rsa> and stores the signature in B<to>. B<to> must point to 48 Raw RSA signature. This mode should I<only> be used to implement 55 bytes long signature at B<from> using the signer's public key 62 RSA_private_encrypt() returns the size of the signature (i.e.,
|
H A D | DSA_size.pod | 5 DSA_size, DSA_bits, DSA_security_bits - get DSA signature size, key bits or security bits 30 DSA_size() returns the maximum size of an ASN.1 encoded DSA signature 32 be allocated for a DSA signature. 45 DSA_size() returns the signature size in bytes, or -1 if I<dsa> doesn't
|
H A D | EVP_PKEY_get_default_digest_nid.pod | 6 - get default signature digest 19 name for the public key signature operations associated with key 25 digest NID for the public key signature operations associated with key 26 I<pkey>. Note that some signature algorithms (i.e. Ed25519 and Ed448)
|
H A D | EVP_PKEY_digestsign_supports_digest.pod | 5 EVP_PKEY_digestsign_supports_digest - indicate support for signature digest 16 digest I<name> is supported for public key signature operations associated with 23 digest algorithm identified by I<name> can be used for public key signature
|
H A D | EVP_DigestSignInit.pod | 27 The EVP signature routines are a high-level interface to digital signatures. 32 used is passed to the provider of the signature algorithm in use. How that 120 signature context I<ctx>. This function can be called several times on the 124 and places the signature in I<sig>. 128 call is successful the signature is written to I<sig> and the amount of data 134 bytes and places the signature in a buffer I<sig> of size I<siglen>. 135 If I<sig> is NULL, the maximum necessary size of the signature buffer is written 181 EVP_DigestSign() can not be called again, once a signature is generated (by 190 signature operations may have a signature length which depends on the 192 which indicates the maximum possible signature for any set of parameters.
|
H A D | EVP_DigestVerifyInit.pod | 6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions 26 The EVP signature routines are a high-level interface to digital signatures. 27 Input data is digested first before the signature verification takes place. 31 be used is passed to the provider of the signature algorithm in use. How that 108 supplied the ENGINE B<e> will be used for the signature verification and digest 115 EVP_DigestVerifyFinal() verifies the data in B<ctx> against the signature in 118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature 127 value indicates failure. A return value of zero indicates that the signature 129 the signature had an invalid form), while other values indicate a more serious 130 error (and sometimes also indicate an invalid signature form).
|
H A D | X509_sign.pod | 9 sign certificate, certificate request, or CRL signature 32 digest I<md> and sets the signature in I<x>. X509_sign_ctx() also signs 53 signature and signing will always update the encoding. 57 All functions return the size of the signature
|
H A D | SSL_get_peer_signature_nid.pod | 23 SSL_get_peer_signature_type_nid() sets B<*psigtype_nid> to the signature 24 type used by the peer to sign TLS messages. Currently the signature type 36 possible reasons for failure: the cipher suite has no signature (e.g. it
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-RSA.pod | 6 - The EVP_PKEY RSA signature implementation 15 The following signature parameters can be set using EVP_PKEY_CTX_set_params(). 25 These common parameters are described in L<provider-signature(7)>. 80 The following signature parameters can be retrieved using 87 This common parameter is described in L<provider-signature(7)>. 106 L<provider-signature(7)>,
|
H A D | EVP_PKEY-SM2.pod | 6 - EVP_PKEY keytype support for the Chinese SM2 signature and encryption algorithms 13 both signature and encryption schemes via the EVP interface. 15 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier 42 as such the B<OSSL_PKEY_PARAM_PUB_KEY> option must be set on any key used in signature 45 Before computing an B<SM2> signature, an B<EVP_PKEY_CTX> needs to be created, 67 a message with the SM2 signature algorithm and the SM3 hash algorithm:
|
H A D | EVP_SIGNATURE-HMAC.pod | 7 - The legacy B<EVP_PKEY> MAC signature implementations 17 The same signature parameters can be set using EVP_PKEY_CTX_set_params() as can 38 L<provider-signature(7)>,
|
H A D | EVP_SIGNATURE-ED25519.pod | 15 signature scheme described in RFC 8032. It has associated private and 74 The following signature parameters can be retrieved using 87 The parameters are described in L<provider-signature(7)>. 92 other signature algorithms using, for example, EVP_DigestUpdate(). 140 /* Calculate the required size for the signature by passing a NULL buffer. */ 153 L<provider-signature(7)>,
|
/openssl/crypto/x509/ |
H A D | x_all.c | 35 if (X509_ALGOR_cmp(&a->sig_alg, &a->cert_info.signature) != 0) in X509_verify() 39 &a->signature, &a->cert_info, in X509_verify() 63 if (X509_ALGOR_cmp(&a->sig_alg, &a->acinfo->signature) != 0) in X509_ACERT_verify() 67 &a->signature, a->acinfo, in X509_ACERT_verify() 74 &a->sig_algor, a->signature, a->spkac, r); in NETSCAPE_SPKI_verify() 111 &x->cert_info.signature, in X509_sign_ctx() 147 x->signature, &x->req_info, NULL, in X509_REQ_sign() 171 &x->sig_alg, &x->signature, &x->crl, NULL, in X509_CRL_sign() 196 &x->acinfo->signature, in X509_ACERT_sign() 197 &x->signature, x->acinfo, NULL, in X509_ACERT_sign() [all …]
|
H A D | x509_req.c | 284 *psig = req->signature; in X509_REQ_get0_signature() 291 if (req->signature) in X509_REQ_set0_signature() 292 ASN1_BIT_STRING_free(req->signature); in X509_REQ_set0_signature() 293 req->signature = psig; in X509_REQ_set0_signature()
|
/openssl/demos/ |
H A D | README.txt | 71 signature: 72 EVP_EC_Signature_demo.c Compute and verify an EC signature. 73 EVP_DSA_Signature_demo.c Compute and verify a DSA signature. 74 EVP_ED_Signature_demo.c Compute and verify an ED25519 signature. 75 rsa_pss_direct.c Compute and verify an RSA-PSS signature from a hash 76 rsa_pss_hash.c Compute and verify an RSA-PSS signature over a buffer
|
/openssl/doc/ |
H A D | fingerprints.txt | 7 The signature is a detached cleartxt signature, with the same name 9 1.0.1h can be found in openssl-1.0.1h.tar.gz with the signature
|
/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 359 EVP_SIGNATURE_free(ctx->op.sig.signature); in evp_pkey_ctx_free_old_ops() 361 ctx->op.sig.signature = NULL; in evp_pkey_ctx_free_old_ops() 500 if (pctx->op.sig.signature != NULL) { in EVP_PKEY_CTX_dup() 501 rctx->op.sig.signature = pctx->op.sig.signature; in EVP_PKEY_CTX_dup() 509 if (pctx->op.sig.signature->dupctx != NULL) in EVP_PKEY_CTX_dup() 515 rctx->op.sig.signature = NULL; in EVP_PKEY_CTX_dup() 674 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_set_params() 718 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_get_params() 758 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_gettable_params() 795 && ctx->op.sig.signature != NULL in EVP_PKEY_CTX_settable_params() [all …]
|
/openssl/include/crypto/ |
H A D | x509_acert.h | 57 X509_ALGOR signature; member 68 ASN1_BIT_STRING signature; member
|
/openssl/crypto/asn1/ |
H A D | t_spki.c | 46 n = spki->signature->length; in NETSCAPE_SPKI_print() 47 s = (char *)spki->signature->data; in NETSCAPE_SPKI_print()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 110 # MD5/SHA-1 combination, wrong signature digest length 129 # MD5/SHA-1 combination, wrong input and signature digest length 136 # DigestInfo-wrapped MDC-2 signature 149 # Signing with MDC-2 uses an OCTET STRING of the input to produce a signature 156 # Legacy OCTET STRING MDC-2 signature 169 # Legacy OCTET STRING MDC-2 signature, digest mismatch 177 # Legacy OCTET STRING MDC-2 signature, wrong input digest length 185 # Legacy OCTET STRING MDC-2 signature, wrong signature digest length 200 # Legacy OCTET STRING MDC-2 signature, wrong input and signature digest length
|