Home
last modified time | relevance | path

Searched refs:signature (Results 51 – 75 of 215) sorted by relevance

123456789

/openssl/doc/man3/
H A DX509_get0_distinguishing_id.pod31 The SM2 signature algorithm requires a Distinguishing ID value when generating
32 and verifying a signature, but the Ddistinguishing ID may also find other uses.
38 or L<X509_REQ_verify(3)> have easy access to that identity for signature
H A DRSA_sign_ASN1_OCTET_STRING.pod30 padding. It stores the signature in B<sigret> and the signature size
41 RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
H A DEVP_PKEY_verify_recover.pod7 - recover signature using a public key algorithm
33 using I<ctx>. The signature is specified using the I<sig> and
42 Normally an application is only interested in whether a signature verification
47 signing operation. Only certain public key algorithms can recover a signature
H A DOSSL_CMP_validate_msg.pod23 which must be signature-based or using password-based MAC (PBM).
28 In case of signature algorithm, the certificate to use for the signature check
40 signature check succeeds and the cert and its path can be verified
H A DX509_digest.pod44 using the same hash algorithm as in its signature, if the digest
45 is an integral part of the certificate signature algorithm identifier.
47 SHA512 if the signature algorithm is ED25519,
H A DEVP_SignInit.pod24 The EVP signature routines are a high-level interface to digital
32 signature context I<ctx>. This function can be called several times on the
36 I<pkey> and places the signature in I<sig>. The library context I<libctx> and
40 The number of bytes of data written (i.e. the length of the signature)
H A DEVP_PKEY_ASN1_METHOD.pod242 The sig_print() method prints a signature in humanly readable text to
244 B<sigalg> contains the exact signature algorithm.
245 If the signature in B<sig> doesn't correspond to what this method
297 signature length back.
302 expected to continue with the default signature production.
322 signature length back.
327 expected to continue with the default signature production.
384 If B<ASN1_PKEY_SIGPARAM_NULL> is set, then the signature algorithm
436 The signature of the I<pub_decode> functional argument of
H A DSSL_CONF_cmd.pod61 signature algorithm or elliptic curve to use for an incoming connection.
114 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3.
115 For clients this value is used directly for the supported signature
119 The B<algs> argument should be a colon separated list of signature
131 If this option is not set then all signature algorithms supported by all
134 Note: algorithms which specify a PKCS#1 v1.5 signature scheme (either by
140 This sets the supported signature algorithms associated with client
368 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3.
395 This sets the supported signature algorithms associated with client
512 determining which cipher suite, signature algorithm or elliptic curve
[all …]
/openssl/test/recipes/
H A D70-test_sslsignature.t134 my $sig = $message->signature();
141 $message->signature($sigbase.pack("C", $sigend));
/openssl/test/ssl-tests/
H A D28-seclevel.cnf.in37 # The Ed448 signature algorithm will not be enabled.
50 # The client will not sent the Ed448 signature algorithm, so the server
51 # doesn't have a usable signature algorithm for the certificate.
/openssl/crypto/x509/
H A Dx509_acert.c56 ASN1_EMBED(X509_ACERT_INFO, signature, X509_ALGOR),
67 ASN1_EMBED(X509_ACERT, signature, ASN1_BIT_STRING),
131 *psig = &x->signature; in X509_ACERT_get0_signature()
172 return &x->acinfo->signature; in X509_ACERT_get0_info_sigalg()
H A Dx_x509.c21 ASN1_EMBED(X509_CINF, signature, X509_ALGOR),
135 ASN1_EMBED(X509, signature, ASN1_BIT_STRING)
297 *psig = &x->signature; in X509_get0_signature()
/openssl/include/crypto/
H A Dx509.h79 ASN1_BIT_STRING *signature; /* signature */ member
103 ASN1_BIT_STRING signature; /* CRL signature */ member
163 X509_ALGOR signature; member
177 ASN1_BIT_STRING signature; member
H A Decx.h106 const uint8_t signature[64], const uint8_t public_key[32],
123 const uint8_t signature[114], const uint8_t public_key[57],
/openssl/test/
H A Decdsatest.c84 ECDSA_SIG *signature = NULL; in x9_62_tests() local
132 || !TEST_ptr(signature = ECDSA_do_sign_ex(digest, dgst_len, in x9_62_tests()
135 || !TEST_int_eq(ECDSA_do_verify(digest, dgst_len, signature, key), 1)) in x9_62_tests()
139 ECDSA_SIG_get0(signature, &sig_r, &sig_s); in x9_62_tests()
151 ECDSA_SIG_free(signature); in x9_62_tests()
/openssl/crypto/crmf/
H A Dcrmf_local.h256 ASN1_BIT_STRING *signature; member
274 OSSL_CRMF_POPOSIGNINGKEY *signature; /* 1 */ member
/openssl/doc/man1/
H A Dopenssl-spkac.pod.in33 (SPKAC) files. It can print out their contents, verify the signature and
102 Verifies the digital signature on the supplied SPKAC.
116 Verify the signature of an SPKAC:
143 of private key. By checking the SPKAC signature and a random challenge
H A Dopenssl-speed.pod.in20 [B<-signature-algorithms>]
106 =item B<-signature-algorithms>
108 Benchmark signature algorithms: key generation, signature, verification.
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa.txt66 # Invalid signature
73 # Garbage after signature
81 # BER signature
171 # The sign will get a mismatch error since the output signature changes on each run
/openssl/test/smime-eml/
H A DSignedInvalidMappingFromanyPolicyTest7.eml5 Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary=…
15 Content-Type: application/pkcs7-signature; name="smime.p7s"
/openssl/doc/man7/
H A Dprovider-base.pod292 signature algorithm already exists (even if registered against a different
293 underlying signature or digest algorithm). For I<digest_name>, NULL or an
643 TLS signature algorithms that a provider can support. Each signature supported
645 signature algorithms.
649 to the list of signature algorithms that libssl already supports with
672 A name for the full (possibly composite hash-and-signature) signature
676 signature algorithm and a hash algorithm, which must be given with the
691 The name of the pure signature algorithm that is part of a composite
753 versions supported by the signature algorithm. The values equate to the
756 there is no defined minimum or maximum. A -1 indicates that the signature
[all …]
/openssl/providers/implementations/
H A Dbuild.info1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
/openssl/crypto/evp/
H A Ddigest.c356 || ctx->pctx->op.sig.signature == NULL)) { in evp_md_init_internal()
782 && pctx->op.sig.signature->set_ctx_md_params != NULL) in EVP_MD_CTX_set_params()
783 return pctx->op.sig.signature->set_ctx_md_params(pctx->op.sig.algctx, in EVP_MD_CTX_set_params()
817 && pctx->op.sig.signature->settable_ctx_md_params != NULL) in EVP_MD_CTX_settable_params()
818 return pctx->op.sig.signature->settable_ctx_md_params( in EVP_MD_CTX_settable_params()
838 && pctx->op.sig.signature->get_ctx_md_params != NULL) in EVP_MD_CTX_get_params()
839 return pctx->op.sig.signature->get_ctx_md_params(pctx->op.sig.algctx, in EVP_MD_CTX_get_params()
873 && pctx->op.sig.signature->gettable_ctx_md_params != NULL) in EVP_MD_CTX_gettable_params()
874 return pctx->op.sig.signature->gettable_ctx_md_params( in EVP_MD_CTX_gettable_params()
/openssl/crypto/ocsp/
H A Docsp_asn.c17 ASN1_SIMPLE(OCSP_SIGNATURE, signature, ASN1_BIT_STRING),
116 ASN1_SIMPLE(OCSP_BASICRESP, signature, ASN1_BIT_STRING),
/openssl/external/perl/Text-Template-1.56/
H A DSIGNATURE9 It will check each file's integrity, as well as the signature's
28 SHA1 19cc343f8a85c6805bbeb02580487483a6283887 t/author-signature.t

Completed in 67 milliseconds

123456789