/openssl/doc/man3/ |
H A D | X509_get0_distinguishing_id.pod | 31 The SM2 signature algorithm requires a Distinguishing ID value when generating 32 and verifying a signature, but the Ddistinguishing ID may also find other uses. 38 or L<X509_REQ_verify(3)> have easy access to that identity for signature
|
H A D | RSA_sign_ASN1_OCTET_STRING.pod | 30 padding. It stores the signature in B<sigret> and the signature size 41 RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
|
H A D | EVP_PKEY_verify_recover.pod | 7 - recover signature using a public key algorithm 33 using I<ctx>. The signature is specified using the I<sig> and 42 Normally an application is only interested in whether a signature verification 47 signing operation. Only certain public key algorithms can recover a signature
|
H A D | OSSL_CMP_validate_msg.pod | 23 which must be signature-based or using password-based MAC (PBM). 28 In case of signature algorithm, the certificate to use for the signature check 40 signature check succeeds and the cert and its path can be verified
|
H A D | X509_digest.pod | 44 using the same hash algorithm as in its signature, if the digest 45 is an integral part of the certificate signature algorithm identifier. 47 SHA512 if the signature algorithm is ED25519,
|
H A D | EVP_SignInit.pod | 24 The EVP signature routines are a high-level interface to digital 32 signature context I<ctx>. This function can be called several times on the 36 I<pkey> and places the signature in I<sig>. The library context I<libctx> and 40 The number of bytes of data written (i.e. the length of the signature)
|
H A D | EVP_PKEY_ASN1_METHOD.pod | 242 The sig_print() method prints a signature in humanly readable text to 244 B<sigalg> contains the exact signature algorithm. 245 If the signature in B<sig> doesn't correspond to what this method 297 signature length back. 302 expected to continue with the default signature production. 322 signature length back. 327 expected to continue with the default signature production. 384 If B<ASN1_PKEY_SIGPARAM_NULL> is set, then the signature algorithm 436 The signature of the I<pub_decode> functional argument of
|
H A D | SSL_CONF_cmd.pod | 61 signature algorithm or elliptic curve to use for an incoming connection. 114 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3. 115 For clients this value is used directly for the supported signature 119 The B<algs> argument should be a colon separated list of signature 131 If this option is not set then all signature algorithms supported by all 134 Note: algorithms which specify a PKCS#1 v1.5 signature scheme (either by 140 This sets the supported signature algorithms associated with client 368 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3. 395 This sets the supported signature algorithms associated with client 512 determining which cipher suite, signature algorithm or elliptic curve [all …]
|
/openssl/test/recipes/ |
H A D | 70-test_sslsignature.t | 134 my $sig = $message->signature(); 141 $message->signature($sigbase.pack("C", $sigend));
|
/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf.in | 37 # The Ed448 signature algorithm will not be enabled. 50 # The client will not sent the Ed448 signature algorithm, so the server 51 # doesn't have a usable signature algorithm for the certificate.
|
/openssl/crypto/x509/ |
H A D | x509_acert.c | 56 ASN1_EMBED(X509_ACERT_INFO, signature, X509_ALGOR), 67 ASN1_EMBED(X509_ACERT, signature, ASN1_BIT_STRING), 131 *psig = &x->signature; in X509_ACERT_get0_signature() 172 return &x->acinfo->signature; in X509_ACERT_get0_info_sigalg()
|
H A D | x_x509.c | 21 ASN1_EMBED(X509_CINF, signature, X509_ALGOR), 135 ASN1_EMBED(X509, signature, ASN1_BIT_STRING) 297 *psig = &x->signature; in X509_get0_signature()
|
/openssl/include/crypto/ |
H A D | x509.h | 79 ASN1_BIT_STRING *signature; /* signature */ member 103 ASN1_BIT_STRING signature; /* CRL signature */ member 163 X509_ALGOR signature; member 177 ASN1_BIT_STRING signature; member
|
H A D | ecx.h | 106 const uint8_t signature[64], const uint8_t public_key[32], 123 const uint8_t signature[114], const uint8_t public_key[57],
|
/openssl/test/ |
H A D | ecdsatest.c | 84 ECDSA_SIG *signature = NULL; in x9_62_tests() local 132 || !TEST_ptr(signature = ECDSA_do_sign_ex(digest, dgst_len, in x9_62_tests() 135 || !TEST_int_eq(ECDSA_do_verify(digest, dgst_len, signature, key), 1)) in x9_62_tests() 139 ECDSA_SIG_get0(signature, &sig_r, &sig_s); in x9_62_tests() 151 ECDSA_SIG_free(signature); in x9_62_tests()
|
/openssl/crypto/crmf/ |
H A D | crmf_local.h | 256 ASN1_BIT_STRING *signature; member 274 OSSL_CRMF_POPOSIGNINGKEY *signature; /* 1 */ member
|
/openssl/doc/man1/ |
H A D | openssl-spkac.pod.in | 33 (SPKAC) files. It can print out their contents, verify the signature and 102 Verifies the digital signature on the supplied SPKAC. 116 Verify the signature of an SPKAC: 143 of private key. By checking the SPKAC signature and a random challenge
|
H A D | openssl-speed.pod.in | 20 [B<-signature-algorithms>] 106 =item B<-signature-algorithms> 108 Benchmark signature algorithms: key generation, signature, verification.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecdsa.txt | 66 # Invalid signature 73 # Garbage after signature 81 # BER signature 171 # The sign will get a mismatch error since the output signature changes on each run
|
/openssl/test/smime-eml/ |
H A D | SignedInvalidMappingFromanyPolicyTest7.eml | 5 Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary=… 15 Content-Type: application/pkcs7-signature; name="smime.p7s"
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 292 signature algorithm already exists (even if registered against a different 293 underlying signature or digest algorithm). For I<digest_name>, NULL or an 643 TLS signature algorithms that a provider can support. Each signature supported 645 signature algorithms. 649 to the list of signature algorithms that libssl already supports with 672 A name for the full (possibly composite hash-and-signature) signature 676 signature algorithm and a hash algorithm, which must be given with the 691 The name of the pure signature algorithm that is part of a composite 753 versions supported by the signature algorithm. The values equate to the 756 there is no defined minimum or maximum. A -1 indicates that the signature [all …]
|
/openssl/providers/implementations/ |
H A D | build.info | 1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
|
/openssl/crypto/evp/ |
H A D | digest.c | 356 || ctx->pctx->op.sig.signature == NULL)) { in evp_md_init_internal() 782 && pctx->op.sig.signature->set_ctx_md_params != NULL) in EVP_MD_CTX_set_params() 783 return pctx->op.sig.signature->set_ctx_md_params(pctx->op.sig.algctx, in EVP_MD_CTX_set_params() 817 && pctx->op.sig.signature->settable_ctx_md_params != NULL) in EVP_MD_CTX_settable_params() 818 return pctx->op.sig.signature->settable_ctx_md_params( in EVP_MD_CTX_settable_params() 838 && pctx->op.sig.signature->get_ctx_md_params != NULL) in EVP_MD_CTX_get_params() 839 return pctx->op.sig.signature->get_ctx_md_params(pctx->op.sig.algctx, in EVP_MD_CTX_get_params() 873 && pctx->op.sig.signature->gettable_ctx_md_params != NULL) in EVP_MD_CTX_gettable_params() 874 return pctx->op.sig.signature->gettable_ctx_md_params( in EVP_MD_CTX_gettable_params()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_asn.c | 17 ASN1_SIMPLE(OCSP_SIGNATURE, signature, ASN1_BIT_STRING), 116 ASN1_SIMPLE(OCSP_BASICRESP, signature, ASN1_BIT_STRING),
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | SIGNATURE | 9 It will check each file's integrity, as well as the signature's 28 SHA1 19cc343f8a85c6805bbeb02580487483a6283887 t/author-signature.t
|