Home
last modified time | relevance | path

Searched refs:sign (Results 1 – 25 of 184) sorted by relevance

12345678

/openssl/crypto/asn1/
H A Dx_long.c89 unsigned long utmp, sign; in long_i2c() local
101 sign = 0xff; in long_i2c()
104 sign = 0; in long_i2c()
133 unsigned long utmp = 0, sign = 0x100; in long_c2i() local
145 sign = 0xff; in long_c2i()
150 sign = 0; in long_c2i()
159 if (sign == 0x100) { in long_c2i()
162 sign = 0xff; in long_c2i()
164 sign = 0; in long_c2i()
172 utmp |= cont[i] ^ sign; in long_c2i()
[all …]
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_dsa.txt372 # Test sign with a 1024 bit key is unapproved in fips mode if the sign and key
378 CtrlInit = sign-check:0
390 CtrlInit = sign-check:0
401 CtrlInit = sign-check:0
407 # Test sign with a 4096 bit key is unapproved in fips mode if the sign and key
413 CtrlInit = sign-check:0
419 # Test DSA sign with SHA1 is unapproved in fips mode if the sign and digest checks
425 CtrlInit = sign-check:0
431 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored
436 CtrlInit = sign-check:0
[all …]
H A Devppkey_dsa_sigalg.txt337 # Test sign with SHA1 is not allowed in fips mode
364 # Test sign with a 1024 bit key is unapproved in fips mode if the sign and key
371 CtrlInit = sign-check:0
377 # fips mode if the sign check is ignored
383 CtrlInit = sign-check:0
388 # sign and key checks are ignored
394 CtrlInit = sign-check:0
399 # Test sign with a 4096 bit key is unapproved in fips mode if the sign and key
406 CtrlInit = sign-check:0
411 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored
[all …]
/openssl/crypto/pkcs7/
H A Dpk7_lib.c46 if (p7->d.sign == NULL || p7->d.sign->contents->d.ptr == NULL) in PKCS7_ctrl()
90 PKCS7_free(p7->d.sign->contents); in PKCS7_set_content()
91 p7->d.sign->contents = p7_data; in PKCS7_set_content()
125 PKCS7_SIGNED_free(p7->d.sign); in PKCS7_set_type()
126 p7->d.sign = NULL; in PKCS7_set_type()
199 signer_sk = p7->d.sign->signer_info; in PKCS7_add_signer()
200 md_sk = p7->d.sign->md_algs; in PKCS7_add_signer()
259 sk = &(p7->d.sign->cert); in PKCS7_add_certificate()
280 sk = &(p7->d.sign->crl); in PKCS7_add_crl()
421 return p7->d.sign->cert; in STACK_OF()
[all …]
H A Dpk7_mime.c37 if (p7->d.sign == NULL) in SMIME_write_PKCS7()
39 mdalgs = p7->d.sign->md_algs; in SMIME_write_PKCS7()
/openssl/crypto/ec/
H A Decp_nistp521.c1037 out[1] -= (1 & sign); in felem_contract()
1040 out[2] -= (1 & sign); in felem_contract()
1043 out[3] -= (1 & sign); in felem_contract()
1046 out[4] -= (1 & sign); in felem_contract()
1049 out[5] -= (1 & sign); in felem_contract()
1052 out[6] -= (1 & sign); in felem_contract()
1055 out[7] -= (1 & sign); in felem_contract()
1058 out[8] -= (1 & sign); in felem_contract()
1061 out[6] -= (1 & sign); in felem_contract()
1064 out[7] -= (1 & sign); in felem_contract()
[all …]
H A Decdsa_sign.c45 if (eckey->meth->sign != NULL) in ECDSA_sign_ex()
46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
H A Dec_kmeth.c229 int (*sign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_set_sign()
242 meth->sign = sign; in EC_KEY_METHOD_set_sign()
318 *psign = meth->sign; in EC_KEY_METHOD_get_sign()
H A Decp_nistputil.c213 void ossl_ec_GFp_nistp_recode_scalar_bits(unsigned char *sign, in ossl_ec_GFp_nistp_recode_scalar_bits() argument
224 *sign = s & 1; in ossl_ec_GFp_nistp_recode_scalar_bits()
/openssl/crypto/bn/
H A Dbn_gcd.c28 int sign; in bn_mod_inverse_no_branch() local
74 sign = -1; in bn_mod_inverse_no_branch()
151 sign = -sign; in bn_mod_inverse_no_branch()
162 if (sign < 0) { in bn_mod_inverse_no_branch()
204 int sign; in int_bn_mod_inverse() local
252 sign = -1; in int_bn_mod_inverse()
475 sign = -sign; in int_bn_mod_inverse()
487 if (sign < 0) { in int_bn_mod_inverse()
H A Dbn_intern.c26 int sign = 1; in bn_compute_wNAF() local
49 sign = -1; in bn_compute_wNAF()
114 r[j++] = sign * digit; in bn_compute_wNAF()
/openssl/doc/man7/
H A Dlife_cycle-pkey.pod35 =item digest sign
156sign sign sign sign sign sign sign sign
158 sign
206 <th style="border:1px solid" align="center">digest<br>sign</th>
281 <td style="border:1px solid" align="center">digest<br>sign</td>
282 <td style="border:1px solid" align="center">digest<br>sign</td>
283 <td style="border:1px solid" align="center">digest<br>sign</td>
284 <td style="border:1px solid" align="center">digest<br>sign</td>
285 <td style="border:1px solid" align="center">digest<br>sign</td>
286 <td style="border:1px solid" align="center">digest<br>sign</td>
[all …]
H A DEVP_SIGNATURE-ED25519.pod14 generation, one-shot digest-sign and digest-verify using the EdDSA
24 schemes. For these three instances, the sign and verify procedures
28 schemes. For these two instances, the sign and verify procedures do
35 B<context-string> as input to sign and verify operations (and for
109 The message to sign or verify must be passed using the one-shot
118 Applications wishing to sign certificates (or other structures such as
139 To sign a message using an ED25519 EVP_PKEY structure:
/openssl/doc/man1/
H A Dopenssl-dgst.pod.in22 [B<-sign> I<filename>|I<uri>]
115 =item B<-sign> I<filename>|I<uri>
117 Digitally sign the digest using the given private key. Note this option
123 The format of the key to sign with; unspecified by default.
128 Pass options to the signature algorithm during sign or verify operations.
227 To sign a file using SHA-256 with binary file output:
229 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt
231 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
236 -signature signature.sign \
H A Dopenssl-pkeyutl.pod.in26 [B<-sign>]
51 By default the signing operation (see B<-sign> option) is assumed.
75 This option can only be used with B<-sign> and B<-verify>.
83 This option can only be used with B<-sign> and B<-verify>.
148 =item B<-sign>
177 (as with the B<-sign> and B<-verify> options) but a signature output value,
178 typically produced using the B<-sign> option.
297 The RSA algorithm generally supports the encrypt, decrypt, sign,
362 supports the sign and verify operations with PSS padding. The following
394 The EC algorithm supports sign, verify and derive operations. The sign and
[all …]
H A DCA.pl.pod19 B<-sign> |
101 B<-sign> option. The PKCS#12 file can be imported directly into a browser.
107 =item B<-sign>, B<-signcert>, B<-xsign>
109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the
116 This option is the same as the B<-sign> option except it uses the
123 This option is the same as B<-sign> except it expects a self signed certificate
163 Complete certificate creation example: create a CA, create a request, sign
168 CA.pl -sign
H A Dopenssl-cms.pod.in23 [B<-sign>]
184 =item B<-sign>
203 similar to the B<-sign> operation.
463 When used with B<-sign>,
670 B<-sign> operation if the content is not detached.
770 The use of PSS with B<-sign>.
781 openssl cms -sign -in message.txt -text -out mail.msg \
792 openssl cms -sign -in in.txt -text -out mail.msg \
797 openssl cms -sign -in message.txt -text -out mail.msg \
802 openssl cms -sign -in in.txt -text -signer mycert.pem \
[all …]
H A Dopenssl-smime.pod.in14 [B<-sign>]
57 This command handles S/MIME mail. It can encrypt, decrypt, sign
87 =item B<-sign>
313 choke if a message contains multiple signers. It is possible to sign
327 B<-sign> operation if the content is not detached.
369 openssl smime -sign -in message.txt -text -out mail.msg \
374 openssl smime -sign -in message.txt -text -out mail.msg -nodetach \
380 openssl smime -sign -in in.txt -text -out mail.msg \
385 openssl smime -sign -in message.txt -text -out mail.msg \
390 openssl smime -sign -in in.txt -text -signer mycert.pem \
[all …]
/openssl/test/
H A Drun_tests.pl110 my $sign = $1;
115 if ($sign eq '-' && $initial_arg) {
121 ($sign eq '-' ? "removal" : "addition"),
125 if ($sign eq '-') {
/openssl/apps/
H A Dpkcs7.c157 if (p7->d.sign != NULL) { in pkcs7_main()
158 certs = p7->d.sign->cert; in pkcs7_main()
159 crls = p7->d.sign->crl; in pkcs7_main()
/openssl/doc/
H A Dfingerprints.txt4 the fingerprints of team members who are "authorized" to sign the
13 currently in use to sign OpenSSL distributions:
/openssl/crypto/evp/
H A Dsignature.c80 if (signature->sign != NULL) in evp_signature_from_algorithm()
82 signature->sign = OSSL_FUNC_signature_sign(fns); in evp_signature_from_algorithm()
303 && signature->sign == NULL) in evp_signature_from_algorithm()
305 && signature->sign == NULL in evp_signature_from_algorithm()
311 && (signature->sign != NULL in evp_signature_from_algorithm()
771 || (operation == EVP_PKEY_OP_SIGN && ctx->pmeth->sign == NULL) in evp_pkey_signature_init()
903 if (ctx->op.sig.signature->sign == NULL) { in EVP_PKEY_sign()
908 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign()
914 if (ctx->pmeth == NULL || ctx->pmeth->sign == NULL) { in EVP_PKEY_sign()
920 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
/openssl/providers/common/
H A Dsecuritycheck.c148 int ossl_dsa_check_key(const DSA *dsa, int sign) in ossl_dsa_check_key() argument
174 if (!sign) { in ossl_dsa_check_key()
/openssl/doc/man3/
H A DX509_sign.pod9 sign certificate, certificate request, or CRL signature
40 sign certificate requests and CRLs, respectively.
45 public key and digest are not suitable. It can be used to sign keys using
H A DX509_check_ca.pod16 to sign other certificates). The certificate must be a complete certificate
31 used to sign other certificates.

Completed in 54 milliseconds

12345678