/openssl/crypto/asn1/ |
H A D | x_long.c | 89 unsigned long utmp, sign; in long_i2c() local 101 sign = 0xff; in long_i2c() 104 sign = 0; in long_i2c() 133 unsigned long utmp = 0, sign = 0x100; in long_c2i() local 145 sign = 0xff; in long_c2i() 150 sign = 0; in long_c2i() 159 if (sign == 0x100) { in long_c2i() 162 sign = 0xff; in long_c2i() 164 sign = 0; in long_c2i() 172 utmp |= cont[i] ^ sign; in long_c2i() [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 372 # Test sign with a 1024 bit key is unapproved in fips mode if the sign and key 378 CtrlInit = sign-check:0 390 CtrlInit = sign-check:0 401 CtrlInit = sign-check:0 407 # Test sign with a 4096 bit key is unapproved in fips mode if the sign and key 413 CtrlInit = sign-check:0 419 # Test DSA sign with SHA1 is unapproved in fips mode if the sign and digest checks 425 CtrlInit = sign-check:0 431 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored 436 CtrlInit = sign-check:0 [all …]
|
H A D | evppkey_dsa_sigalg.txt | 337 # Test sign with SHA1 is not allowed in fips mode 364 # Test sign with a 1024 bit key is unapproved in fips mode if the sign and key 371 CtrlInit = sign-check:0 377 # fips mode if the sign check is ignored 383 CtrlInit = sign-check:0 388 # sign and key checks are ignored 394 CtrlInit = sign-check:0 399 # Test sign with a 4096 bit key is unapproved in fips mode if the sign and key 406 CtrlInit = sign-check:0 411 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored [all …]
|
/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 46 if (p7->d.sign == NULL || p7->d.sign->contents->d.ptr == NULL) in PKCS7_ctrl() 90 PKCS7_free(p7->d.sign->contents); in PKCS7_set_content() 91 p7->d.sign->contents = p7_data; in PKCS7_set_content() 125 PKCS7_SIGNED_free(p7->d.sign); in PKCS7_set_type() 126 p7->d.sign = NULL; in PKCS7_set_type() 199 signer_sk = p7->d.sign->signer_info; in PKCS7_add_signer() 200 md_sk = p7->d.sign->md_algs; in PKCS7_add_signer() 259 sk = &(p7->d.sign->cert); in PKCS7_add_certificate() 280 sk = &(p7->d.sign->crl); in PKCS7_add_crl() 421 return p7->d.sign->cert; in STACK_OF() [all …]
|
H A D | pk7_mime.c | 37 if (p7->d.sign == NULL) in SMIME_write_PKCS7() 39 mdalgs = p7->d.sign->md_algs; in SMIME_write_PKCS7()
|
/openssl/crypto/ec/ |
H A D | ecp_nistp521.c | 1037 out[1] -= (1 & sign); in felem_contract() 1040 out[2] -= (1 & sign); in felem_contract() 1043 out[3] -= (1 & sign); in felem_contract() 1046 out[4] -= (1 & sign); in felem_contract() 1049 out[5] -= (1 & sign); in felem_contract() 1052 out[6] -= (1 & sign); in felem_contract() 1055 out[7] -= (1 & sign); in felem_contract() 1058 out[8] -= (1 & sign); in felem_contract() 1061 out[6] -= (1 & sign); in felem_contract() 1064 out[7] -= (1 & sign); in felem_contract() [all …]
|
H A D | ecdsa_sign.c | 45 if (eckey->meth->sign != NULL) in ECDSA_sign_ex() 46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
|
H A D | ec_kmeth.c | 229 int (*sign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_set_sign() 242 meth->sign = sign; in EC_KEY_METHOD_set_sign() 318 *psign = meth->sign; in EC_KEY_METHOD_get_sign()
|
H A D | ecp_nistputil.c | 213 void ossl_ec_GFp_nistp_recode_scalar_bits(unsigned char *sign, in ossl_ec_GFp_nistp_recode_scalar_bits() argument 224 *sign = s & 1; in ossl_ec_GFp_nistp_recode_scalar_bits()
|
/openssl/crypto/bn/ |
H A D | bn_gcd.c | 28 int sign; in bn_mod_inverse_no_branch() local 74 sign = -1; in bn_mod_inverse_no_branch() 151 sign = -sign; in bn_mod_inverse_no_branch() 162 if (sign < 0) { in bn_mod_inverse_no_branch() 204 int sign; in int_bn_mod_inverse() local 252 sign = -1; in int_bn_mod_inverse() 475 sign = -sign; in int_bn_mod_inverse() 487 if (sign < 0) { in int_bn_mod_inverse()
|
H A D | bn_intern.c | 26 int sign = 1; in bn_compute_wNAF() local 49 sign = -1; in bn_compute_wNAF() 114 r[j++] = sign * digit; in bn_compute_wNAF()
|
/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 35 =item digest sign 156 …sign sign sign sign sign sign sign sign … 158 sign 206 <th style="border:1px solid" align="center">digest<br>sign</th> 281 <td style="border:1px solid" align="center">digest<br>sign</td> 282 <td style="border:1px solid" align="center">digest<br>sign</td> 283 <td style="border:1px solid" align="center">digest<br>sign</td> 284 <td style="border:1px solid" align="center">digest<br>sign</td> 285 <td style="border:1px solid" align="center">digest<br>sign</td> 286 <td style="border:1px solid" align="center">digest<br>sign</td> [all …]
|
H A D | EVP_SIGNATURE-ED25519.pod | 14 generation, one-shot digest-sign and digest-verify using the EdDSA 24 schemes. For these three instances, the sign and verify procedures 28 schemes. For these two instances, the sign and verify procedures do 35 B<context-string> as input to sign and verify operations (and for 109 The message to sign or verify must be passed using the one-shot 118 Applications wishing to sign certificates (or other structures such as 139 To sign a message using an ED25519 EVP_PKEY structure:
|
/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 22 [B<-sign> I<filename>|I<uri>] 115 =item B<-sign> I<filename>|I<uri> 117 Digitally sign the digest using the given private key. Note this option 123 The format of the key to sign with; unspecified by default. 128 Pass options to the signature algorithm during sign or verify operations. 227 To sign a file using SHA-256 with binary file output: 229 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt 231 openssl sha256 -sign privatekey.pem -out signature.sign file.txt 236 -signature signature.sign \
|
H A D | openssl-pkeyutl.pod.in | 26 [B<-sign>] 51 By default the signing operation (see B<-sign> option) is assumed. 75 This option can only be used with B<-sign> and B<-verify>. 83 This option can only be used with B<-sign> and B<-verify>. 148 =item B<-sign> 177 (as with the B<-sign> and B<-verify> options) but a signature output value, 178 typically produced using the B<-sign> option. 297 The RSA algorithm generally supports the encrypt, decrypt, sign, 362 supports the sign and verify operations with PSS padding. The following 394 The EC algorithm supports sign, verify and derive operations. The sign and [all …]
|
H A D | CA.pl.pod | 19 B<-sign> | 101 B<-sign> option. The PKCS#12 file can be imported directly into a browser. 107 =item B<-sign>, B<-signcert>, B<-xsign> 109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the 116 This option is the same as the B<-sign> option except it uses the 123 This option is the same as B<-sign> except it expects a self signed certificate 163 Complete certificate creation example: create a CA, create a request, sign 168 CA.pl -sign
|
H A D | openssl-cms.pod.in | 23 [B<-sign>] 184 =item B<-sign> 203 similar to the B<-sign> operation. 463 When used with B<-sign>, 670 B<-sign> operation if the content is not detached. 770 The use of PSS with B<-sign>. 781 openssl cms -sign -in message.txt -text -out mail.msg \ 792 openssl cms -sign -in in.txt -text -out mail.msg \ 797 openssl cms -sign -in message.txt -text -out mail.msg \ 802 openssl cms -sign -in in.txt -text -signer mycert.pem \ [all …]
|
H A D | openssl-smime.pod.in | 14 [B<-sign>] 57 This command handles S/MIME mail. It can encrypt, decrypt, sign 87 =item B<-sign> 313 choke if a message contains multiple signers. It is possible to sign 327 B<-sign> operation if the content is not detached. 369 openssl smime -sign -in message.txt -text -out mail.msg \ 374 openssl smime -sign -in message.txt -text -out mail.msg -nodetach \ 380 openssl smime -sign -in in.txt -text -out mail.msg \ 385 openssl smime -sign -in message.txt -text -out mail.msg \ 390 openssl smime -sign -in in.txt -text -signer mycert.pem \ [all …]
|
/openssl/test/ |
H A D | run_tests.pl | 110 my $sign = $1; 115 if ($sign eq '-' && $initial_arg) { 121 ($sign eq '-' ? "removal" : "addition"), 125 if ($sign eq '-') {
|
/openssl/apps/ |
H A D | pkcs7.c | 157 if (p7->d.sign != NULL) { in pkcs7_main() 158 certs = p7->d.sign->cert; in pkcs7_main() 159 crls = p7->d.sign->crl; in pkcs7_main()
|
/openssl/doc/ |
H A D | fingerprints.txt | 4 the fingerprints of team members who are "authorized" to sign the 13 currently in use to sign OpenSSL distributions:
|
/openssl/crypto/evp/ |
H A D | signature.c | 80 if (signature->sign != NULL) in evp_signature_from_algorithm() 82 signature->sign = OSSL_FUNC_signature_sign(fns); in evp_signature_from_algorithm() 303 && signature->sign == NULL) in evp_signature_from_algorithm() 305 && signature->sign == NULL in evp_signature_from_algorithm() 311 && (signature->sign != NULL in evp_signature_from_algorithm() 771 || (operation == EVP_PKEY_OP_SIGN && ctx->pmeth->sign == NULL) in evp_pkey_signature_init() 903 if (ctx->op.sig.signature->sign == NULL) { in EVP_PKEY_sign() 908 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign() 914 if (ctx->pmeth == NULL || ctx->pmeth->sign == NULL) { in EVP_PKEY_sign() 920 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()
|
/openssl/providers/common/ |
H A D | securitycheck.c | 148 int ossl_dsa_check_key(const DSA *dsa, int sign) in ossl_dsa_check_key() argument 174 if (!sign) { in ossl_dsa_check_key()
|
/openssl/doc/man3/ |
H A D | X509_sign.pod | 9 sign certificate, certificate request, or CRL signature 40 sign certificate requests and CRLs, respectively. 45 public key and digest are not suitable. It can be used to sign keys using
|
H A D | X509_check_ca.pod | 16 to sign other certificates). The certificate must be a complete certificate 31 used to sign other certificates.
|