Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 215) sorted by relevance

123456789

/openssl/crypto/evp/
H A Dsignature.c25 if (signature == NULL) in evp_signature_new()
33 signature->prov = prov; in evp_signature_new()
36 return signature; in evp_signature_new()
270 return signature; in evp_signature_from_algorithm()
280 if (signature == NULL) in EVP_SIGNATURE_free()
327 && evp_is_a(signature->prov, signature->name_id, NULL, name); in EVP_SIGNATURE_is_a()
363 return evp_names_do_all(signature->prov, signature->name_id, fn, data); in EVP_SIGNATURE_names_do_all()
467 signature = in evp_pkey_signature_init()
474 signature = in evp_pkey_signature_init()
514 ctx->op.sig.signature = signature; in evp_pkey_signature_init()
[all …]
H A Dm_sigver.c46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local
80 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init()
143 EVP_SIGNATURE_free(signature); in do_sigver_init()
150 if (signature != NULL) in do_sigver_init()
155 signature = in do_sigver_init()
158 if (signature == NULL) in do_sigver_init()
162 if (signature == NULL) in do_sigver_init()
187 EVP_SIGNATURE_free(signature); in do_sigver_init()
197 locpctx->op.sig.signature = signature; in do_sigver_init()
201 = signature->newctx(ossl_provider_ctx(signature->prov), props); in do_sigver_init()
[all …]
/openssl/crypto/asn1/
H A Da_verify.c27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument
46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify()
73 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify()
74 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify()
88 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument
95 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument
103 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex()
111 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument
127 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx()
143 ret = pkey->ameth->item_verify(ctx, it, data, alg, signature, pkey); in ASN1_item_verify_ctx()
[all …]
H A Da_sign.c28 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, in ASN1_sign() argument
98 ASN1_STRING_set0(signature, buf_out, outl); in ASN1_sign()
104 ossl_asn1_string_set_bits_left(signature, 0); in ASN1_sign()
115 ASN1_BIT_STRING *signature, const void *data, in ASN1_item_sign() argument
118 return ASN1_item_sign_ex(it, algor1, algor2, signature, data, NULL, pkey, in ASN1_item_sign()
123 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ex() argument
139 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, data, ctx); in ASN1_item_sign_ex()
148 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ctx() argument
213 outl = signature->length; in ASN1_item_sign_ctx()
280 ASN1_STRING_set0(signature, buf_out, outl); in ASN1_item_sign_ctx()
[all …]
/openssl/doc/man3/
H A DEVP_SIGNATURE.pod21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
27 void (*fn)(EVP_SIGNATURE *signature,
30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
69 implementation for the given I<signature>. Note that the I<signature> may have
72 by the I<signature> object and should not be freed by the caller.
79 discretion of the I<signature> implementation.
[all …]
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
46 All these functions are implemented as macros. The signature algorithm
52 If an application wishes to allow the setting of signature algorithms
57 signature algorithm in the client hello message.
59 The supported signature algorithms set by a server are not sent to the
60 client but are used to determine the set of shared signature algorithms
64 The client authentication signature algorithms set by a server are sent
69 used to determined the set of client authentication shared signature
[all …]
H A DASN1_item_sign.pod14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
20 ASN1_BIT_STRING *signature, const void *data,
51 written before the signature is generated.
57 The generated signature is set into I<signature>.
68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal
89 All verify functions return 1 if the signature is valid and 0 if the signature
96 in an EVP_MD_CTX. The signature is written to MyObject.signature. The object is
112 * output signature.
118 ASN1_BIT_STRING *signature;
136 ASN1_SIMPLE(MyObject, signature, ASN1_BIT_STRING)
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
21 SSL_get_shared_sigalgs() returns information about the shared signature
23 of the shared signature algorithm to return starting from zero. The signature
25 sign and hash NID to B<*psignhash>. The raw signature and hash values
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
45 signature algorithm it can just set B<idx> to zero.
50 signature algorithms can be determined: which can be zero.
61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
69 If a signature algorithm is not recognised the corresponding NIDs
[all …]
H A DECDSA_sign.pod7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm
49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
50 created with the private EC key I<eckey>. To obtain the actual signature
69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
93 ECDSA_size() returns the maximum length signature or 0 on error.
102 signature, 0 for an invalid signature and -1 on error.
107 Creating an ECDSA signature of a given SHA-256 hash value using the
124 Second step: compute the ECDSA signature of a SHA-256 hash value
142 Third step: verify the created ECDSA signature using ECDSA_do_verify():
153 /* signature ok */
[all …]
H A DDSA_do_sign.pod5 DSA_do_sign, DSA_do_verify - raw DSA signature operations
26 DSA_do_sign() computes a digital signature on the B<len> byte message
31 of the signing operation in case signature generation is
34 DSA_do_verify() verifies that the signature B<sig> matches a given
40 DSA_do_sign() returns the signature, NULL on error. DSA_do_verify()
41 returns 1 for a valid signature, 0 for an incorrect signature and -1
H A DX509_get0_signature.pod10 X509_SIG_INFO_get, X509_SIG_INFO_set - signature information
52 X509_get0_signature() sets B<*psig> to the signature of B<x> and B<*palg>
53 to the signature algorithm of B<x>. The values returned are internal
59 X509_get0_tbs_sigalg() returns the signature algorithm in the signed
62 X509_get_signature_nid() returns the NID corresponding to the signature
73 X509_get_signature_info() retrieves information about the signature of
80 about a signature in an B<X509_SIG_INFO> structure. They are only
82 signature information: most applications will never need to call
88 where an application wishes to analyse or generate a signature in a form
94 cases the actual security of the signature is less because the signing
[all …]
H A DECDSA_SIG_new.pod23 I<r> and I<s> value of an Elliptic Curve Digital Signature Algorithm (ECDSA) signature
27 I<r> and I<s> into or from a signature. This is mainly used for testing purposes as shown
62 Extract signature I<r> and I<s> values from a ECDSA I<signature>
68 /* Load a signature into the ECDSA_SIG object */
69 obj = d2i_ECDSA_SIG(NULL, &signature, signaturelen);
86 Convert I<r> and I<s> byte arrays into an ECDSA_SIG I<signature> of
90 unsigned char *signature = NULL;
107 signaturelen = i2d_ECDSA_SIG(obj, &signature);
112 * This signature could now be passed to L<EVP_DigestVerify(3)>
118 OPENSSL_free(signature);
H A DX509_verify.pod8 verify certificate, certificate request, or CRL signature
27 X509_verify() verifies the signature of certificate I<x> using public key
28 I<pkey>. Only the signature is checked: no other checks (such as certificate
34 The signature itself is actually verified only if B<verify_signature> is 1, as
45 return 1 if the signature is valid and 0 if the signature check fails.
46 If the signature could not be checked at all because it was ill-formed,
/openssl/doc/man7/
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
150 set of "signature" functions, i.e. at least one of:
284 the signature should be written to I<*siglen>.
293 length of the signature should be written to I<*siglen>.
336 given provider side signature context I<ctx> to I<params>.
358 signature functions.
364 signature algorithm and digest algorithm for the signature operation.
381 calculated signature is invalid.
383 signature operation succeeds.
384 By default it retries until a signature is calculated.
[all …]
H A DEVP_SIGNATURE-ECDSA.pod5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation.
14 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
26 These parameters are described in L<provider-signature(7)>.
30 The following signature parameters can be retrieved using
41 The parameters are described in L<provider-signature(7)>.
50 L<provider-signature(7)>,
H A DEVP_SIGNATURE-DSA.pod6 - The B<EVP_PKEY> DSA signature implementation
15 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
27 The settable parameters are described in L<provider-signature(7)>.
31 The following signature parameters can be retrieved using
42 The gettable parameters are described in L<provider-signature(7)>.
51 L<provider-signature(7)>,
/openssl/crypto/ec/curve448/
H A Deddsa.c156 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign()
247 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES); in ossl_c448_ed448_sign()
248 memcpy(signature, nonce_point, sizeof(nonce_point)); in ossl_c448_ed448_sign()
249 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign()
265 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign_prehash()
278 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify()
305 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify()
307 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify()
349 &signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_verify()
362 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify_prehash()
[all …]
H A Ded448.h66 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
92 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
121 signature[EDDSA_448_SIGNATURE_BYTES],
149 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
/openssl/test/
H A Ddsa_no_digest_size_test.c139 unsigned char *signature = NULL; in sign_and_verify() local
168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) in sign_and_verify()
171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { in sign_and_verify()
181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify()
187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify()
193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify()
198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify()
208 OPENSSL_free(signature); in sign_and_verify()
H A Ddsatest.c337 unsigned char signature[64]; in test_dsa_sig_infinite_loop() local
375 if (!TEST_int_le(DSA_size(dsa), sizeof(signature))) in test_dsa_sig_infinite_loop()
383 if (!TEST_true(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa)) in test_dsa_sig_infinite_loop()
392 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_infinite_loop()
402 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_infinite_loop()
426 unsigned char signature[64]; in test_dsa_sig_neg_param() local
460 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param()
465 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param()
470 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param()
476 if (!TEST_false(DSA_sign(0, msg, sizeof(msg), signature, &signature_len, dsa))) in test_dsa_sig_neg_param()
/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm41 $self->{signature} = "";
70 $self->signature($sig);
78 my $sig = $self->signature();
97 sub signature subroutine
101 $self->{signature} = shift;
103 return $self->{signature};
H A DServerKeyExchange.pm98 $self->signature($sig);
115 if (length($self->signature) > 0) {
116 $data .= pack('n', length($self->signature));
117 $data .= $self->signature;
157 sub signature subroutine
/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
/openssl/crypto/ocsp/
H A Docsp_local.h54 ASN1_BIT_STRING *signature; member
194 ASN1_BIT_STRING *signature; member
223 (o)->optionalSignature->signature, &(o)->tbsRequest,\
229 (o)->signature, &(o)->tbsResponseData,\
235 (o)->signature, &(o)->tbsResponseData, ctx)
240 (a)->optionalSignature->signature, &(a)->tbsRequest,\
245 &(a)->signatureAlgorithm, (a)->signature,\
/openssl/doc/man1/
H A Dopenssl-dgst.pod.in27 [B<-signature> I<filename>]
80 digest as opposed to a digital signature. See NOTES below for digital
85 Output the digest or signature in binary form.
138 Verify the signature using the public key in "filename".
143 Verify the signature using the private key in "filename".
145 =item B<-signature> I<filename>
147 The actual signature to verify.
230 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
232 To verify a signature:
235 -signature signature.sign \
[all …]

Completed in 77 milliseconds

123456789