Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 2061) sorted by relevance

12345678910>>...83

/freebsd/crypto/openssl/crypto/evp/
H A Dsignature.c35 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local
37 if (signature == NULL) in evp_signature_new()
40 if (!CRYPTO_NEW_REF(&signature->refcnt, 1) in evp_signature_new()
42 CRYPTO_FREE_REF(&signature->refcnt); in evp_signature_new()
43 OPENSSL_free(signature); in evp_signature_new()
47 signature->prov = prov; in evp_signature_new()
49 return signature; in evp_signature_new()
57 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local
67 if ((signature = evp_signature_new(prov)) == NULL) { in evp_signature_from_algorithm()
72 signature->name_id = name_id; in evp_signature_from_algorithm()
[all …]
H A Dm_sigver.c44 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local
79 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init()
101 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init()
120 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init()
122 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init()
126 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init()
142 EVP_SIGNATURE_free(signature); in do_sigver_init()
147 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init()
149 if (signature != NULL) in do_sigver_init()
150 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init()
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dprovider-signature.757 .IX Title "PROVIDER-SIGNATURE 7ossl"
58 .TH PROVIDER-SIGNATURE 7ossl 2025-09-30 3.5.4 OpenSSL
64 provider\-signature \- The signature library <\-> provider functions
82 \& /* Get the key types that a signature algorithm supports */
107 \& * OSSL_FUNC_signature_verify_message_final requires that the signature to be
108 \& * verified is specified via a "signature" OSSL_PARAM, which is given with a
146 \& /* Signature parameters */
164 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
165 signature algorithms and make them available to applications via the API
233 A signature algorithm implementation may not implement all of these functions.
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ml_dsa_sigver.txt14 # modified signature - hint
25 # modified signature - z
48 # modified signature - z
60 # modified signature - hint
83 # valid signature and message - signature should verify successfully
93 # valid signature and message - signature should verify successfully
104 # modified signature - hint
115 # modified signature - commitment
127 # modified signature - commitment
138 # valid signature and message - signature should verify successfully
[all …]
H A Devppkey_slh_dsa_sigver.txt14 # invalid signature - too small
38 # invalid signature - too large
50 # invalid signature - too large
62 # modified signature - SIGFORS
74 # modified signature - SIGFORS
86 # modified signature - SIGHT
98 # modified signature - R
110 # valid signature and message - signature should verify successfully
121 # invalid signature - too small
133 # modified signature - SIGHT
[all …]
H A Devppkey_ml_dsa_65_wycheproof_verify.txt59 # 6 short signature
68 # 7 long signature
77 # 8 signature with a bit flip in c_tilde
86 # 9 signature with a bit flip in z[0]
95 # 10 signature with a bit flip in z[1]
104 # 11 signature with a bit flip in z[2]
113 # 12 signature with a bit flip in z[3]
122 # 13 signature with a bit flip in z[4]
131 # 14 signature with a bit flip in hints
140 # 15 signature with a bit flip in the last byte
[all …]
H A Devppkey_ml_dsa_87_wycheproof_verify.txt59 # 6 short signature
68 # 7 long signature
77 # 8 signature with a bit flip in c_tilde
86 # 9 signature with a bit flip in z[0]
95 # 10 signature with a bit flip in z[1]
104 # 11 signature with a bit flip in z[2]
113 # 12 signature with a bit flip in z[3]
122 # 13 signature with a bit flip in z[4]
131 # 14 signature with a bit flip in z[5]
140 # 15 signature with a bit flip in z[6]
[all …]
H A Devppkey_ml_dsa_44_wycheproof_verify.txt59 # 6 short signature
68 # 7 long signature
77 # 8 signature with a bit flip in c_tilde
86 # 9 signature with a bit flip in z[0]
95 # 10 signature with a bit flip in z[1]
104 # 11 signature with a bit flip in z[2]
113 # 12 signature with a bit flip in z[3]
122 # 13 signature with a bit flip in hints
131 # 14 signature with a bit flip in the last byte
140 # 15 signature with hints in reverse order
[all …]
H A Devppkey_ml_dsa_65_wycheproof_sign.txt59 # 6 signature that takes 1 iteration(s)
67 # 7 signature that takes 2 iteration(s)
75 # 8 signature that takes 3 iteration(s)
83 # 9 signature that takes 4 iteration(s)
91 # 10 signature that takes 5 iteration(s)
99 # 11 signature that takes 6 iteration(s)
107 # 12 signature that takes 7 iteration(s)
115 # 13 signature that takes 8 iteration(s)
123 # 14 signature that takes 9 iteration(s)
131 # 15 signature that takes 10 iteration(s)
[all …]
H A Devppkey_ml_dsa_44_wycheproof_sign.txt59 # 6 signature that takes 1 iteration(s)
67 # 7 signature that takes 2 iteration(s)
75 # 8 signature that takes 3 iteration(s)
83 # 9 signature that takes 4 iteration(s)
91 # 10 signature that takes 5 iteration(s)
99 # 11 signature that takes 6 iteration(s)
107 # 12 signature that takes 7 iteration(s)
115 # 13 signature that takes 8 iteration(s)
123 # 14 signature that takes 9 iteration(s)
131 # 15 signature that takes 10 iteration(s)
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D20-cert-select.cnf9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection
11 test-6 = 6-ECDSA Signature Algorithm Selection
12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384
13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point
14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate
15 test-10 = 10-RSA Signature Algorithm Selection
16 test-11 = 11-RSA-PSS Signature Algorithm Selection
20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection
21 test-16 = 16-Ed448 CipherString and Signature Algorithm Selection
24 test-19 = 19-ECDSA Signature Algorithm Selection SHA1
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
25 /* Get the key types that a signature algorithm supports */
50 * OSSL_FUNC_signature_verify_message_final requires that the signature to be
51 * verified is specified via a "signature" OSSL_PARAM, which is given with a
89 /* Signature parameters */
107 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
108 signature algorithms and make them available to applications via the API
172 A signature algorithm implementation may not implement all of these functions.
175 set of "signature" functions, i.e. at least one of:
215 indicating the key types supported by the provider for signature operations.
[all …]
/freebsd/sys/contrib/dev/acpica/compiler/
H A Ddttemplate.c164 char *Signature);
168 char *Signature,
173 char *Signature,
185 char *Signature,
193 * PARAMETERS: Signature - ACPI table signature
195 * RETURN: TRUE if signature is a special ACPI table
204 char *Signature) in AcpiUtIsSpecialTable() argument
207 if (ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_DSDT) || in AcpiUtIsSpecialTable()
208 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_OSDT) || in AcpiUtIsSpecialTable()
209 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_SSDT) || in AcpiUtIsSpecialTable()
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Defi17 # EFI Signature List
21 >0 guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F EFI Signature List, SIG DB
22 >0 guid 4AAFD29D-68DF-49EE-8AA9-347D375665A7 EFI Signature List, PKCS7
23 >0 guid 3C5766E8-269C-4E34-AA14-ED776E85B3B6 EFI Signature List, RSA2048
24 >0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256
25 >0 guid 67F8444F-8743-48F1-A328-1EAAB8736080 EFI Signature List, RSA2048 SHA1
26 >0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type
27 >0 guid 826CA512-CF10-4AC9-B187-BE01496631BD EFI Signature List, SHA1
28 >0 guid 0B6E5233-A65C-44C9-9407-D9AB83BFC8BD EFI Signature List, SHA224
29 >0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig1 This document describes a lightweight SSH Signature format
11 The header is the string "-----BEGIN SSH SIGNATURE-----"
13 "-----END SSH SIGNATURE-----" immediately after a newline.
15 The header MUST be present at the start of every signature.
16 Files containing the signature MUST start with the header.
18 signature.
25 -----BEGIN SSH SIGNATURE-----
30 -----END SSH SIGNATURE-----
43 string signature
46 public key used to make the signature using the usual SSH
[all …]
H A DPROTOCOL.u2f12 type as both the inputs to the signature operation and the resultant
13 signature differ from those specified for SSH. For similar reasons,
18 of "user presence" for each signature operation (typically achieved
21 given key is backed by hardware. Finally the signature format includes
22 a monotonic signature counter that can be used (at scale) to detect
38 the key handle be supplied for each signature operation. U2F tokens
59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive,
61 the signature object itself. As such they cannot be made compatible with
113 string signature key
114 string signature
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SIGNATURE.pod21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
27 void (*fn)(EVP_SIGNATURE *signature,
30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
43 The algorithm will be one offering functions for performing signature related
[all …]
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
37 Signature scheme names and public key algorithm names (but not the digest
45 signature algorithms related to client authentication, otherwise they are
49 All these functions are implemented as macros. The signature algorithm
55 If an application wishes to allow the setting of signature algorithms
59 The signature algorithms set by a client are used directly in the supported
60 signature algorithm in the client hello message.
62 The supported signature algorithms set by a server are not sent to the
[all …]
H A DASN1_item_sign.pod14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
20 ASN1_BIT_STRING *signature, const void *data,
24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
28 const ASN1_BIT_STRING *signature, const void *data,
33 const ASN1_BIT_STRING *signature, const void *data,
37 const ASN1_BIT_STRING *signature, const void *data,
46 The I<data> that will be signed, and a structure containing the signature may
51 written before the signature is generated.
57 The generated signature is set into I<signature>.
68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal
[all …]
H A DECDSA_sign.pod7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm
49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
50 created with the private EC key I<eckey>. To obtain the actual signature
53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value
60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned
65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a
66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the
69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
73 during signature computation. Most applications will never need to call these
82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DASN1_item_sign.373 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
79 \& ASN1_BIT_STRING *signature, const void *data,
83 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
87 \& const ASN1_BIT_STRING *signature, const void *data,
92 \& const ASN1_BIT_STRING *signature, const void *data,
96 \& const ASN1_BIT_STRING *signature, const void *data,
105 The \fIdata\fR that will be signed, and a structure containing the signature may
110 written before the signature is generated.
116 The generated signature is set into \fIsignature\fR.
127 \&\fBASN1_item_verify_ex()\fR is used to verify the signature \fIsignature\fR of internal
[all …]
H A DEVP_SIGNATURE.380 \& void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
81 \& int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
82 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
83 \& int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
84 \& OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
86 \& void (*fn)(EVP_SIGNATURE *signature,
89 \& int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
92 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
93 \& const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
102 The algorithm will be one offering functions for performing signature related
[all …]
H A DSSL_CTX_set1_sigalgs.367 SSL_set1_client_sigalgs_list \- set supported signature algorithms
85 \&\fBSSL_CTX_set1_sigalgs()\fR and \fBSSL_set1_sigalgs()\fR set the supported signature
91 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter
96 Signature scheme names and public key algorithm names (but not the digest
103 signature algorithms related to client authentication, otherwise they are
107 All these functions are implemented as macros. The signature algorithm
112 If an application wishes to allow the setting of signature algorithms
116 The signature algorithms set by a client are used directly in the supported
117 signature algorithm in the client hello message.
119 The supported signature algorithms set by a server are not sent to the
[all …]
H A DECDSA_sign.366 ECDSA_do_sign_ex \- deprecated low\-level elliptic curve digital signature algorithm
110 \&\fBECDSA_size()\fR returns the maximum length of a DER encoded ECDSA signature
111 created with the private EC key \fIeckey\fR. To obtain the actual signature
114 \&\fBECDSA_sign()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value
121 \&\fBECDSA_do_sign()\fR is similar to \fBECDSA_sign()\fR except the signature is returned
126 \&\fBECDSA_verify()\fR verifies that the signature in \fIsig\fR of size \fIsiglen\fR is a
127 valid ECDSA signature of the hash value \fIdgst\fR of size \fIdgstlen\fR using the
130 \&\fBECDSA_do_verify()\fR is similar to \fBECDSA_verify()\fR except the signature is
134 during signature computation. Most applications will never need to call these
143 \&\fBECDSA_sign_ex()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value
[all …]
/freebsd/lib/libsecureboot/efi/include/Guid/
H A DImageAuthentication.h2 Image signature database are defined for the signed image validation.
28 /// for the authorized signature database.
33 /// for the forbidden signature database.
38 /// for the timestamp signature database.
49 // Signature Database
52 /// The format of a signature database.
58 /// An identifier which identifies the agent which added the signature to the list.
62 /// The format of the signature is defined by the SignatureType.
69 /// Type of the signature. GUID signature types are defined in below.
73 /// Total size of the signature list, including this header.
[all …]

12345678910>>...83