Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 1773) sorted by relevance

12345678910>>...71

/freebsd/crypto/openssl/crypto/evp/
H A Dsignature.c23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local
25 if (signature == NULL) { in evp_signature_new()
30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new()
31 if (signature->lock == NULL) { in evp_signature_new()
33 OPENSSL_free(signature); in evp_signature_new()
36 signature->prov = prov; in evp_signature_new()
38 signature->refcnt = 1; in evp_signature_new()
40 return signature; in evp_signature_new()
48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local
53 if ((signature in evp_signature_from_algorithm()
280 EVP_SIGNATURE_free(EVP_SIGNATURE * signature) EVP_SIGNATURE_free() argument
295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE * signature) EVP_SIGNATURE_up_ref() argument
303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_provider() argument
328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE * signature,const char * name) EVP_SIGNATURE_is_a() argument
334 evp_signature_get_number(const EVP_SIGNATURE * signature) evp_signature_get_number() argument
339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_name() argument
344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_description() argument
350 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX * libctx,void (* fn)(EVP_SIGNATURE * signature,void * arg),void * arg) EVP_SIGNATURE_do_all_provided() argument
362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE * signature,void (* fn)(const char * name,void * data),void * data) EVP_SIGNATURE_names_do_all() argument
399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local
[all...]
H A Dm_sigver.c46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local
85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init()
107 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init()
126 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init()
128 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init()
132 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init()
148 EVP_SIGNATURE_free(signature); in do_sigver_init()
153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init()
155 if (signature != NULL) in do_sigver_init()
156 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init()
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D20-cert-select.cnf9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection
11 test-6 = 6-ECDSA Signature Algorithm Selection
12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384
13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point
14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate
15 test-10 = 10-RSA Signature Algorithm Selection
16 test-11 = 11-RSA-PSS Signature Algorithm Selection
20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection
21 test-16 = 16-Ed448 CipherString and Signature Algorithm Selection
24 test-19 = 19-ECDSA Signature Algorith
[all...]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
70 /* Signature parameters */
88 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
89 signature algorithms and make them available to applications via the API
147 A signature algorithm implementation may not implement all of these functions.
150 set of "signature" functions, i.e. at least one of:
175 A signature algorithm must also implement some mechanism for generating,
182 structure for holding context information during a signature operation.
183 A pointer to this context will be passed back in a number of the other signature
190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dprovider-signature.7133 .IX Title "PROVIDER-SIGNATURE 7ossl"
134 .TH PROVIDER-SIGNATURE 7ossl "2023-09-19" "3.0.11" "OpenSSL"
140 provider\-signature \- The signature library <\-> provider functions
203 \& /* Signature parameters */
221 The signature (\s-1OSSL_OP_SIGNATURE\s0) operation enables providers to implement
222 signature algorithms and make them available to applications via the \s-1API\s0
284 A signature algorithm implementation may not implement all of these functions.
287 set of \*(L"signature\*(R" functions, i.e. at least one of:
310 A signature algorithm must also implement some mechanism for generating,
316 structure for holding context information during a signature operation.
[all …]
/freebsd/sys/contrib/dev/acpica/compiler/
H A Ddttemplate.c164 char *Signature);
168 char *Signature,
173 char *Signature,
185 char *Signature,
193 * PARAMETERS: Signature - ACPI table signature
195 * RETURN: TRUE if signature is a special ACPI table
204 char *Signature) in AcpiUtIsSpecialTable() argument
207 if (ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_DSDT) || in AcpiUtIsSpecialTable()
208 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_OSDT) || in AcpiUtIsSpecialTable()
209 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_SSDT) || in AcpiUtIsSpecialTable()
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Defi17 # EFI Signature List
21 >0 guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F EFI Signature List, SIG DB
22 >0 guid 4AAFD29D-68DF-49EE-8AA9-347D375665A7 EFI Signature List, PKCS7
23 >0 guid 3C5766E8-269C-4E34-AA14-ED776E85B3B6 EFI Signature List, RSA2048
24 >0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256
25 >0 guid 67F8444F-8743-48F1-A328-1EAAB8736080 EFI Signature List, RSA2048 SHA1
26 >0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type
27 >0 guid 826CA512-CF10-4AC9-B187-BE01496631BD EFI Signature List, SHA1
28 >0 guid 0B6E5233-A65C-44C9-9407-D9AB83BFC8BD EFI Signature List, SHA224
29 >0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig1 This document describes a lightweight SSH Signature format
11 The header is the string "-----BEGIN SSH SIGNATURE-----"
13 "-----END SSH SIGNATURE-----" immediately after a newline.
15 The header MUST be present at the start of every signature.
16 Files containing the signature MUST start with the header.
18 signature.
25 -----BEGIN SSH SIGNATURE-----
30 -----END SSH SIGNATURE-----
43 string signature
46 public key used to make the signature using the usual SSH
[all …]
H A DPROTOCOL.u2f12 type as both the inputs to the signature operation and the resultant
13 signature differ from those specified for SSH. For similar reasons,
18 of "user presence" for each signature operation (typically achieved
21 given key is backed by hardware. Finally the signature format includes
22 a monotonic signature counter that can be used (at scale) to detect
38 the key handle be supplied for each signature operation. U2F tokens
59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive,
61 the signature object itself. As such they cannot be made compatible with
113 string signature key
114 string signature
[all …]
H A Dsshsig.h33 * Creates a detached SSH signature for a given buffer.
35 * out is populated with the detached signature, or NULL on failure.
43 * Verifies that a detached signature is valid and optionally returns key
47 int sshsig_verifyb(struct sshbuf *signature,
54 * Creates a detached SSH signature for a given file.
56 * out is populated with the detached signature, or NULL on failure.
64 * Verifies that a detached signature over a file is valid and optionally
68 int sshsig_verify_fd(struct sshbuf *signature, int fd,
75 * Return a base64 encoded "ASCII armoured" version of a raw signature.
80 * Decode a base64 encoded armoured signature to a raw signature.
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SIGNATURE.pod21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
27 void (*fn)(EVP_SIGNATURE *signature,
30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
43 The algorithm will be one offering functions for performing signature related
[all …]
H A DASN1_item_sign.pod14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
20 ASN1_BIT_STRING *signature, const void *data,
24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
28 const ASN1_BIT_STRING *signature, const void *data,
33 const ASN1_BIT_STRING *signature, const void *data,
37 const ASN1_BIT_STRING *signature, const void *data,
46 The I<data> that will be signed, and a structure containing the signature may
51 written before the signature is generated.
57 The generated signature is set into I<signature>.
68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal
[all …]
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
40 signature algorithms related to client authentication, otherwise they are
44 All these functions are implemented as macros. The signature algorithm
50 If an application wishes to allow the setting of signature algorithms
54 The signature algorithms set by a client are used directly in the supported
55 signature algorithm in the client hello message.
57 The supported signature algorithms set by a server are not sent to the
58 client but are used to determine the set of shared signature algorithms
[all …]
H A DECDSA_sign.pod7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm
49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
50 created with the private EC key I<eckey>. To obtain the actual signature
53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value
60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned
65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a
66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the
69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
73 during signature computation. Most applications will never need to call these
82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
21 SSL_get_shared_sigalgs() returns information about the shared signature
23 of the shared signature algorithm to return starting from zero. The signature
25 sign and hash NID to B<*psignhash>. The raw signature and hash values
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
45 signature algorithm it can just set B<idx> to zero.
50 signature algorithms can be determined: which can be zero.
53 signature algorithms: after a client hello (for servers) or a certificate
57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DASN1_item_sign.3149 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
155 \& ASN1_BIT_STRING *signature, const void *data,
159 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
163 \& const ASN1_BIT_STRING *signature, const void *data,
168 \& const ASN1_BIT_STRING *signature, const void *data,
172 \& const ASN1_BIT_STRING *signature, const void *data,
181 The \fIdata\fR that will be signed, and a structure containing the signature may
186 written before the signature is generated.
192 The generated signature is set into \fIsignature\fR.
203 \&\fBASN1_item_verify_ex()\fR is used to verify the signature \fIsignature\fR of internal
[all …]
H A DEVP_SIGNATURE.3156 \& void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
157 \& int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
158 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
159 \& int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
160 \& OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
162 \& void (*fn)(EVP_SIGNATURE *signature,
165 \& int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
168 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
169 \& const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
178 The algorithm will be one offering functions for performing signature related
[all …]
H A DECDSA_sign.3142 ECDSA_do_sign_ex \- deprecated low\-level elliptic curve digital signature algorithm
186 \&\fBECDSA_size()\fR returns the maximum length of a \s-1DER\s0 encoded \s-1ECDSA\s0 signature
187 created with the private \s-1EC\s0 key \fIeckey\fR. To obtain the actual signature
190 \&\fBECDSA_sign()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value
197 \&\fBECDSA_do_sign()\fR is similar to \fBECDSA_sign()\fR except the signature is returned
202 \&\fBECDSA_verify()\fR verifies that the signature in \fIsig\fR of size \fIsiglen\fR is a
203 valid \s-1ECDSA\s0 signature of the hash value \fIdgst\fR of size \fIdgstlen\fR using the
206 \&\fBECDSA_do_verify()\fR is similar to \fBECDSA_verify()\fR except the signature is
210 during signature computation. Most applications will never need to call these
219 \&\fBECDSA_sign_ex()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value
[all …]
H A DSSL_CTX_set1_sigalgs.3143 SSL_set1_client_sigalgs_list \- set supported signature algorithms
161 \&\fBSSL_CTX_set1_sigalgs()\fR and \fBSSL_set1_sigalgs()\fR set the supported signature
167 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter
175 signature algorithms related to client authentication, otherwise they are
179 All these functions are implemented as macros. The signature algorithm
184 If an application wishes to allow the setting of signature algorithms
188 The signature algorithms set by a client are used directly in the supported
189 signature algorithm in the client hello message.
191 The supported signature algorithms set by a server are not sent to the
192 client but are used to determine the set of shared signature algorithms
[all …]
/freebsd/lib/libsecureboot/efi/include/Guid/
H A DImageAuthentication.h2 Image signature database are defined for the signed image validation.
28 /// for the authorized signature database.
33 /// for the forbidden signature database.
38 /// for the timestamp signature database.
49 // Signature Database
52 /// The format of a signature database.
58 /// An identifier which identifies the agent which added the signature to the list.
62 /// The format of the signature is defined by the SignatureType.
69 /// Type of the signature. GUID signature types are defined in below.
73 /// Total size of the signature list, including this header.
[all …]
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Ded448.h50 * signature (out): The signature.
57 * context (in): A "context" for this signature of up to 255 bytes.
66 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
77 * signature (out): The signature.
82 * context (in): A "context" for this signature of up to 255 bytes. Must be the
92 uint8_t signature[EDDSA_448_SIGNATURE_BYTES],
101 * EdDSA signature verification.
105 * signature (in): The signature.
111 * context (in): A "context" for this signature of up to 255 bytes.
121 signature[EDDSA_448_SIGNATURE_BYTES],
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_dgst.t36 $testtext.": Generating signature");
39 '-signature', $sigfile,
41 $testtext.": Verify signature with private key");
44 '-signature', $sigfile,
46 $testtext.": Verify signature with public key");
49 '-signature', $sigfile,
68 $testtext.": Generating signature using sha512 command");
71 '-signature', $sigfile,
73 $testtext.": Verify signature with public key using sha512 command");
76 '-signature', $sigfile,
[all …]
/freebsd/crypto/openssl/crypto/asn1/
H A Da_verify.c27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument
46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify()
75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify()
76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify()
90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument
93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify()
97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument
105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex()
113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument
129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx()
[all …]
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DStdLibraryFunctionsChecker.cpp679 // type in a Signature.
683 // The signature of a function we want to describe with a summary. This is a
684 // concessive signature, meaning there may be irrelevant types in the
685 // signature which we do not check against a function with concrete types.
687 class Signature { class in __anon4d759d9c0111::StdLibraryFunctionsChecker
695 // Construct a signature from optional types. If any of the optional types
696 // are not set then the signature will be invalid.
697 Signature(ArgTypes ArgTys, RetType RetTy) { in Signature() function in __anon4d759d9c0111::StdLibraryFunctionsChecker::Signature
743 /// * function prototype (signature)
751 /// The signature and argument constraints together contain information
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_ec.h117 * Internally, such a signature is a pair of modular integers `(r,s)`.
132 * "raw" format signature into "asn1" may enlarge a signature by no more
134 * "asn1" signature to "raw" may expand the signature but the "raw"
138 * Note that for a given signature, the "raw" format is not fully
627 * \brief Convert a signature from "raw" to "asn1".
630 * Conversion may enlarge the signature, but by no more than 9 bytes at
632 * signature length, or an oversized integer).
634 * \param sig signature to convert.
635 * \param sig_len signature length (in bytes).
636 * \return the new signature length, or 0 on error.
[all …]

12345678910>>...71