/freebsd/crypto/openssl/crypto/evp/ |
H A D | signature.c | 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local 25 if (signature == NULL) { in evp_signature_new() 30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new() 31 if (signature->lock == NULL) { in evp_signature_new() 33 OPENSSL_free(signature); in evp_signature_new() 36 signature->prov = prov; in evp_signature_new() 38 signature->refcnt = 1; in evp_signature_new() 40 return signature; in evp_signature_new() 48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local 53 if ((signature in evp_signature_from_algorithm() 280 EVP_SIGNATURE_free(EVP_SIGNATURE * signature) EVP_SIGNATURE_free() argument 295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE * signature) EVP_SIGNATURE_up_ref() argument 303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_provider() argument 328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE * signature,const char * name) EVP_SIGNATURE_is_a() argument 334 evp_signature_get_number(const EVP_SIGNATURE * signature) evp_signature_get_number() argument 339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_name() argument 344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_description() argument 350 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX * libctx,void (* fn)(EVP_SIGNATURE * signature,void * arg),void * arg) EVP_SIGNATURE_do_all_provided() argument 362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE * signature,void (* fn)(const char * name,void * data),void * data) EVP_SIGNATURE_names_do_all() argument 399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local [all...] |
H A D | m_sigver.c | 46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 107 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init() 126 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init() 128 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init() 132 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init() 148 EVP_SIGNATURE_free(signature); in do_sigver_init() 153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init() 155 if (signature != NULL) in do_sigver_init() 156 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection 21 test-16 = 16-Ed448 CipherString and Signature Algorithm Selection 24 test-19 = 19-ECDSA Signature Algorith [all...] |
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 5 provider-signature - The signature library E<lt>-E<gt> provider functions 70 /* Signature parameters */ 88 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement 89 signature algorithms and make them available to applications via the API 147 A signature algorithm implementation may not implement all of these functions. 150 set of "signature" functions, i.e. at least one of: 175 A signature algorithm must also implement some mechanism for generating, 182 structure for holding context information during a signature operation. 183 A pointer to this context will be passed back in a number of the other signature 190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | provider-signature.7 | 133 .IX Title "PROVIDER-SIGNATURE 7ossl" 134 .TH PROVIDER-SIGNATURE 7ossl "2023-09-19" "3.0.11" "OpenSSL" 140 provider\-signature \- The signature library <\-> provider functions 203 \& /* Signature parameters */ 221 The signature (\s-1OSSL_OP_SIGNATURE\s0) operation enables providers to implement 222 signature algorithms and make them available to applications via the \s-1API\s0 284 A signature algorithm implementation may not implement all of these functions. 287 set of \*(L"signature\*(R" functions, i.e. at least one of: 310 A signature algorithm must also implement some mechanism for generating, 316 structure for holding context information during a signature operation. [all …]
|
/freebsd/sys/contrib/dev/acpica/compiler/ |
H A D | dttemplate.c | 164 char *Signature); 168 char *Signature, 173 char *Signature, 185 char *Signature, 193 * PARAMETERS: Signature - ACPI table signature 195 * RETURN: TRUE if signature is a special ACPI table 204 char *Signature) in AcpiUtIsSpecialTable() argument 207 if (ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_DSDT) || in AcpiUtIsSpecialTable() 208 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_OSDT) || in AcpiUtIsSpecialTable() 209 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_SSDT) || in AcpiUtIsSpecialTable() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | efi | 17 # EFI Signature List 21 >0 guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F EFI Signature List, SIG DB 22 >0 guid 4AAFD29D-68DF-49EE-8AA9-347D375665A7 EFI Signature List, PKCS7 23 >0 guid 3C5766E8-269C-4E34-AA14-ED776E85B3B6 EFI Signature List, RSA2048 24 >0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256 25 >0 guid 67F8444F-8743-48F1-A328-1EAAB8736080 EFI Signature List, RSA2048 SHA1 26 >0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type 27 >0 guid 826CA512-CF10-4AC9-B187-BE01496631BD EFI Signature List, SHA1 28 >0 guid 0B6E5233-A65C-44C9-9407-D9AB83BFC8BD EFI Signature List, SHA224 29 >0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256 [all …]
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 1 This document describes a lightweight SSH Signature format 11 The header is the string "-----BEGIN SSH SIGNATURE-----" 13 "-----END SSH SIGNATURE-----" immediately after a newline. 15 The header MUST be present at the start of every signature. 16 Files containing the signature MUST start with the header. 18 signature. 25 -----BEGIN SSH SIGNATURE----- 30 -----END SSH SIGNATURE----- 43 string signature 46 public key used to make the signature using the usual SSH [all …]
|
H A D | PROTOCOL.u2f | 12 type as both the inputs to the signature operation and the resultant 13 signature differ from those specified for SSH. For similar reasons, 18 of "user presence" for each signature operation (typically achieved 21 given key is backed by hardware. Finally the signature format includes 22 a monotonic signature counter that can be used (at scale) to detect 38 the key handle be supplied for each signature operation. U2F tokens 59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive, 61 the signature object itself. As such they cannot be made compatible with 113 string signature key 114 string signature [all …]
|
H A D | sshsig.h | 33 * Creates a detached SSH signature for a given buffer. 35 * out is populated with the detached signature, or NULL on failure. 43 * Verifies that a detached signature is valid and optionally returns key 47 int sshsig_verifyb(struct sshbuf *signature, 54 * Creates a detached SSH signature for a given file. 56 * out is populated with the detached signature, or NULL on failure. 64 * Verifies that a detached signature over a file is valid and optionally 68 int sshsig_verify_fd(struct sshbuf *signature, int fd, 75 * Return a base64 encoded "ASCII armoured" version of a raw signature. 80 * Decode a base64 encoded armoured signature to a raw signature. [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SIGNATURE.pod | 21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature); 27 void (*fn)(EVP_SIGNATURE *signature, 30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature); 43 The algorithm will be one offering functions for performing signature related [all …]
|
H A D | ASN1_item_sign.pod | 14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 20 ASN1_BIT_STRING *signature, const void *data, 24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 28 const ASN1_BIT_STRING *signature, const void *data, 33 const ASN1_BIT_STRING *signature, const void *data, 37 const ASN1_BIT_STRING *signature, const void *data, 46 The I<data> that will be signed, and a structure containing the signature may 51 written before the signature is generated. 57 The generated signature is set into I<signature>. 68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal [all …]
|
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 44 All these functions are implemented as macros. The signature algorithm 50 If an application wishes to allow the setting of signature algorithms 54 The signature algorithms set by a client are used directly in the supported 55 signature algorithm in the client hello message. 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms [all …]
|
H A D | ECDSA_sign.pod | 7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm 49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature 50 created with the private EC key I<eckey>. To obtain the actual signature 53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value 60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned 65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a 66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the 69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is 73 during signature computation. Most applications will never need to call these 82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value [all …]
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 21 SSL_get_shared_sigalgs() returns information about the shared signature 23 of the shared signature algorithm to return starting from zero. The signature 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 45 signature algorithm it can just set B<idx> to zero. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | ASN1_item_sign.3 | 149 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 155 \& ASN1_BIT_STRING *signature, const void *data, 159 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 163 \& const ASN1_BIT_STRING *signature, const void *data, 168 \& const ASN1_BIT_STRING *signature, const void *data, 172 \& const ASN1_BIT_STRING *signature, const void *data, 181 The \fIdata\fR that will be signed, and a structure containing the signature may 186 written before the signature is generated. 192 The generated signature is set into \fIsignature\fR. 203 \&\fBASN1_item_verify_ex()\fR is used to verify the signature \fIsignature\fR of internal [all …]
|
H A D | EVP_SIGNATURE.3 | 156 \& void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 157 \& int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 158 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 159 \& int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 160 \& OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature); 162 \& void (*fn)(EVP_SIGNATURE *signature, 165 \& int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 168 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 169 \& const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature); 178 The algorithm will be one offering functions for performing signature related [all …]
|
H A D | ECDSA_sign.3 | 142 ECDSA_do_sign_ex \- deprecated low\-level elliptic curve digital signature algorithm 186 \&\fBECDSA_size()\fR returns the maximum length of a \s-1DER\s0 encoded \s-1ECDSA\s0 signature 187 created with the private \s-1EC\s0 key \fIeckey\fR. To obtain the actual signature 190 \&\fBECDSA_sign()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value 197 \&\fBECDSA_do_sign()\fR is similar to \fBECDSA_sign()\fR except the signature is returned 202 \&\fBECDSA_verify()\fR verifies that the signature in \fIsig\fR of size \fIsiglen\fR is a 203 valid \s-1ECDSA\s0 signature of the hash value \fIdgst\fR of size \fIdgstlen\fR using the 206 \&\fBECDSA_do_verify()\fR is similar to \fBECDSA_verify()\fR except the signature is 210 during signature computation. Most applications will never need to call these 219 \&\fBECDSA_sign_ex()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value [all …]
|
H A D | SSL_CTX_set1_sigalgs.3 | 143 SSL_set1_client_sigalgs_list \- set supported signature algorithms 161 \&\fBSSL_CTX_set1_sigalgs()\fR and \fBSSL_set1_sigalgs()\fR set the supported signature 167 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter 175 signature algorithms related to client authentication, otherwise they are 179 All these functions are implemented as macros. The signature algorithm 184 If an application wishes to allow the setting of signature algorithms 188 The signature algorithms set by a client are used directly in the supported 189 signature algorithm in the client hello message. 191 The supported signature algorithms set by a server are not sent to the 192 client but are used to determine the set of shared signature algorithms [all …]
|
/freebsd/lib/libsecureboot/efi/include/Guid/ |
H A D | ImageAuthentication.h | 2 Image signature database are defined for the signed image validation. 28 /// for the authorized signature database. 33 /// for the forbidden signature database. 38 /// for the timestamp signature database. 49 // Signature Database 52 /// The format of a signature database. 58 /// An identifier which identifies the agent which added the signature to the list. 62 /// The format of the signature is defined by the SignatureType. 69 /// Type of the signature. GUID signature types are defined in below. 73 /// Total size of the signature list, including this header. [all …]
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | ed448.h | 50 * signature (out): The signature. 57 * context (in): A "context" for this signature of up to 255 bytes. 66 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 77 * signature (out): The signature. 82 * context (in): A "context" for this signature of up to 255 bytes. Must be the 92 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], 101 * EdDSA signature verification. 105 * signature (in): The signature. 111 * context (in): A "context" for this signature of up to 255 bytes. 121 signature[EDDSA_448_SIGNATURE_BYTES], [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_dgst.t | 36 $testtext.": Generating signature"); 39 '-signature', $sigfile, 41 $testtext.": Verify signature with private key"); 44 '-signature', $sigfile, 46 $testtext.": Verify signature with public key"); 49 '-signature', $sigfile, 68 $testtext.": Generating signature using sha512 command"); 71 '-signature', $sigfile, 73 $testtext.": Verify signature with public key using sha512 command"); 76 '-signature', $sigfile, [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | a_verify.c | 27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument 46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify() 75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify() 76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify() 90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument 93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify() 97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument 105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex() 113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument 129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx() [all …]
|
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | StdLibraryFunctionsChecker.cpp | 679 // type in a Signature. 683 // The signature of a function we want to describe with a summary. This is a 684 // concessive signature, meaning there may be irrelevant types in the 685 // signature which we do not check against a function with concrete types. 687 class Signature { class in __anon4d759d9c0111::StdLibraryFunctionsChecker 695 // Construct a signature from optional types. If any of the optional types 696 // are not set then the signature will be invalid. 697 Signature(ArgTypes ArgTys, RetType RetTy) { in Signature() function in __anon4d759d9c0111::StdLibraryFunctionsChecker::Signature 743 /// * function prototype (signature) 751 /// The signature and argument constraints together contain information [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_ec.h | 117 * Internally, such a signature is a pair of modular integers `(r,s)`. 132 * "raw" format signature into "asn1" may enlarge a signature by no more 134 * "asn1" signature to "raw" may expand the signature but the "raw" 138 * Note that for a given signature, the "raw" format is not fully 627 * \brief Convert a signature from "raw" to "asn1". 630 * Conversion may enlarge the signature, but by no more than 9 bytes at 632 * signature length, or an oversized integer). 634 * \param sig signature to convert. 635 * \param sig_len signature length (in bytes). 636 * \return the new signature length, or 0 on error. [all …]
|