/freebsd/crypto/openssl/crypto/evp/ |
H A D | signature.c | 35 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local 37 if (signature == NULL) in evp_signature_new() 40 if (!CRYPTO_NEW_REF(&signature->refcnt, 1) in evp_signature_new() 42 CRYPTO_FREE_REF(&signature->refcnt); in evp_signature_new() 43 OPENSSL_free(signature); in evp_signature_new() 47 signature->prov = prov; in evp_signature_new() 49 return signature; in evp_signature_new() 57 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local 67 if ((signature = evp_signature_new(prov)) == NULL) { in evp_signature_from_algorithm() 72 signature->name_id = name_id; in evp_signature_from_algorithm() [all …]
|
H A D | m_sigver.c | 44 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 79 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 101 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init() 120 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init() 122 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init() 126 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init() 142 EVP_SIGNATURE_free(signature); in do_sigver_init() 147 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init() 149 if (signature != NULL) in do_sigver_init() 150 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init() [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | provider-signature.7 | 57 .IX Title "PROVIDER-SIGNATURE 7ossl" 58 .TH PROVIDER-SIGNATURE 7ossl 2025-09-30 3.5.4 OpenSSL 64 provider\-signature \- The signature library <\-> provider functions 82 \& /* Get the key types that a signature algorithm supports */ 107 \& * OSSL_FUNC_signature_verify_message_final requires that the signature to be 108 \& * verified is specified via a "signature" OSSL_PARAM, which is given with a 146 \& /* Signature parameters */ 164 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement 165 signature algorithms and make them available to applications via the API 233 A signature algorithm implementation may not implement all of these functions. [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ml_dsa_sigver.txt | 14 # modified signature - hint 25 # modified signature - z 48 # modified signature - z 60 # modified signature - hint 83 # valid signature and message - signature should verify successfully 93 # valid signature and message - signature should verify successfully 104 # modified signature - hint 115 # modified signature - commitment 127 # modified signature - commitment 138 # valid signature and message - signature should verify successfully [all …]
|
H A D | evppkey_slh_dsa_sigver.txt | 14 # invalid signature - too small 38 # invalid signature - too large 50 # invalid signature - too large 62 # modified signature - SIGFORS 74 # modified signature - SIGFORS 86 # modified signature - SIGHT 98 # modified signature - R 110 # valid signature and message - signature should verify successfully 121 # invalid signature - too small 133 # modified signature - SIGHT [all …]
|
H A D | evppkey_ml_dsa_65_wycheproof_verify.txt | 59 # 6 short signature 68 # 7 long signature 77 # 8 signature with a bit flip in c_tilde 86 # 9 signature with a bit flip in z[0] 95 # 10 signature with a bit flip in z[1] 104 # 11 signature with a bit flip in z[2] 113 # 12 signature with a bit flip in z[3] 122 # 13 signature with a bit flip in z[4] 131 # 14 signature with a bit flip in hints 140 # 15 signature with a bit flip in the last byte [all …]
|
H A D | evppkey_ml_dsa_87_wycheproof_verify.txt | 59 # 6 short signature 68 # 7 long signature 77 # 8 signature with a bit flip in c_tilde 86 # 9 signature with a bit flip in z[0] 95 # 10 signature with a bit flip in z[1] 104 # 11 signature with a bit flip in z[2] 113 # 12 signature with a bit flip in z[3] 122 # 13 signature with a bit flip in z[4] 131 # 14 signature with a bit flip in z[5] 140 # 15 signature with a bit flip in z[6] [all …]
|
H A D | evppkey_ml_dsa_44_wycheproof_verify.txt | 59 # 6 short signature 68 # 7 long signature 77 # 8 signature with a bit flip in c_tilde 86 # 9 signature with a bit flip in z[0] 95 # 10 signature with a bit flip in z[1] 104 # 11 signature with a bit flip in z[2] 113 # 12 signature with a bit flip in z[3] 122 # 13 signature with a bit flip in hints 131 # 14 signature with a bit flip in the last byte 140 # 15 signature with hints in reverse order [all …]
|
H A D | evppkey_ml_dsa_65_wycheproof_sign.txt | 59 # 6 signature that takes 1 iteration(s) 67 # 7 signature that takes 2 iteration(s) 75 # 8 signature that takes 3 iteration(s) 83 # 9 signature that takes 4 iteration(s) 91 # 10 signature that takes 5 iteration(s) 99 # 11 signature that takes 6 iteration(s) 107 # 12 signature that takes 7 iteration(s) 115 # 13 signature that takes 8 iteration(s) 123 # 14 signature that takes 9 iteration(s) 131 # 15 signature that takes 10 iteration(s) [all …]
|
H A D | evppkey_ml_dsa_44_wycheproof_sign.txt | 59 # 6 signature that takes 1 iteration(s) 67 # 7 signature that takes 2 iteration(s) 75 # 8 signature that takes 3 iteration(s) 83 # 9 signature that takes 4 iteration(s) 91 # 10 signature that takes 5 iteration(s) 99 # 11 signature that takes 6 iteration(s) 107 # 12 signature that takes 7 iteration(s) 115 # 13 signature that takes 8 iteration(s) 123 # 14 signature that takes 9 iteration(s) 131 # 15 signature that takes 10 iteration(s) [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection 21 test-16 = 16-Ed448 CipherString and Signature Algorithm Selection 24 test-19 = 19-ECDSA Signature Algorithm Selection SHA1 [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 5 provider-signature - The signature library E<lt>-E<gt> provider functions 25 /* Get the key types that a signature algorithm supports */ 50 * OSSL_FUNC_signature_verify_message_final requires that the signature to be 51 * verified is specified via a "signature" OSSL_PARAM, which is given with a 89 /* Signature parameters */ 107 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement 108 signature algorithms and make them available to applications via the API 172 A signature algorithm implementation may not implement all of these functions. 175 set of "signature" functions, i.e. at least one of: 215 indicating the key types supported by the provider for signature operations. [all …]
|
/freebsd/sys/contrib/dev/acpica/compiler/ |
H A D | dttemplate.c | 164 char *Signature); 168 char *Signature, 173 char *Signature, 185 char *Signature, 193 * PARAMETERS: Signature - ACPI table signature 195 * RETURN: TRUE if signature is a special ACPI table 204 char *Signature) in AcpiUtIsSpecialTable() argument 207 if (ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_DSDT) || in AcpiUtIsSpecialTable() 208 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_OSDT) || in AcpiUtIsSpecialTable() 209 ACPI_COMPARE_NAMESEG (Signature, ACPI_SIG_SSDT) || in AcpiUtIsSpecialTable() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | efi | 17 # EFI Signature List 21 >0 guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F EFI Signature List, SIG DB 22 >0 guid 4AAFD29D-68DF-49EE-8AA9-347D375665A7 EFI Signature List, PKCS7 23 >0 guid 3C5766E8-269C-4E34-AA14-ED776E85B3B6 EFI Signature List, RSA2048 24 >0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256 25 >0 guid 67F8444F-8743-48F1-A328-1EAAB8736080 EFI Signature List, RSA2048 SHA1 26 >0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type 27 >0 guid 826CA512-CF10-4AC9-B187-BE01496631BD EFI Signature List, SHA1 28 >0 guid 0B6E5233-A65C-44C9-9407-D9AB83BFC8BD EFI Signature List, SHA224 29 >0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256 [all …]
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 1 This document describes a lightweight SSH Signature format 11 The header is the string "-----BEGIN SSH SIGNATURE-----" 13 "-----END SSH SIGNATURE-----" immediately after a newline. 15 The header MUST be present at the start of every signature. 16 Files containing the signature MUST start with the header. 18 signature. 25 -----BEGIN SSH SIGNATURE----- 30 -----END SSH SIGNATURE----- 43 string signature 46 public key used to make the signature using the usual SSH [all …]
|
H A D | PROTOCOL.u2f | 12 type as both the inputs to the signature operation and the resultant 13 signature differ from those specified for SSH. For similar reasons, 18 of "user presence" for each signature operation (typically achieved 21 given key is backed by hardware. Finally the signature format includes 22 a monotonic signature counter that can be used (at scale) to detect 38 the key handle be supplied for each signature operation. U2F tokens 59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive, 61 the signature object itself. As such they cannot be made compatible with 113 string signature key 114 string signature [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SIGNATURE.pod | 21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature); 27 void (*fn)(EVP_SIGNATURE *signature, 30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature); 43 The algorithm will be one offering functions for performing signature related [all …]
|
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 37 Signature scheme names and public key algorithm names (but not the digest 45 signature algorithms related to client authentication, otherwise they are 49 All these functions are implemented as macros. The signature algorithm 55 If an application wishes to allow the setting of signature algorithms 59 The signature algorithms set by a client are used directly in the supported 60 signature algorithm in the client hello message. 62 The supported signature algorithms set by a server are not sent to the [all …]
|
H A D | ASN1_item_sign.pod | 14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 20 ASN1_BIT_STRING *signature, const void *data, 24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 28 const ASN1_BIT_STRING *signature, const void *data, 33 const ASN1_BIT_STRING *signature, const void *data, 37 const ASN1_BIT_STRING *signature, const void *data, 46 The I<data> that will be signed, and a structure containing the signature may 51 written before the signature is generated. 57 The generated signature is set into I<signature>. 68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal [all …]
|
H A D | ECDSA_sign.pod | 7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm 49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature 50 created with the private EC key I<eckey>. To obtain the actual signature 53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value 60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned 65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a 66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the 69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is 73 during signature computation. Most applications will never need to call these 82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | ASN1_item_sign.3 | 73 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 79 \& ASN1_BIT_STRING *signature, const void *data, 83 \& X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 87 \& const ASN1_BIT_STRING *signature, const void *data, 92 \& const ASN1_BIT_STRING *signature, const void *data, 96 \& const ASN1_BIT_STRING *signature, const void *data, 105 The \fIdata\fR that will be signed, and a structure containing the signature may 110 written before the signature is generated. 116 The generated signature is set into \fIsignature\fR. 127 \&\fBASN1_item_verify_ex()\fR is used to verify the signature \fIsignature\fR of internal [all …]
|
H A D | EVP_SIGNATURE.3 | 80 \& void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 81 \& int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 82 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 83 \& int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 84 \& OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature); 86 \& void (*fn)(EVP_SIGNATURE *signature, 89 \& int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 92 \& const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 93 \& const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature); 102 The algorithm will be one offering functions for performing signature related [all …]
|
H A D | SSL_CTX_set1_sigalgs.3 | 67 SSL_set1_client_sigalgs_list \- set supported signature algorithms 85 \&\fBSSL_CTX_set1_sigalgs()\fR and \fBSSL_set1_sigalgs()\fR set the supported signature 91 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter 96 Signature scheme names and public key algorithm names (but not the digest 103 signature algorithms related to client authentication, otherwise they are 107 All these functions are implemented as macros. The signature algorithm 112 If an application wishes to allow the setting of signature algorithms 116 The signature algorithms set by a client are used directly in the supported 117 signature algorithm in the client hello message. 119 The supported signature algorithms set by a server are not sent to the [all …]
|
H A D | ECDSA_sign.3 | 66 ECDSA_do_sign_ex \- deprecated low\-level elliptic curve digital signature algorithm 110 \&\fBECDSA_size()\fR returns the maximum length of a DER encoded ECDSA signature 111 created with the private EC key \fIeckey\fR. To obtain the actual signature 114 \&\fBECDSA_sign()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value 121 \&\fBECDSA_do_sign()\fR is similar to \fBECDSA_sign()\fR except the signature is returned 126 \&\fBECDSA_verify()\fR verifies that the signature in \fIsig\fR of size \fIsiglen\fR is a 127 valid ECDSA signature of the hash value \fIdgst\fR of size \fIdgstlen\fR using the 130 \&\fBECDSA_do_verify()\fR is similar to \fBECDSA_verify()\fR except the signature is 134 during signature computation. Most applications will never need to call these 143 \&\fBECDSA_sign_ex()\fR computes a digital signature of the \fIdgstlen\fR bytes hash value [all …]
|
/freebsd/lib/libsecureboot/efi/include/Guid/ |
H A D | ImageAuthentication.h | 2 Image signature database are defined for the signed image validation. 28 /// for the authorized signature database. 33 /// for the forbidden signature database. 38 /// for the timestamp signature database. 49 // Signature Database 52 /// The format of a signature database. 58 /// An identifier which identifies the agent which added the signature to the list. 62 /// The format of the signature is defined by the SignatureType. 69 /// Type of the signature. GUID signature types are defined in below. 73 /// Total size of the signature list, including this header. [all …]
|