/freebsd/crypto/libecc/scripts/ |
H A D | test_ec_utils.sh | 27 signatures=("ECDSA" "ECKCDSA" "ECSDSA" "ECOSDSA" "ECFSDSA" "ECGDSA" "ECRDSA" "SM2" "EDDSA25519" "ED… 32 for s in "${!signatures[@]}" 36 …if [[ "${signatures[s]}" == "EDDSA25519" || "${signatures[s]}" == "EDDSA25519CTX" || "${signatures… 43 if [[ "${signatures[s]}" == "EDDSA448" || "${signatures[s]}" == "EDDSA448PH" ]] 50 echo "===== ${curves[c]} ${signatures[s]}" 51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0 54 …if [[ "${signatures[s]}" == "EDDSA25519" || "${signatures[s]}" == "EDDSA25519CTX" || "${signatures… 61 if [[ "${signatures[s]}" == "EDDSA448" || "${signatures[s]}" == "EDDSA448PH" ]] 68 echo "========= TESTING ${curves[c]} ${signatures[s]} ${hashes[h]}" 70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe… [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Support/ |
H A D | BalancedPartitioning.cpp | 181 // Renumber utility nodes so they can be used to index into Signatures in runIterations() 187 // Initialize signatures in runIterations() 188 SignaturesT Signatures(/*Size=*/UtilityNodeIndex.size()); in runIterations() local 191 assert(UN < Signatures.size()); in runIterations() 193 Signatures[UN].LeftCount++; in runIterations() 195 Signatures[UN].RightCount++; in runIterations() 202 runIteration(Nodes, LeftBucket, RightBucket, Signatures, RNG); in runIterations() 211 SignaturesT &Signatures, in runIteration() argument 214 for (auto &Signature : Signatures) { in runIteration() 235 float Gain = moveGain(N, FromLeftToRight, Signatures); in runIteration() [all …]
|
/freebsd/lib/libsecureboot/ |
H A D | README.rst | 5 signatures. 75 Signatures section in OpenPGP 78 We expect ascii armored (``.asc``) detached signatures 85 We only support version 4 signatures using RSA (the default for ``gpg``). 104 Signatures section in OpenSSL 107 For Junos we currently use EC DSA signatures with file extension 117 generate signatures compatible with our previous RSA scheme and 120 Otherwise our EC DSA and RSA signatures are the default used by 122 signatures using nothing but an ``openssl`` binary.
|
/freebsd/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 23 ldns_rr_list *signatures; member 129 /** for debugging, add signatures too (you might want 165 * relevant signatures are printed too 182 * relevant signatures are printed too 324 * signatures 335 * signatures 363 * Verifies a list of signatures for one rrset. 366 * \param[in] rrsig a list of signatures to check 369 * from keys that validate one of the signatures 379 * Verifies a list of signatures for one rrset. [all …]
|
H A D | dnssec_sign.h | 45 * \return a rr_list with the signatures 155 * remove signatures if callback function tells to 157 * \param[in] signatures list of signatures to check, and 165 * \returns pointer to the new signatures rrs (the original 168 ldns_dnssec_rrs *ldns_dnssec_remove_signatures(ldns_dnssec_rrs *signatures, 174 * Adds signatures to the zone 182 * use and what to do with old signatures 199 * Adds signatures to the zone 207 * use and what to do with old signatures 223 * \param[in] func callback function that decides what to do with old signatures [all …]
|
H A D | dnssec.h | 104 * Returns a ldns_rr_list containing the signatures covering the given name 110 * Returns a ldns_rr_list containing the signatures covering the given type 471 * Default callback function to always leave present signatures, and 479 * Default callback function to always leave present signatures, and 480 * add no new ones for the keys of these signatures 487 * Default callback function to always remove present signatures, but 495 * Default callback function to always leave present signatures, and
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 4 At present, only detached and armored signatures are supported. 8 The Armored SSH signatures consist of a header, a base64 50 Verifiers MUST reject signatures with versions greater than those 55 This prevents cross-protocol attacks caused by signatures 70 encoding rules for the chosen key type. For RSA signatures, the 90 ensure that manual signatures can never be confused with any message
|
H A D | PROTOCOL.krl | 196 Note: KRL signatures are not supported by OpenSSH. OpenSSH >= 9.4 will 197 refuse to load KRLs that contain signatures. We recommend the use 198 of SSHSIG (`ssh-keygen -Y sign ...`) style signatures for KRLs instead. 219 signatures. Signature sections are optional for KRLs distributed by
|
H A D | PROTOCOL.u2f | 39 primarily use ECDSA signatures in the NIST-P256 field, though the FIDO2 173 OpenSSH treats the attestation certificate and enrollment signatures as 176 SSH U2F signatures 222 webauthn signatures 228 messages. OpenSSH supports ECDSA/p256 webauthn signatures through the
|
/freebsd/crypto/openssl/providers/common/der/ |
H A D | EC.asn1 | 17 id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) } 19 -- OID for ECDSA signatures with SHA-1 70 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 } 73 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 } 76 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 } 79 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
|
H A D | der_ec_gen.c | 222 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 } 230 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 } 238 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 } 246 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
|
/freebsd/contrib/ldns/ |
H A D | dnssec_zone.c | 112 new_rrsets->signatures = NULL; in ldns_dnssec_rrsets_new() 127 if (rrsets->signatures) { in ldns_dnssec_rrsets_free_internal() 128 ldns_dnssec_rrs_free_internal(rrsets->signatures, deep); in ldns_dnssec_rrsets_free_internal() 186 new_rrsets->signatures = ldns_dnssec_rrs_new(); in ldns_dnssec_rrsets_new_frm_rr() 187 new_rrsets->signatures->rr = rr; in ldns_dnssec_rrsets_new_frm_rr() 212 if (!rrsets->rrs && rrsets->type == 0 && !rrsets->signatures) { in ldns_dnssec_rrsets_add_rr() 218 rrsets->signatures = ldns_dnssec_rrs_new(); in ldns_dnssec_rrsets_add_rr() 219 rrsets->signatures->rr = rr; in ldns_dnssec_rrsets_add_rr() 238 new_rrsets->signatures = rrsets->signatures; in ldns_dnssec_rrsets_add_rr() 243 rrsets->signatures = NULL; in ldns_dnssec_rrsets_add_rr() [all …]
|
H A D | dnssec_sign.c | 225 * return the created signatures 230 ldns_rr_list *signatures; in ldns_sign_public() local 262 signatures = ldns_rr_list_new(); in ldns_sign_public() 273 ldns_rr_list_free(signatures); in ldns_sign_public() 296 ldns_rr_list_deep_free(signatures); in ldns_sign_public() 306 ldns_rr_list_deep_free(signatures); in ldns_sign_public() 316 ldns_rr_list_deep_free(signatures); in ldns_sign_public() 322 /* push the signature to the signatures list */ in ldns_sign_public() 323 ldns_rr_list_push_rr(signatures, current_sig); in ldns_sign_public() 329 return signatures; in ldns_sign_public() [all …]
|
H A D | dnssec_verify.c | 29 nc->signatures = NULL; in ldns_dnssec_data_chain_new() 48 ldns_rr_list_deep_free(chain->signatures); in ldns_dnssec_data_chain_deep_free() 83 ldns_rr_list_print_fmt(out, fmt, chain->signatures); in ldns_dnssec_data_chain_print_fmt() 102 ldns_rr_list *signatures, in ldns_dnssec_build_data_chain_dnskey() argument 108 if (signatures && ldns_rr_list_rr_count(signatures) > 0) { in ldns_dnssec_build_data_chain_dnskey() 109 new_chain->signatures = ldns_rr_list_clone(signatures); in ldns_dnssec_build_data_chain_dnskey() 167 * add all signatures to current level in ldns_dnssec_build_data_chain_other() 208 if (new_chain->signatures) { in ldns_dnssec_build_data_chain_other() 210 ldns_rr_list_deep_free(new_chain->signatures); in ldns_dnssec_build_data_chain_other() 213 new_chain->signatures = signatures2; in ldns_dnssec_build_data_chain_other() [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_rsa.h | 124 * - When verifying PKCS#1 v1.5 signatures, both variants of the hash 126 * supported. When producing such signatures, the variant with the 486 * \brief Encoded OID for SHA-1 (in RSA PKCS#1 signatures). 492 * \brief Encoded OID for SHA-224 (in RSA PKCS#1 signatures). 498 * \brief Encoded OID for SHA-256 (in RSA PKCS#1 signatures). 504 * \brief Encoded OID for SHA-384 (in RSA PKCS#1 signatures). 510 * \brief Encoded OID for SHA-512 (in RSA PKCS#1 signatures). 576 * \brief RSA signature verification engine "i32" (PKCS#1 v1.5 signatures). 593 * \brief RSA signature verification engine "i32" (PSS signatures). 623 * \brief RSA signature generation engine "i32" (PKCS#1 v1.5 signatures). [all …]
|
/freebsd/contrib/unbound/validator/ |
H A D | validator.h | 91 /** clock skew min for signatures */ 94 /** clock skew max for signatures */ 223 /** The rrset index for the msg signatures to continue from */ 229 /** The timer to resume processing msg signatures */ 280 /** Timer callback for msg signatures continue timer */
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | fsav | 8 0 beshort 0x1575 fsav macro virus signatures 17 #>>>>11 uleshort >0 fsav DOS/Windows virus signatures (%d- 37 #>>>>>13 ubyte >0 fsav virus signatures 74 >>>>&1 regex \^[^:]{1,10} \b, %s signatures
|
/freebsd/contrib/llvm-project/llvm/lib/Target/DirectX/ |
H A D | DXILMetadata.cpp | 236 MDTuple *Signatures = nullptr; in emitEntryTuple() local 238 &F, F.getName().str(), Signatures, Resources, in emitEntryTuple() 245 MDTuple *Signatures = nullptr; in emitEntryTupleForLib() local 247 &F, F.getName().str(), Signatures, in emitEntryTupleForLib() 264 MDTuple *Signatures, in emitDXILEntryPointTuple() argument 271 MDVals[2] = Signatures; in emitDXILEntryPointTuple()
|
/freebsd/crypto/openssh/regress/ |
H A D | agent-pkcs11-cert.sh | 59 # Verify that all can perform signatures. 67 # Verify that certs can still perform signatures. 89 # Verify that certs can perform signatures.
|
/freebsd/lib/libsecureboot/efi/include/Guid/ |
H A D | ImageAuthentication.h | 77 /// Size of the signature header which precedes the array of signatures. 85 /// Header before the array of signatures. The format of this header is specified 89 /// An array of signatures. Each signature is SignatureSize bytes in length. 90 /// EFI_SIGNATURE_DATA Signatures[][SignatureSize]; 317 /// Zero or more image signatures. If the image contained no signatures,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | PKCS7_sign.pod | 41 though. This can reduce the size of the signatures if the signer's certificates 46 detached signatures which are used in S/MIME plaintext signed messages for 103 Some advanced attributes such as counter signatures are not supported.
|
H A D | PKCS7_verify.pod | 32 B<not> check their validity or whether any signatures are valid. The I<certs> 66 If all signatures verify correctly then the function is successful. 89 If B<PKCS7_NOSIGS> is set then the signatures on the data are not checked.
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 116 * OID for hash functions in RSA signatures. 372 \ Length of Signatures extension. 373 : ext-signatures-length ( -- len ) 431 ext-signatures-length + 510 ext-signatures-length if 512 ext-signatures-length 4 - dup write16 \ extension length 713 ext-signatures-length { ok-signatures } 757 ok-signatures ifnot 760 0 >ok-signatures 871 \ either MD5+SHA-1 (for RSA signatures) or SHA-1 (for ECDSA). [all …]
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Core/ |
H A D | DataFileCache.h | 106 /// signature and then encode and decode them to validate the signatures 135 /// Cache signatures are considered valid only if there is a UUID in the file 141 /// Check if two signatures are the same. 147 /// Check if two signatures differ.
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 44 signatures using message digests. 81 signatures using B<-hex>. 251 When verifying signatures, it only handles the RSA, DSA, or ECDSA signature 261 Hex signatures cannot be verified using B<openssl>. Instead, use "xxd -r"
|