Home
last modified time | relevance | path

Searched full:signatures (Results 1 – 25 of 507) sorted by relevance

12345678910>>...21

/freebsd/crypto/libecc/scripts/
H A Dtest_ec_utils.sh27 signatures=("ECDSA" "ECKCDSA" "ECSDSA" "ECOSDSA" "ECFSDSA" "ECGDSA" "ECRDSA" "SM2" "EDDSA25519" "ED…
32 for s in "${!signatures[@]}"
36 …if [[ "${signatures[s]}" == "EDDSA25519" || "${signatures[s]}" == "EDDSA25519CTX" || "${signatures
43 if [[ "${signatures[s]}" == "EDDSA448" || "${signatures[s]}" == "EDDSA448PH" ]]
50 echo "===== ${curves[c]} ${signatures[s]}"
51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0
54 …if [[ "${signatures[s]}" == "EDDSA25519" || "${signatures[s]}" == "EDDSA25519CTX" || "${signatures
61 if [[ "${signatures[s]}" == "EDDSA448" || "${signatures[s]}" == "EDDSA448PH" ]]
68 echo "========= TESTING ${curves[c]} ${signatures[s]} ${hashes[h]}"
70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe…
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Support/
H A DBalancedPartitioning.cpp181 // Renumber utility nodes so they can be used to index into Signatures in runIterations()
187 // Initialize signatures in runIterations()
188 SignaturesT Signatures(/*Size=*/UtilityNodeIndex.size()); in runIterations() local
191 assert(UN < Signatures.size()); in runIterations()
193 Signatures[UN].LeftCount++; in runIterations()
195 Signatures[UN].RightCount++; in runIterations()
202 runIteration(Nodes, LeftBucket, RightBucket, Signatures, RNG); in runIterations()
211 SignaturesT &Signatures, in runIteration() argument
214 for (auto &Signature : Signatures) { in runIteration()
235 float Gain = moveGain(N, FromLeftToRight, Signatures); in runIteration()
[all …]
/freebsd/lib/libsecureboot/
H A DREADME.rst5 signatures.
75 Signatures section in OpenPGP
78 We expect ascii armored (``.asc``) detached signatures
85 We only support version 4 signatures using RSA (the default for ``gpg``).
104 Signatures section in OpenSSL
107 For Junos we currently use EC DSA signatures with file extension
117 generate signatures compatible with our previous RSA scheme and
120 Otherwise our EC DSA and RSA signatures are the default used by
122 signatures using nothing but an ``openssl`` binary.
/freebsd/contrib/ldns/ldns/
H A Ddnssec_verify.h23 ldns_rr_list *signatures; member
129 /** for debugging, add signatures too (you might want
165 * relevant signatures are printed too
182 * relevant signatures are printed too
324 * signatures
335 * signatures
363 * Verifies a list of signatures for one rrset.
366 * \param[in] rrsig a list of signatures to check
369 * from keys that validate one of the signatures
379 * Verifies a list of signatures for one rrset.
[all …]
H A Ddnssec_sign.h45 * \return a rr_list with the signatures
155 * remove signatures if callback function tells to
157 * \param[in] signatures list of signatures to check, and
165 * \returns pointer to the new signatures rrs (the original
168 ldns_dnssec_rrs *ldns_dnssec_remove_signatures(ldns_dnssec_rrs *signatures,
174 * Adds signatures to the zone
182 * use and what to do with old signatures
199 * Adds signatures to the zone
207 * use and what to do with old signatures
223 * \param[in] func callback function that decides what to do with old signatures
[all …]
H A Ddnssec.h104 * Returns a ldns_rr_list containing the signatures covering the given name
110 * Returns a ldns_rr_list containing the signatures covering the given type
471 * Default callback function to always leave present signatures, and
479 * Default callback function to always leave present signatures, and
480 * add no new ones for the keys of these signatures
487 * Default callback function to always remove present signatures, but
495 * Default callback function to always leave present signatures, and
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig4 At present, only detached and armored signatures are supported.
8 The Armored SSH signatures consist of a header, a base64
50 Verifiers MUST reject signatures with versions greater than those
55 This prevents cross-protocol attacks caused by signatures
70 encoding rules for the chosen key type. For RSA signatures, the
90 ensure that manual signatures can never be confused with any message
H A DPROTOCOL.krl196 Note: KRL signatures are not supported by OpenSSH. OpenSSH >= 9.4 will
197 refuse to load KRLs that contain signatures. We recommend the use
198 of SSHSIG (`ssh-keygen -Y sign ...`) style signatures for KRLs instead.
219 signatures. Signature sections are optional for KRLs distributed by
H A DPROTOCOL.u2f39 primarily use ECDSA signatures in the NIST-P256 field, though the FIDO2
173 OpenSSH treats the attestation certificate and enrollment signatures as
176 SSH U2F signatures
222 webauthn signatures
228 messages. OpenSSH supports ECDSA/p256 webauthn signatures through the
/freebsd/crypto/openssl/providers/common/der/
H A DEC.asn117 id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) }
19 -- OID for ECDSA signatures with SHA-1
70 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 }
73 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 }
76 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 }
79 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
H A Dder_ec_gen.c222 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 }
230 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 }
238 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 }
246 * us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
/freebsd/contrib/ldns/
H A Ddnssec_zone.c112 new_rrsets->signatures = NULL; in ldns_dnssec_rrsets_new()
127 if (rrsets->signatures) { in ldns_dnssec_rrsets_free_internal()
128 ldns_dnssec_rrs_free_internal(rrsets->signatures, deep); in ldns_dnssec_rrsets_free_internal()
186 new_rrsets->signatures = ldns_dnssec_rrs_new(); in ldns_dnssec_rrsets_new_frm_rr()
187 new_rrsets->signatures->rr = rr; in ldns_dnssec_rrsets_new_frm_rr()
212 if (!rrsets->rrs && rrsets->type == 0 && !rrsets->signatures) { in ldns_dnssec_rrsets_add_rr()
218 rrsets->signatures = ldns_dnssec_rrs_new(); in ldns_dnssec_rrsets_add_rr()
219 rrsets->signatures->rr = rr; in ldns_dnssec_rrsets_add_rr()
238 new_rrsets->signatures = rrsets->signatures; in ldns_dnssec_rrsets_add_rr()
243 rrsets->signatures = NULL; in ldns_dnssec_rrsets_add_rr()
[all …]
H A Ddnssec_sign.c225 * return the created signatures
230 ldns_rr_list *signatures; in ldns_sign_public() local
262 signatures = ldns_rr_list_new(); in ldns_sign_public()
273 ldns_rr_list_free(signatures); in ldns_sign_public()
296 ldns_rr_list_deep_free(signatures); in ldns_sign_public()
306 ldns_rr_list_deep_free(signatures); in ldns_sign_public()
316 ldns_rr_list_deep_free(signatures); in ldns_sign_public()
322 /* push the signature to the signatures list */ in ldns_sign_public()
323 ldns_rr_list_push_rr(signatures, current_sig); in ldns_sign_public()
329 return signatures; in ldns_sign_public()
[all …]
H A Ddnssec_verify.c29 nc->signatures = NULL; in ldns_dnssec_data_chain_new()
48 ldns_rr_list_deep_free(chain->signatures); in ldns_dnssec_data_chain_deep_free()
83 ldns_rr_list_print_fmt(out, fmt, chain->signatures); in ldns_dnssec_data_chain_print_fmt()
102 ldns_rr_list *signatures, in ldns_dnssec_build_data_chain_dnskey() argument
108 if (signatures && ldns_rr_list_rr_count(signatures) > 0) { in ldns_dnssec_build_data_chain_dnskey()
109 new_chain->signatures = ldns_rr_list_clone(signatures); in ldns_dnssec_build_data_chain_dnskey()
167 * add all signatures to current level in ldns_dnssec_build_data_chain_other()
208 if (new_chain->signatures) { in ldns_dnssec_build_data_chain_other()
210 ldns_rr_list_deep_free(new_chain->signatures); in ldns_dnssec_build_data_chain_other()
213 new_chain->signatures = signatures2; in ldns_dnssec_build_data_chain_other()
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_rsa.h124 * - When verifying PKCS#1 v1.5 signatures, both variants of the hash
126 * supported. When producing such signatures, the variant with the
486 * \brief Encoded OID for SHA-1 (in RSA PKCS#1 signatures).
492 * \brief Encoded OID for SHA-224 (in RSA PKCS#1 signatures).
498 * \brief Encoded OID for SHA-256 (in RSA PKCS#1 signatures).
504 * \brief Encoded OID for SHA-384 (in RSA PKCS#1 signatures).
510 * \brief Encoded OID for SHA-512 (in RSA PKCS#1 signatures).
576 * \brief RSA signature verification engine "i32" (PKCS#1 v1.5 signatures).
593 * \brief RSA signature verification engine "i32" (PSS signatures).
623 * \brief RSA signature generation engine "i32" (PKCS#1 v1.5 signatures).
[all …]
/freebsd/contrib/unbound/validator/
H A Dvalidator.h91 /** clock skew min for signatures */
94 /** clock skew max for signatures */
223 /** The rrset index for the msg signatures to continue from */
229 /** The timer to resume processing msg signatures */
280 /** Timer callback for msg signatures continue timer */
/freebsd/contrib/file/magic/Magdir/
H A Dfsav8 0 beshort 0x1575 fsav macro virus signatures
17 #>>>>11 uleshort >0 fsav DOS/Windows virus signatures (%d-
37 #>>>>>13 ubyte >0 fsav virus signatures
74 >>>>&1 regex \^[^:]{1,10} \b, %s signatures
/freebsd/contrib/llvm-project/llvm/lib/Target/DirectX/
H A DDXILMetadata.cpp236 MDTuple *Signatures = nullptr; in emitEntryTuple() local
238 &F, F.getName().str(), Signatures, Resources, in emitEntryTuple()
245 MDTuple *Signatures = nullptr; in emitEntryTupleForLib() local
247 &F, F.getName().str(), Signatures, in emitEntryTupleForLib()
264 MDTuple *Signatures, in emitDXILEntryPointTuple() argument
271 MDVals[2] = Signatures; in emitDXILEntryPointTuple()
/freebsd/crypto/openssh/regress/
H A Dagent-pkcs11-cert.sh59 # Verify that all can perform signatures.
67 # Verify that certs can still perform signatures.
89 # Verify that certs can perform signatures.
/freebsd/lib/libsecureboot/efi/include/Guid/
H A DImageAuthentication.h77 /// Size of the signature header which precedes the array of signatures.
85 /// Header before the array of signatures. The format of this header is specified
89 /// An array of signatures. Each signature is SignatureSize bytes in length.
90 /// EFI_SIGNATURE_DATA Signatures[][SignatureSize];
317 /// Zero or more image signatures. If the image contained no signatures,
/freebsd/crypto/openssl/doc/man3/
H A DPKCS7_sign.pod41 though. This can reduce the size of the signatures if the signer's certificates
46 detached signatures which are used in S/MIME plaintext signed messages for
103 Some advanced attributes such as counter signatures are not supported.
H A DPKCS7_verify.pod32 B<not> check their validity or whether any signatures are valid. The I<certs>
66 If all signatures verify correctly then the function is successful.
89 If B<PKCS7_NOSIGS> is set then the signatures on the data are not checked.
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_hs_client.t0116 * OID for hash functions in RSA signatures.
372 \ Length of Signatures extension.
373 : ext-signatures-length ( -- len )
431 ext-signatures-length +
510 ext-signatures-length if
512 ext-signatures-length 4 - dup write16 \ extension length
713 ext-signatures-length { ok-signatures }
757 ok-signatures ifnot
760 0 >ok-signatures
871 \ either MD5+SHA-1 (for RSA signatures) or SHA-1 (for ECDSA).
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Core/
H A DDataFileCache.h106 /// signature and then encode and decode them to validate the signatures
135 /// Cache signatures are considered valid only if there is a UUID in the file
141 /// Check if two signatures are the same.
147 /// Check if two signatures differ.
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-dgst.pod.in44 signatures using message digests.
81 signatures using B<-hex>.
251 When verifying signatures, it only handles the RSA, DSA, or ECDSA signature
261 Hex signatures cannot be verified using B<openssl>. Instead, use "xxd -r"

12345678910>>...21