Home
last modified time | relevance | path

Searched refs:sigfile (Results 1 – 12 of 12) sorted by relevance

/freebsd/crypto/openssh/regress/
H A Dsshsig.sh48 sigfile=${OBJ}/sshsig-${keybase}.sig
56 -Ohashalg=sha1 < $DATA > $sigfile 2>/dev/null && \
66 $hashalg_arg < $DATA > $sigfile 2>/dev/null || \
70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \
99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
115 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
123 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_dgst.t30 my $sigfile = basename($privkey, '.pem') . '.sig';
34 '-out', $sigfile,
39 '-signature', $sigfile,
44 '-signature', $sigfile,
49 '-signature', $sigfile,
62 my $sigfile = basename($privkey, '.pem') . '.sig';
66 '-out', $sigfile,
71 '-signature', $sigfile,
76 '-signature', $sigfile,
81 '-signature', $sigfile,
[all …]
H A D20-test_cli_fips.t79 my $sigfile = '';
84 $sigfile = $fips_sigfile;
89 '-out', $sigfile,
97 '-signature', $sigfile,
106 '-signature', $sigfile,
116 $sigfile = $nonfips_sigfile;
122 '-out', $sigfile,
131 '-signature', $sigfile,
151 '-signature', $sigfile,
163 '-signature', $sigfile,
[all …]
H A D20-test_pkeyutl.t93 my $sigfile = basename($privkey, '.pem') . '.sig';
100 '-out', $sigfile,
109 '-out', $sigfile,
117 '-sigfile', $sigfile,
126 '-sigfile', $sigfile,
134 '-sigfile', $sigfile,
/freebsd/usr.sbin/pkg/
H A Drsa.c83 const char *data, size_t datasz, const char *sigfile, in rsa_verify_data() argument
96 if (sigfile != NULL) { in rsa_verify_data()
97 if ((pkey = load_public_key_file(sigfile)) == NULL) { in rsa_verify_data()
147 const char *sigfile, const unsigned char *key, int keylen, in rsa_verify_cert() argument
165 ret = rsa_verify_data(ctx, sha256, strlen(sha256), sigfile, key, keylen, in rsa_verify_cert()
H A Decc.c522 const char *data, size_t datasz, const char *sigfile, in ecc_verify_data() argument
531 if (sigfile != NULL) { in ecc_verify_data()
532 cbdata.keyfp = fopen(sigfile, "r"); in ecc_verify_data()
534 warn("fopen: %s", sigfile); in ecc_verify_data()
557 const char *sigfile, const unsigned char *key, int keylen, in ecc_verify_cert() argument
570 ret = ecc_verify_data(sctx, sha256, strlen(sha256), sigfile, key, in ecc_verify_cert()
H A Dpkg.c147 pkgsign_verify_cert(const struct pkgsign_ctx *ctx, int fd, const char *sigfile, in pkgsign_verify_cert() argument
151 return ((*ctx->impl->pi_ops->pkgsign_verify_cert)(ctx, fd, sigfile, in pkgsign_verify_cert()
157 size_t datasz, const char *sigfile, const unsigned char *key, int keylen, in pkgsign_verify_data() argument
162 sigfile, key, keylen, sig, siglen)); in pkgsign_verify_data()
/freebsd/lib/libsecureboot/
H A Dvets.c782 verify_ec(br_x509_pkey *pk, const char *file, const char *sigfile) in verify_ec() argument
797 if ((scp = read_file(sigfile, &slen)) == NULL) { in verify_ec()
880 verify_rsa(br_x509_pkey *pk, const char *file, const char *sigfile) in verify_rsa() argument
892 if ((scp = read_file(sigfile, &slen)) == NULL) { in verify_rsa()
945 verify_sig(const char *sigfile, int flags) in verify_sig() argument
956 DEBUG_PRINTF(5, ("verify_sig: %s\n", sigfile)); in verify_sig()
957 n = strlcpy(pbuf, sigfile, sizeof(pbuf)); in verify_sig()
958 if (n > (sizeof(pbuf) - 5) || strcmp(&sigfile[n - 3], "sig") != 0) in verify_sig()
987 ucp = verify_ec(pk, pbuf, sigfile); in verify_sig()
992 ucp = verify_rsa(pk, pbuf, sigfile); in verify_sig()
/freebsd/crypto/openssl/apps/
H A Ddgst.c105 const char *sigfile = NULL; in dgst_main() local
169 sigfile = opt_arg(); in dgst_main()
239 if (do_verify && sigfile == NULL) { in dgst_main()
393 if (sigfile != NULL && sigkey != NULL) { in dgst_main()
394 BIO *sigbio = BIO_new_file(sigfile, "rb"); in dgst_main()
397 BIO_printf(bio_err, "Error opening signature file %s\n", sigfile); in dgst_main()
405 BIO_printf(bio_err, "Error reading signature file %s\n", sigfile); in dgst_main()
H A Dpkeyutl.c111 char *infile = NULL, *outfile = NULL, *sigfile = NULL, *passinarg = NULL; in pkeyutl_main() local
152 sigfile = opt_arg(); in pkeyutl_main()
380 if (sigfile != NULL && (pkey_op != EVP_PKEY_OP_VERIFY)) { in pkeyutl_main()
386 if (sigfile == NULL && (pkey_op == EVP_PKEY_OP_VERIFY)) { in pkeyutl_main()
407 if (sigfile != NULL) { in pkeyutl_main()
408 BIO *sigbio = BIO_new_file(sigfile, "rb"); in pkeyutl_main()
411 BIO_printf(bio_err, "Can't open signature file %s\n", sigfile); in pkeyutl_main()
/freebsd/lib/libsecureboot/openpgp/
H A Dopgp_sig.c467 verify_asc(const char *sigfile, int flags)
476 if ((sdata = read_file(sigfile, &sbytes))) {
477 n = strlcpy(pbuf, sigfile, sizeof(pbuf));
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in16 [B<-sigfile> I<file>]
93 =item B<-sigfile> I<file>
148 Verify the input data against the signature given with the B<-sigfile> option
396 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem
429 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \