/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 48 sigfile=${OBJ}/sshsig-${keybase}.sig 56 -Ohashalg=sha1 < $DATA > $sigfile 2>/dev/null && \ 66 $hashalg_arg < $DATA > $sigfile 2>/dev/null || \ 70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \ 99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 115 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 123 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_dgst.t | 30 my $sigfile = basename($privkey, '.pem') . '.sig'; 34 '-out', $sigfile, 39 '-signature', $sigfile, 44 '-signature', $sigfile, 49 '-signature', $sigfile, 62 my $sigfile = basename($privkey, '.pem') . '.sig'; 66 '-out', $sigfile, 71 '-signature', $sigfile, 76 '-signature', $sigfile, 81 '-signature', $sigfile, [all …]
|
H A D | 20-test_cli_fips.t | 79 my $sigfile = ''; 84 $sigfile = $fips_sigfile; 89 '-out', $sigfile, 97 '-signature', $sigfile, 106 '-signature', $sigfile, 116 $sigfile = $nonfips_sigfile; 122 '-out', $sigfile, 131 '-signature', $sigfile, 151 '-signature', $sigfile, 163 '-signature', $sigfile, [all …]
|
H A D | 20-test_pkeyutl.t | 93 my $sigfile = basename($privkey, '.pem') . '.sig'; 100 '-out', $sigfile, 109 '-out', $sigfile, 117 '-sigfile', $sigfile, 126 '-sigfile', $sigfile, 134 '-sigfile', $sigfile,
|
/freebsd/usr.sbin/pkg/ |
H A D | rsa.c | 83 const char *data, size_t datasz, const char *sigfile, in rsa_verify_data() argument 96 if (sigfile != NULL) { in rsa_verify_data() 97 if ((pkey = load_public_key_file(sigfile)) == NULL) { in rsa_verify_data() 147 const char *sigfile, const unsigned char *key, int keylen, in rsa_verify_cert() argument 165 ret = rsa_verify_data(ctx, sha256, strlen(sha256), sigfile, key, keylen, in rsa_verify_cert()
|
H A D | ecc.c | 522 const char *data, size_t datasz, const char *sigfile, in ecc_verify_data() argument 531 if (sigfile != NULL) { in ecc_verify_data() 532 cbdata.keyfp = fopen(sigfile, "r"); in ecc_verify_data() 534 warn("fopen: %s", sigfile); in ecc_verify_data() 557 const char *sigfile, const unsigned char *key, int keylen, in ecc_verify_cert() argument 570 ret = ecc_verify_data(sctx, sha256, strlen(sha256), sigfile, key, in ecc_verify_cert()
|
H A D | pkg.c | 147 pkgsign_verify_cert(const struct pkgsign_ctx *ctx, int fd, const char *sigfile, in pkgsign_verify_cert() argument 151 return ((*ctx->impl->pi_ops->pkgsign_verify_cert)(ctx, fd, sigfile, in pkgsign_verify_cert() 157 size_t datasz, const char *sigfile, const unsigned char *key, int keylen, in pkgsign_verify_data() argument 162 sigfile, key, keylen, sig, siglen)); in pkgsign_verify_data()
|
/freebsd/lib/libsecureboot/ |
H A D | vets.c | 782 verify_ec(br_x509_pkey *pk, const char *file, const char *sigfile) in verify_ec() argument 797 if ((scp = read_file(sigfile, &slen)) == NULL) { in verify_ec() 880 verify_rsa(br_x509_pkey *pk, const char *file, const char *sigfile) in verify_rsa() argument 892 if ((scp = read_file(sigfile, &slen)) == NULL) { in verify_rsa() 945 verify_sig(const char *sigfile, int flags) in verify_sig() argument 956 DEBUG_PRINTF(5, ("verify_sig: %s\n", sigfile)); in verify_sig() 957 n = strlcpy(pbuf, sigfile, sizeof(pbuf)); in verify_sig() 958 if (n > (sizeof(pbuf) - 5) || strcmp(&sigfile[n - 3], "sig") != 0) in verify_sig() 987 ucp = verify_ec(pk, pbuf, sigfile); in verify_sig() 992 ucp = verify_rsa(pk, pbuf, sigfile); in verify_sig()
|
/freebsd/crypto/openssl/apps/ |
H A D | dgst.c | 105 const char *sigfile = NULL; in dgst_main() local 169 sigfile = opt_arg(); in dgst_main() 239 if (do_verify && sigfile == NULL) { in dgst_main() 393 if (sigfile != NULL && sigkey != NULL) { in dgst_main() 394 BIO *sigbio = BIO_new_file(sigfile, "rb"); in dgst_main() 397 BIO_printf(bio_err, "Error opening signature file %s\n", sigfile); in dgst_main() 405 BIO_printf(bio_err, "Error reading signature file %s\n", sigfile); in dgst_main()
|
H A D | pkeyutl.c | 111 char *infile = NULL, *outfile = NULL, *sigfile = NULL, *passinarg = NULL; in pkeyutl_main() local 152 sigfile = opt_arg(); in pkeyutl_main() 380 if (sigfile != NULL && (pkey_op != EVP_PKEY_OP_VERIFY)) { in pkeyutl_main() 386 if (sigfile == NULL && (pkey_op == EVP_PKEY_OP_VERIFY)) { in pkeyutl_main() 407 if (sigfile != NULL) { in pkeyutl_main() 408 BIO *sigbio = BIO_new_file(sigfile, "rb"); in pkeyutl_main() 411 BIO_printf(bio_err, "Can't open signature file %s\n", sigfile); in pkeyutl_main()
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_sig.c | 467 verify_asc(const char *sigfile, int flags) 476 if ((sdata = read_file(sigfile, &sbytes))) { 477 n = strlcpy(pbuf, sigfile, sizeof(pbuf));
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 16 [B<-sigfile> I<file>] 93 =item B<-sigfile> I<file> 148 Verify the input data against the signature given with the B<-sigfile> option 396 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem 429 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \
|