/freebsd/crypto/openssl/crypto/evp/ |
H A D | signature.c | 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local 25 if (signature == NULL) { in evp_signature_new() 30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new() 31 if (signature->lock == NULL) { in evp_signature_new() 33 OPENSSL_free(signature); in evp_signature_new() 36 signature->prov = prov; in evp_signature_new() 38 signature->refcnt = 1; in evp_signature_new() 40 return signature; in evp_signature_new() 48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local 53 if ((signature in evp_signature_from_algorithm() 280 EVP_SIGNATURE_free(EVP_SIGNATURE * signature) EVP_SIGNATURE_free() argument 295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE * signature) EVP_SIGNATURE_up_ref() argument 303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_provider() argument 328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE * signature,const char * name) EVP_SIGNATURE_is_a() argument 334 evp_signature_get_number(const EVP_SIGNATURE * signature) evp_signature_get_number() argument 339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_name() argument 344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_description() argument 350 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX * libctx,void (* fn)(EVP_SIGNATURE * signature,void * arg),void * arg) EVP_SIGNATURE_do_all_provided() argument 362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE * signature,void (* fn)(const char * name,void * data),void * data) EVP_SIGNATURE_names_do_all() argument 399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local [all...] |
H A D | m_sigver.c | 46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 148 EVP_SIGNATURE_free(signature); in do_sigver_init() 153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init() 155 if (signature != NULL) in do_sigver_init() 156 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init() 160 signature = in do_sigver_init() 163 if (signature == NULL) in do_sigver_init() 167 if (signature == NULL) in do_sigver_init() 192 EVP_SIGNATURE_free(signature); in do_sigver_init() [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | a_verify.c | 27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument 46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify() 75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify() 76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify() 90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument 93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify() 97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument 105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex() 113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument 129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx() [all …]
|
H A D | a_sign.c | 28 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, in ASN1_sign() argument 99 OPENSSL_free(signature->data); in ASN1_sign() 100 signature->data = buf_out; in ASN1_sign() 102 signature->length = outl; in ASN1_sign() 107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign() 108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign() 119 ASN1_BIT_STRING *signature, const void *data, in ASN1_item_sign() argument 122 return ASN1_item_sign_ex(it, algor1, algor2, signature, data, NULL, pkey, in ASN1_item_sign() 127 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ex() argument 143 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, data, ctx); in ASN1_item_sign_ex() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SIGNATURE.pod | 21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature); 22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature); 23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name); 25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature); 27 void (*fn)(EVP_SIGNATURE *signature, 30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, 33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature); 34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature); 43 The algorithm will be one offering functions for performing signature related [all …]
|
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 44 All these functions are implemented as macros. The signature algorithm 50 If an application wishes to allow the setting of signature algorithms 54 The signature algorithms set by a client are used directly in the supported 55 signature algorithm in the client hello message. 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms [all …]
|
H A D | ASN1_item_sign.pod | 14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 20 ASN1_BIT_STRING *signature, const void *data, 24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 28 const ASN1_BIT_STRING *signature, const void *data, 33 const ASN1_BIT_STRING *signature, const void *data, 37 const ASN1_BIT_STRING *signature, const void *data, 46 The I<data> that will be signed, and a structure containing the signature may 51 written before the signature is generated. 57 The generated signature is set into I<signature>. 68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal [all …]
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 21 SSL_get_shared_sigalgs() returns information about the shared signature 23 of the shared signature algorithm to return starting from zero. The signature 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 45 signature algorithm it can just set B<idx> to zero. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. [all …]
|
H A D | ECDSA_sign.pod | 7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm 49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature 50 created with the private EC key I<eckey>. To obtain the actual signature 53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value 60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned 65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a 66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the 69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is 73 during signature computation. Most applications will never need to call these 82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value [all …]
|
H A D | X509_get0_signature.pod | 8 X509_get_signature_info, X509_SIG_INFO_get, X509_SIG_INFO_set - signature information 42 X509_get0_signature() sets B<*psig> to the signature of B<x> and B<*palg> 43 to the signature algorithm of B<x>. The values returned are internal 49 X509_get0_tbs_sigalg() returns the signature algorithm in the signed 52 X509_get_signature_nid() returns the NID corresponding to the signature 59 X509_get_signature_info() retrieves information about the signature of 66 about a signature in an B<X509_SIG_INFO> structure. They are only 68 signature information: most applications will never need to call 74 where an application wishes to analyse or generate a signature in a form 79 available from the certificate signature (such as the signing digest). In some [all …]
|
/freebsd/usr.sbin/cpucontrol/ |
H A D | amd.c | 82 uint32_t signature; in amd_update() local 104 signature = idargs.data[0]; in amd_update() 107 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, in amd_update() 108 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in amd_update() 109 (signature >> 16) & 0x0f); in amd_update() 137 if (signature == fw_header->signature) { in amd_update()
|
H A D | via.c | 86 uint32_t signature; in via_update() local 112 signature = idargs.data[0]; in via_update() 130 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, in via_update() 131 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); in via_update() 139 if (fw_header->signature != VIA_HEADER_SIGNATURE || in via_update() 169 if (signature != fw_header->cpu_signature) in via_update()
|
H A D | amd10h.c | 55 uint32_t signature; in amd10h_probe() local 77 signature = idargs.data[0]; in amd10h_probe() 78 family = ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff); in amd10h_probe() 97 uint32_t signature; in amd10h_update() local 116 signature = idargs.data[0]; in amd10h_update() 126 selected_fw = ucode_amd_find(path, signature, revision, fw_image, in amd10h_update()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 5 provider-signature - The signature library E<lt>-E<gt> provider functions 88 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement 89 signature algorithms and make them available to applications via the API 147 A signature algorithm implementation may not implement all of these functions. 150 set of "signature" functions, i.e. at least one of: 175 A signature algorithm must also implement some mechanism for generating, 182 structure for holding context information during a signature operation. 183 A pointer to this context will be passed back in a number of the other signature 190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature 194 OSSL_FUNC_signature_dupctx() should duplicate the provider side signature context in [all …]
|
H A D | EVP_SIGNATURE-ECDSA.pod | 5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation. 14 The following signature parameters can be set using EVP_PKEY_CTX_set_params(). 24 These parameters are described in L<provider-signature(7)>. 28 The following signature parameters can be retrieved using 37 The parameters are described in L<provider-signature(7)>. 46 L<provider-signature(7)>,
|
H A D | EVP_SIGNATURE-DSA.pod | 6 - The B<EVP_PKEY> DSA signature implementation 15 The following signature parameters can be set using EVP_PKEY_CTX_set_params(). 25 The settable parameters are described in L<provider-signature(7)>. 29 The following signature parameters can be retrieved using 38 The gettable parameters are described in L<provider-signature(7)>. 47 L<provider-signature(7)>,
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 160 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign() 251 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES); in ossl_c448_ed448_sign() 252 memcpy(signature, nonce_point, sizeof(nonce_point)); in ossl_c448_ed448_sign() 253 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign() 269 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign_prehash() 275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash() 282 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify() 309 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify() 311 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify() 324 ossl_curve448_point_decode_like_eddsa_and_mul_by_ratio(r_point, signature); in ossl_c448_ed448_verify() [all …]
|
/freebsd/sys/x86/x86/ |
H A D | ucode_subr.c | 97 ucode_amd_find(const char *path, uint32_t signature, uint32_t revision, in ucode_amd_find() argument 111 ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff), in ucode_amd_find() 112 (signature >> 4) & 0x0f, in ucode_amd_find() 113 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in ucode_amd_find() 114 (signature >> 16) & 0x0f); in ucode_amd_find() 165 signature, i, equiv_cpu_table[i].installed_cpu, in ucode_amd_find() 167 if (signature == equiv_cpu_table[i].installed_cpu) { in ucode_amd_find() 170 " equiv_cpu_table[%d] %8x", equiv_id, signature, in ucode_amd_find()
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 15 The header MUST be present at the start of every signature. 16 Files containing the signature MUST start with the header. 18 signature. 43 string signature 46 public key used to make the signature using the usual SSH 54 interpretation domain for the signature, e.g. file signing. 60 (e.g. tags) into the signature. Implementations should ignore 64 This is done to limit the amount of data presented to the signature 69 The signature itself is made using the SSH signature algorithm and 71 signature algorithm must be "rsa-sha2-512" or "rsa-sha2-256" (i.e. [all …]
|
H A D | PROTOCOL.u2f | 12 type as both the inputs to the signature operation and the resultant 13 signature differ from those specified for SSH. For similar reasons, 18 of "user presence" for each signature operation (typically achieved 21 given key is backed by hardware. Finally the signature format includes 22 a monotonic signature counter that can be used (at scale) to detect 38 the key handle be supplied for each signature operation. U2F tokens 59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive, 61 the signature object itself. As such they cannot be made compatible with 113 string signature key 114 string signature [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | dsa_no_digest_size_test.c | 139 unsigned char *signature = NULL; in sign_and_verify() local 168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) in sign_and_verify() 171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { in sign_and_verify() 181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify() 187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify() 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify() 208 OPENSSL_free(signature); in sign_and_verify()
|
/freebsd/sys/contrib/openzfs/scripts/ |
H A D | commitcheck.sh | 10 …body=$(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -Ev "http(s)*://" | grep -E -m 1… 23 foundline=$(git log --no-show-signature -n 1 "$REF" | grep -E -m 1 "$regex") 38 long_subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '.{73}') 60 …subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '^Fix coverity defect… 73 subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | 89 for line in $(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -E '^CID'); do
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 33 $self->{signature} = ""; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 54 ASN1_BIT_STRING *signature; member 194 ASN1_BIT_STRING *signature; member 223 (o)->optionalSignature->signature, &(o)->tbsRequest,\ 229 (o)->signature, &(o)->tbsResponseData,\ 235 (o)->signature, &(o)->tbsResponseData, ctx) 240 (a)->optionalSignature->signature, &(a)->tbsRequest,\ 245 &(a)->signatureAlgorithm, (a)->signature,\
|