Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 569) sorted by relevance

12345678910>>...23

/freebsd/crypto/openssl/crypto/evp/
H A Dsignature.c23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local
25 if (signature == NULL) { in evp_signature_new()
30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new()
31 if (signature->lock == NULL) { in evp_signature_new()
33 OPENSSL_free(signature); in evp_signature_new()
36 signature->prov = prov; in evp_signature_new()
38 signature->refcnt = 1; in evp_signature_new()
40 return signature; in evp_signature_new()
48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local
53 if ((signature in evp_signature_from_algorithm()
280 EVP_SIGNATURE_free(EVP_SIGNATURE * signature) EVP_SIGNATURE_free() argument
295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE * signature) EVP_SIGNATURE_up_ref() argument
303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_provider() argument
328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE * signature,const char * name) EVP_SIGNATURE_is_a() argument
334 evp_signature_get_number(const EVP_SIGNATURE * signature) evp_signature_get_number() argument
339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_name() argument
344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE * signature) EVP_SIGNATURE_get0_description() argument
350 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX * libctx,void (* fn)(EVP_SIGNATURE * signature,void * arg),void * arg) EVP_SIGNATURE_do_all_provided() argument
362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE * signature,void (* fn)(const char * name,void * data),void * data) EVP_SIGNATURE_names_do_all() argument
399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local
[all...]
H A Dm_sigver.c46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local
85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init()
148 EVP_SIGNATURE_free(signature); in do_sigver_init()
153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init()
155 if (signature != NULL) in do_sigver_init()
156 tmp_prov = EVP_SIGNATURE_get0_provider(signature); in do_sigver_init()
160 signature = in do_sigver_init()
163 if (signature == NULL) in do_sigver_init()
167 if (signature == NULL) in do_sigver_init()
192 EVP_SIGNATURE_free(signature); in do_sigver_init()
[all …]
/freebsd/crypto/openssl/crypto/asn1/
H A Da_verify.c27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument
46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify()
75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify()
76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify()
90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() argument
93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify()
97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() argument
105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex()
113 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ctx() argument
129 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_item_verify_ctx()
[all …]
H A Da_sign.c28 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, in ASN1_sign() argument
99 OPENSSL_free(signature->data); in ASN1_sign()
100 signature->data = buf_out; in ASN1_sign()
102 signature->length = outl; in ASN1_sign()
107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign()
108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign()
119 ASN1_BIT_STRING *signature, const void *data, in ASN1_item_sign() argument
122 return ASN1_item_sign_ex(it, algor1, algor2, signature, data, NULL, pkey, in ASN1_item_sign()
127 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ex() argument
143 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, data, ctx); in ASN1_item_sign_ex()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SIGNATURE.pod21 void EVP_SIGNATURE_free(EVP_SIGNATURE *signature);
22 int EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature);
23 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
24 int EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name);
25 OSSL_PROVIDER *EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature);
27 void (*fn)(EVP_SIGNATURE *signature,
30 int EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature,
33 const char *EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature);
34 const char *EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature);
43 The algorithm will be one offering functions for performing signature related
[all …]
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
40 signature algorithms related to client authentication, otherwise they are
44 All these functions are implemented as macros. The signature algorithm
50 If an application wishes to allow the setting of signature algorithms
54 The signature algorithms set by a client are used directly in the supported
55 signature algorithm in the client hello message.
57 The supported signature algorithms set by a server are not sent to the
58 client but are used to determine the set of shared signature algorithms
[all …]
H A DASN1_item_sign.pod14 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
20 ASN1_BIT_STRING *signature, const void *data,
24 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
28 const ASN1_BIT_STRING *signature, const void *data,
33 const ASN1_BIT_STRING *signature, const void *data,
37 const ASN1_BIT_STRING *signature, const void *data,
46 The I<data> that will be signed, and a structure containing the signature may
51 written before the signature is generated.
57 The generated signature is set into I<signature>.
68 ASN1_item_verify_ex() is used to verify the signature I<signature> of internal
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
21 SSL_get_shared_sigalgs() returns information about the shared signature
23 of the shared signature algorithm to return starting from zero. The signature
25 sign and hash NID to B<*psignhash>. The raw signature and hash values
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
45 signature algorithm it can just set B<idx> to zero.
50 signature algorithms can be determined: which can be zero.
53 signature algorithms: after a client hello (for servers) or a certificate
57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms.
[all …]
H A DECDSA_sign.pod7 ECDSA_do_sign_ex - deprecated low-level elliptic curve digital signature algorithm
49 ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
50 created with the private EC key I<eckey>. To obtain the actual signature
53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value
60 ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned
65 ECDSA_verify() verifies that the signature in I<sig> of size I<siglen> is a
66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the
69 ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
73 during signature computation. Most applications will never need to call these
82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value
[all …]
H A DX509_get0_signature.pod8 X509_get_signature_info, X509_SIG_INFO_get, X509_SIG_INFO_set - signature information
42 X509_get0_signature() sets B<*psig> to the signature of B<x> and B<*palg>
43 to the signature algorithm of B<x>. The values returned are internal
49 X509_get0_tbs_sigalg() returns the signature algorithm in the signed
52 X509_get_signature_nid() returns the NID corresponding to the signature
59 X509_get_signature_info() retrieves information about the signature of
66 about a signature in an B<X509_SIG_INFO> structure. They are only
68 signature information: most applications will never need to call
74 where an application wishes to analyse or generate a signature in a form
79 available from the certificate signature (such as the signing digest). In some
[all …]
/freebsd/usr.sbin/cpucontrol/
H A Damd.c82 uint32_t signature; in amd_update() local
104 signature = idargs.data[0]; in amd_update()
107 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, in amd_update()
108 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in amd_update()
109 (signature >> 16) & 0x0f); in amd_update()
137 if (signature == fw_header->signature) { in amd_update()
H A Dvia.c86 uint32_t signature; in via_update() local
112 signature = idargs.data[0]; in via_update()
130 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, in via_update()
131 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); in via_update()
139 if (fw_header->signature != VIA_HEADER_SIGNATURE || in via_update()
169 if (signature != fw_header->cpu_signature) in via_update()
H A Damd10h.c55 uint32_t signature; in amd10h_probe() local
77 signature = idargs.data[0]; in amd10h_probe()
78 family = ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff); in amd10h_probe()
97 uint32_t signature; in amd10h_update() local
116 signature = idargs.data[0]; in amd10h_update()
126 selected_fw = ucode_amd_find(path, signature, revision, fw_image, in amd10h_update()
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod5 provider-signature - The signature library E<lt>-E<gt> provider functions
88 The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
89 signature algorithms and make them available to applications via the API
147 A signature algorithm implementation may not implement all of these functions.
150 set of "signature" functions, i.e. at least one of:
175 A signature algorithm must also implement some mechanism for generating,
182 structure for holding context information during a signature operation.
183 A pointer to this context will be passed back in a number of the other signature
190 OSSL_FUNC_signature_freectx() is passed a pointer to the provider side signature
194 OSSL_FUNC_signature_dupctx() should duplicate the provider side signature context in
[all …]
H A DEVP_SIGNATURE-ECDSA.pod5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation.
14 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
24 These parameters are described in L<provider-signature(7)>.
28 The following signature parameters can be retrieved using
37 The parameters are described in L<provider-signature(7)>.
46 L<provider-signature(7)>,
H A DEVP_SIGNATURE-DSA.pod6 - The B<EVP_PKEY> DSA signature implementation
15 The following signature parameters can be set using EVP_PKEY_CTX_set_params().
25 The settable parameters are described in L<provider-signature(7)>.
29 The following signature parameters can be retrieved using
38 The gettable parameters are described in L<provider-signature(7)>.
47 L<provider-signature(7)>,
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Deddsa.c160 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign()
251 OPENSSL_cleanse(signature, EDDSA_448_SIGNATURE_BYTES); in ossl_c448_ed448_sign()
252 memcpy(signature, nonce_point, sizeof(nonce_point)); in ossl_c448_ed448_sign()
253 ossl_curve448_scalar_encode(&signature[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign()
269 uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_sign_prehash()
275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash()
282 const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], in ossl_c448_ed448_verify()
309 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify()
311 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify()
324 ossl_curve448_point_decode_like_eddsa_and_mul_by_ratio(r_point, signature); in ossl_c448_ed448_verify()
[all …]
/freebsd/sys/x86/x86/
H A Ducode_subr.c97 ucode_amd_find(const char *path, uint32_t signature, uint32_t revision, in ucode_amd_find() argument
111 ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff), in ucode_amd_find()
112 (signature >> 4) & 0x0f, in ucode_amd_find()
113 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, in ucode_amd_find()
114 (signature >> 16) & 0x0f); in ucode_amd_find()
165 signature, i, equiv_cpu_table[i].installed_cpu, in ucode_amd_find()
167 if (signature == equiv_cpu_table[i].installed_cpu) { in ucode_amd_find()
170 " equiv_cpu_table[%d] %8x", equiv_id, signature, in ucode_amd_find()
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig15 The header MUST be present at the start of every signature.
16 Files containing the signature MUST start with the header.
18 signature.
43 string signature
46 public key used to make the signature using the usual SSH
54 interpretation domain for the signature, e.g. file signing.
60 (e.g. tags) into the signature. Implementations should ignore
64 This is done to limit the amount of data presented to the signature
69 The signature itself is made using the SSH signature algorithm and
71 signature algorithm must be "rsa-sha2-512" or "rsa-sha2-256" (i.e.
[all …]
H A DPROTOCOL.u2f12 type as both the inputs to the signature operation and the resultant
13 signature differ from those specified for SSH. For similar reasons,
18 of "user presence" for each signature operation (typically achieved
21 given key is backed by hardware. Finally the signature format includes
22 a monotonic signature counter that can be used (at scale) to detect
38 the key handle be supplied for each signature operation. U2F tokens
59 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive,
61 the signature object itself. As such they cannot be made compatible with
113 string signature key
114 string signature
[all …]
/freebsd/crypto/openssl/test/
H A Ddsa_no_digest_size_test.c139 unsigned char *signature = NULL; in sign_and_verify() local
168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) in sign_and_verify()
171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { in sign_and_verify()
181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify()
187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify()
193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify()
198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify()
208 OPENSSL_free(signature); in sign_and_verify()
/freebsd/sys/contrib/openzfs/scripts/
H A Dcommitcheck.sh10 …body=$(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -Ev "http(s)*://" | grep -E -m 1…
23 foundline=$(git log --no-show-signature -n 1 "$REF" | grep -E -m 1 "$regex")
38 long_subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '.{73}')
60 …subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '^Fix coverity defect…
73 subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" |
89 for line in $(git log --no-show-signature -n 1 --pretty=%b "$REF" | grep -E '^CID'); do
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm33 $self->{signature} = "";
61 $self->signature($sig);
69 my $sig = $self->signature();
88 sub signature subroutine
92 $self->{signature} = shift;
94 return $self->{signature};
/freebsd/crypto/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
/freebsd/crypto/openssl/crypto/ocsp/
H A Docsp_local.h54 ASN1_BIT_STRING *signature; member
194 ASN1_BIT_STRING *signature; member
223 (o)->optionalSignature->signature, &(o)->tbsRequest,\
229 (o)->signature, &(o)->tbsResponseData,\
235 (o)->signature, &(o)->tbsResponseData, ctx)
240 (a)->optionalSignature->signature, &(a)->tbsRequest,\
245 &(a)->signatureAlgorithm, (a)->signature,\

12345678910>>...23