Home
last modified time | relevance | path

Searched refs:sign (Results 1 – 25 of 161) sorted by relevance

1234567

/openssl-master/crypto/asn1/
A Dx_long.c89 unsigned long utmp, sign; in long_i2c() local
101 sign = 0xff; in long_i2c()
104 sign = 0; in long_i2c()
133 unsigned long utmp = 0, sign = 0x100; in long_c2i() local
145 sign = 0xff; in long_c2i()
150 sign = 0; in long_c2i()
159 if (sign == 0x100) { in long_c2i()
162 sign = 0xff; in long_c2i()
164 sign = 0; in long_c2i()
172 utmp |= cont[i] ^ sign; in long_c2i()
[all …]
/openssl-master/crypto/pkcs7/
A Dpk7_lib.c46 if (p7->d.sign == NULL || p7->d.sign->contents->d.ptr == NULL) in PKCS7_ctrl()
90 PKCS7_free(p7->d.sign->contents); in PKCS7_set_content()
91 p7->d.sign->contents = p7_data; in PKCS7_set_content()
125 PKCS7_SIGNED_free(p7->d.sign); in PKCS7_set_type()
126 p7->d.sign = NULL; in PKCS7_set_type()
199 signer_sk = p7->d.sign->signer_info; in PKCS7_add_signer()
200 md_sk = p7->d.sign->md_algs; in PKCS7_add_signer()
259 sk = &(p7->d.sign->cert); in PKCS7_add_certificate()
280 sk = &(p7->d.sign->crl); in PKCS7_add_crl()
418 return p7->d.sign->cert; in STACK_OF()
[all …]
/openssl-master/crypto/ec/
A Decp_nistp521.c1038 out[1] -= (1 & sign); in felem_contract()
1041 out[2] -= (1 & sign); in felem_contract()
1044 out[3] -= (1 & sign); in felem_contract()
1047 out[4] -= (1 & sign); in felem_contract()
1050 out[5] -= (1 & sign); in felem_contract()
1053 out[6] -= (1 & sign); in felem_contract()
1056 out[7] -= (1 & sign); in felem_contract()
1059 out[8] -= (1 & sign); in felem_contract()
1062 out[6] -= (1 & sign); in felem_contract()
1065 out[7] -= (1 & sign); in felem_contract()
[all …]
A Decdsa_sign.c45 if (eckey->meth->sign != NULL) in ECDSA_sign_ex()
46 return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); in ECDSA_sign_ex()
A Dec_kmeth.c234 int (*sign)(int type, const unsigned char *dgst, in EC_KEY_METHOD_set_sign()
247 meth->sign = sign; in EC_KEY_METHOD_set_sign()
323 *psign = meth->sign; in EC_KEY_METHOD_get_sign()
A Decp_nistputil.c213 void ossl_ec_GFp_nistp_recode_scalar_bits(unsigned char *sign, in ossl_ec_GFp_nistp_recode_scalar_bits() argument
224 *sign = s & 1; in ossl_ec_GFp_nistp_recode_scalar_bits()
/openssl-master/crypto/bn/
A Dbn_gcd.c27 int sign; in bn_mod_inverse_no_branch() local
72 sign = -1; in bn_mod_inverse_no_branch()
149 sign = -sign; in bn_mod_inverse_no_branch()
160 if (sign < 0) { in bn_mod_inverse_no_branch()
202 int sign; in int_bn_mod_inverse() local
249 sign = -1; in int_bn_mod_inverse()
472 sign = -sign; in int_bn_mod_inverse()
484 if (sign < 0) { in int_bn_mod_inverse()
A Dbn_intern.c26 int sign = 1; in bn_compute_wNAF() local
51 sign = -1; in bn_compute_wNAF()
118 r[j++] = sign * digit; in bn_compute_wNAF()
/openssl-master/test/recipes/30-test_evp_data/
A Devppkey_dsa.txt12 # and continue until a blank line. Lines starting with a pound sign are ignored.
255 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
262 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
268 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
274 # Test sign with a 2048 bit SHA3 is allowed in fips mode
294 # Test sign with a 1024 bit key is not allowed in fips mode
302 # Test sign with SHA1 is not allowed in fips mode
310 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode
318 # Test sign with a 4096 bit key is not allowed in fips mode
/openssl-master/doc/man1/
A Dopenssl-pkeyutl.pod.in25 [B<-sign>]
64 the B<-digest> option. This option can only be used with B<-sign> and
122 =item B<-sign>
225 The RSA algorithm generally supports the encrypt, decrypt, sign,
249 For B<pss> mode only sign and verify are supported and the digest type must be
275 supports the sign and verify operations with PSS padding. The following
307 The EC algorithm supports sign, verify and derive operations. The sign and
330 The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For
331 the sign and verify operations, SM2 requires an Distinguishing ID string to
355 openssl pkeyutl -sign -in file -inkey key.pem -out sig
[all …]
A Dopenssl-dgst.pod.in22 [B<-sign> I<filename>|I<uri>]
103 =item B<-sign> I<filename>|I<uri>
105 Digitally sign the digest using the given private key. Note this option
111 The format of the key to sign with; unspecified by default.
116 Pass options to the signature algorithm during sign or verify operations.
211 To sign a file using SHA-256 with binary file output:
212 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt
216 -signature signature.sign \
A DCA.pl.pod19 B<-sign> |
101 B<-sign> option. The PKCS#12 file can be imported directly into a browser.
107 =item B<-sign>, B<-signcert>, B<-xsign>
109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the
116 This option is the same as the B<-sign> option except it uses the
123 This option is the same as B<-sign> except it expects a self signed certificate
163 Complete certificate creation example: create a CA, create a request, sign
168 CA.pl -sign
A Dopenssl-cms.pod.in23 [B<-sign>]
183 =item B<-sign>
202 similar to the B<-sign> operation.
451 When used with B<-sign>,
658 B<-sign> operation if the content is not detached.
758 The use of PSS with B<-sign>.
769 openssl cms -sign -in message.txt -text -out mail.msg \
780 openssl cms -sign -in in.txt -text -out mail.msg \
785 openssl cms -sign -in message.txt -text -out mail.msg \
790 openssl cms -sign -in in.txt -text -signer mycert.pem \
[all …]
A Dopenssl-smime.pod.in14 [B<-sign>]
57 This command handles S/MIME mail. It can encrypt, decrypt, sign
85 =item B<-sign>
318 choke if a message contains multiple signers. It is possible to sign
332 B<-sign> operation if the content is not detached.
374 openssl smime -sign -in message.txt -text -out mail.msg \
379 openssl smime -sign -in message.txt -text -out mail.msg -nodetach \
385 openssl smime -sign -in in.txt -text -out mail.msg \
390 openssl smime -sign -in message.txt -text -out mail.msg \
395 openssl smime -sign -in in.txt -text -signer mycert.pem \
[all …]
/openssl-master/doc/man7/
A Dlife_cycle-pkey.pod35 =item digest sign
156sign sign sign sign sign sign sign sign
158 sign
206 <th style="border:1px solid" align="center">digest<br>sign</th>
281 <td style="border:1px solid" align="center">digest<br>sign</td>
282 <td style="border:1px solid" align="center">digest<br>sign</td>
283 <td style="border:1px solid" align="center">digest<br>sign</td>
284 <td style="border:1px solid" align="center">digest<br>sign</td>
285 <td style="border:1px solid" align="center">digest<br>sign</td>
286 <td style="border:1px solid" align="center">digest<br>sign</td>
[all …]
A DEVP_SIGNATURE-ED25519.pod14 one-shot digest sign and digest verify using PureEdDSA and B<Ed25519> or B<Ed448>
40 The message to sign or verify must be passed using the one-shot
46 Applications wishing to sign certificates (or other structures such as
67 To sign a message using a ED25519 or ED448 key:
/openssl-master/test/
A Drun_tests.pl105 my $sign = $1;
110 if ($sign eq '-' && $initial_arg) {
116 ($sign eq '-' ? "removal" : "addition"),
120 if ($sign eq '-') {
A Dacvp_test.c216 if (sign == NULL) in get_ecdsa_sig_rs_bytes()
218 r1 = ECDSA_SIG_get0_r(sign); in get_ecdsa_sig_rs_bytes()
219 s1 = ECDSA_SIG_get0_s(sign); in get_ecdsa_sig_rs_bytes()
243 ECDSA_SIG_free(sign); in get_ecdsa_sig_rs_bytes()
279 ECDSA_SIG *sign = NULL; in ecdsa_sigver_test() local
306 ECDSA_SIG_free(sign); in ecdsa_sigver_test()
559 if (sign == NULL) in get_dsa_sig_rs_bytes()
561 DSA_SIG_get0(sign, &r1, &s1); in get_dsa_sig_rs_bytes()
585 DSA_SIG_free(sign); in get_dsa_sig_rs_bytes()
620 DSA_SIG *sign = NULL; in dsa_sigver_test() local
[all …]
A Dbntests.pl20 my ($sign, $hex) = ($x =~ /^([+\-]?)(.*)$/);
23 return Math::BigInt->from_hex($sign.$hex);
/openssl-master/doc/
A Dfingerprints.txt4 the fingerprints of team members who are "authorized" to sign the
13 currently in use to sign OpenSSL distributions:
/openssl-master/apps/
A Dpkcs7.c153 if (p7->d.sign != NULL) { in pkcs7_main()
154 certs = p7->d.sign->cert; in pkcs7_main()
155 crls = p7->d.sign->crl; in pkcs7_main()
/openssl-master/doc/man3/
A DX509_sign.pod8 sign certificate, certificate request, or CRL signature
31 sign certificate requests and CRLs, respectively.
36 public key and digest are not suitable. It can be used to sign keys using
A DX509_check_ca.pod16 to sign other certificates). The certificate must be a complete certificate
31 used to sign other certificates.
/openssl-master/providers/common/
A Dsecuritycheck.c150 int ossl_dsa_check_key(OSSL_LIB_CTX *ctx, const DSA *dsa, int sign) in ossl_dsa_check_key() argument
174 if (!sign && L < 2048) in ossl_dsa_check_key()
/openssl-master/crypto/evp/
A Dsignature.c78 if (signature->sign != NULL) in evp_signature_from_algorithm()
80 signature->sign = OSSL_FUNC_signature_sign(fns); in evp_signature_from_algorithm()
574 || (operation == EVP_PKEY_OP_SIGN && ctx->pmeth->sign == NULL) in evp_pkey_signature_init()
648 ret = ctx->op.sig.signature->sign(ctx->op.sig.algctx, sig, siglen, in EVP_PKEY_sign()
654 if (ctx->pmeth == NULL || ctx->pmeth->sign == NULL) { in EVP_PKEY_sign()
660 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); in EVP_PKEY_sign()

Completed in 34 milliseconds

1234567