GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
OpenXPKI::Crypto::Backend::OpenSSL::Command::sign_digest(3) User Contributed Perl Documentation OpenXPKI::Crypto::Backend::OpenSSL::Command::sign_digest(3)

OpenXPKI::Crypto::Backend::OpenSSL::Command::sign_digest

If you want to create a signature with the used engine/token then you have to specify only DIGEST (the binary digest value that should be signed). If you want to create a normal signature then you must specify KEY and PASSWD.

If you want to use the engine then you must use ENGINE_USAGE ::= ALWAYS||PRIV_KEY_OPS too.

The signature will be done with the MD5 or SHA1/2 algorithm, the type and length is determined from the size of the content. Supported digest length are 128 (md5), 160 (sha1) and 224, 256, 384, 512 bits for sha2.

  • DIGEST
  • KEY
  • PASSWD

returns false

returns true

returns the raw signature in binary format
2022-05-14 perl v5.32.1

Search for    or go to Top of page |  Section 3 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.