Searched refs:sigalg (Results 1 - 16 of 16) sorted by relevance

/freebsd-10.3-release/contrib/unbound/validator/
H A Dval_sigcrypt.h77 * @param sigalg: adds to signalled algorithm list too.
80 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
85 * @param sigalg: signalled algorithm list, numbers ends with 0.
87 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
94 * @param sigalg: list of signalled algos, constructed as output,
98 int fav_ds_algo, uint8_t* sigalg);
237 * @param sigalg: if nonNULL provide downgrade protection otherwise one
246 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason);
H A Dval_utils.h120 * @param sigalg: if nonNULL provide downgrade protection otherwise one
127 uint8_t* sigalg, char** reason);
149 * @param sigalg: if nonNULL provide downgrade protection otherwise one
159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason);
169 * @param sigalg: if nonNULL provide downgrade protection otherwise one
180 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason);
H A Dval_utils.c312 uint8_t* sigalg, char** reason)
334 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason);
455 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason)
474 if(sigalg)
475 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
494 if(!sigalg || algo_needs_set_secure(&needs,
499 } else if(sigalg && sec == sec_status_bogus) {
515 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
527 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
529 dnskey_rrset, ds_rrset, downprot?sigalg
310 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason) argument
453 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason) argument
548 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason) argument
664 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
[all...]
H A Dval_kentry.h182 * @param sigalg: signalled algorithm list (or NULL).
188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
H A Dval_sigcrypt.c384 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
396 sigalg[total] = algo;
400 sigalg[total] = 0;
404 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument
410 while( (algo=*sigalg++) != 0) {
420 int fav_ds_algo, uint8_t* sigalg)
436 sigalg[total] = algo;
440 sigalg[total] = 0;
482 uint8_t* sigalg, char** reason)
499 if(sigalg) {
383 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument
419 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument
480 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason) argument
[all...]
H A Dval_kentry.c298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now)
314 if(sigalg) {
315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg);
296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
H A Dautotrust.c1235 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
1238 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason);
1239 /* sigalg is ignored, it returns algorithms signalled to exist, but
/freebsd-10.3-release/crypto/openssl/crypto/asn1/
H A Dasn1_locl.h100 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
H A Dt_x509.c323 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) argument
328 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
331 sig_nid = OBJ_obj2nid(sigalg->algorithm);
338 return ameth->sig_print(bp, sigalg, sig, 9, 0);
/freebsd-10.3-release/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c365 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
368 if (OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss) {
372 pss = rsa_pss_decode(sigalg, &maskHash);
435 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
445 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) {
450 pss = rsa_pss_decode(sigalg, &maskHash);
434 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
/freebsd-10.3-release/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; local
1000 sigalg = _hx509_crypto_default_sig_alg;
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
1403 sigalg,
H A Dcms.c1347 AlgorithmIdentifier sigalg; local
1351 &sigalg);
1357 &sigalg,
1361 free_AlgorithmIdentifier(&sigalg);
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1517 sigalg,
/freebsd-10.3-release/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c529 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
/freebsd-10.3-release/crypto/openssl/ssl/
H A Ds3_srvr.c3020 int sigalg = tls12_get_sigid(pkey); local
3022 if (sigalg == -1) {
3028 if (sigalg != (int)p[1]) {
H A Ds3_clnt.c1834 int sigalg; local
1840 sigalg = tls12_get_sigid(pkey);
1842 if (sigalg == -1) {
1847 if (sigalg != (int)p[1]) {

Completed in 198 milliseconds