/freebsd-10.3-release/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 77 * @param sigalg: adds to signalled algorithm list too. 80 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 85 * @param sigalg: signalled algorithm list, numbers ends with 0. 87 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 94 * @param sigalg: list of signalled algos, constructed as output, 98 int fav_ds_algo, uint8_t* sigalg); 237 * @param sigalg: if nonNULL provide downgrade protection otherwise one 246 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason);
|
H A D | val_utils.h | 120 * @param sigalg: if nonNULL provide downgrade protection otherwise one 127 uint8_t* sigalg, char** reason); 149 * @param sigalg: if nonNULL provide downgrade protection otherwise one 159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason); 169 * @param sigalg: if nonNULL provide downgrade protection otherwise one 180 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason);
|
H A D | val_utils.c | 312 uint8_t* sigalg, char** reason) 334 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason); 455 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason) 474 if(sigalg) 475 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 494 if(!sigalg || algo_needs_set_secure(&needs, 499 } else if(sigalg && sec == sec_status_bogus) { 515 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 527 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local 529 dnskey_rrset, ds_rrset, downprot?sigalg 310 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason) argument 453 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason) argument 548 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason) argument 664 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
H A D | val_kentry.h | 182 * @param sigalg: signalled algorithm list (or NULL). 188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
|
H A D | val_sigcrypt.c | 384 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 396 sigalg[total] = algo; 400 sigalg[total] = 0; 404 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument 410 while( (algo=*sigalg++) != 0) { 420 int fav_ds_algo, uint8_t* sigalg) 436 sigalg[total] = algo; 440 sigalg[total] = 0; 482 uint8_t* sigalg, char** reason) 499 if(sigalg) { 383 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument 419 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument 480 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason) argument [all...] |
H A D | val_kentry.c | 298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) 314 if(sigalg) { 315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); 296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
|
H A D | autotrust.c | 1235 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local 1238 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason); 1239 /* sigalg is ignored, it returns algorithms signalled to exist, but
|
/freebsd-10.3-release/crypto/openssl/crypto/asn1/ |
H A D | asn1_locl.h | 100 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
H A D | t_x509.c | 323 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) argument 328 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 331 sig_nid = OBJ_obj2nid(sigalg->algorithm); 338 return ameth->sig_print(bp, sigalg, sig, 9, 0);
|
/freebsd-10.3-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 365 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument 368 if (OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss) { 372 pss = rsa_pss_decode(sigalg, &maskHash); 435 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 445 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) { 450 pss = rsa_pss_decode(sigalg, &maskHash); 434 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
|
/freebsd-10.3-release/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 995 const AlgorithmIdentifier *sigalg; local 1000 sigalg = _hx509_crypto_default_sig_alg; 1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); 1403 sigalg,
|
H A D | cms.c | 1347 AlgorithmIdentifier sigalg; local 1351 &sigalg); 1357 &sigalg, 1361 free_AlgorithmIdentifier(&sigalg);
|
H A D | revoke.c | 1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local 1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); 1517 sigalg,
|
/freebsd-10.3-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 529 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
|
/freebsd-10.3-release/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 3020 int sigalg = tls12_get_sigid(pkey); local 3022 if (sigalg == -1) { 3028 if (sigalg != (int)p[1]) {
|
H A D | s3_clnt.c | 1834 int sigalg; local 1840 sigalg = tls12_get_sigid(pkey); 1842 if (sigalg == -1) { 1847 if (sigalg != (int)p[1]) {
|