/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 79 * @param sigalg: adds to signalled algorithm list too. 82 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 87 * @param sigalg: signalled algorithm list, numbers ends with 0. 89 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 96 * @param sigalg: list of signalled algos, constructed as output, 100 int fav_ds_algo, uint8_t* sigalg); 239 * @param sigalg: if nonNULL provide downgrade protection otherwise one 250 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_utils.h | 122 * @param sigalg: if nonNULL provide downgrade protection otherwise one 131 uint8_t* sigalg, char** reason, sldns_pkt_section section, 157 * @param sigalg: if nonNULL provide downgrade protection otherwise one 168 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 179 * @param sigalg: if nonNULL provide downgrade protection otherwise one 191 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_utils.c | 338 uint8_t* sigalg, char** reason, sldns_pkt_section section, 361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, 485 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 504 if(sigalg) { 507 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 518 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { 530 if(!sigalg || algo_needs_set_secure(&needs, 535 } else if(sigalg && sec == sec_status_bogus) { 551 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 564 uint8_t sigalg[ALGO_NEEDS_MA local 336 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument 483 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument 585 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument 702 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
H A D | val_kentry.h | 182 * @param sigalg: signalled algorithm list (or NULL). 188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
|
H A D | val_sigcrypt.c | 390 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 402 sigalg[total] = algo; 406 sigalg[total] = 0; 410 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument 416 while( (algo=*sigalg++) != 0) { 426 int fav_ds_algo, uint8_t* sigalg) 442 sigalg[total] = algo; 446 sigalg[total] = 0; 488 uint8_t* sigalg, char** reason, sldns_pkt_section section, 506 if(sigalg) { 389 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument 425 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument 486 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument [all...] |
H A D | val_kentry.c | 298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) 314 if(sigalg) { 315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); 296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
|
H A D | autotrust.c | 1256 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local 1259 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, 1261 /* sigalg is ignored, it returns algorithms signalled to exist, but
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | asn1_locl.h | 103 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
H A D | t_x509.c | 339 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) argument 344 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 347 sig_nid = OBJ_obj2nid(sigalg->algorithm); 354 return ameth->sig_print(bp, sigalg, sig, 9, 0);
|
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 381 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument 384 if (OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss) { 388 pss = rsa_pss_decode(sigalg, &maskHash); 588 X509_ALGOR *sigalg, EVP_PKEY *pkey) 596 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) { 601 pss = rsa_pss_decode(sigalg, &maskHash); 697 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 701 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) { 705 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 587 rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) argument 696 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 995 const AlgorithmIdentifier *sigalg; local 1000 sigalg = _hx509_crypto_default_sig_alg; 1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); 1403 sigalg,
|
H A D | cms.c | 1347 AlgorithmIdentifier sigalg; local 1351 &sigalg); 1357 &sigalg, 1361 free_AlgorithmIdentifier(&sigalg);
|
H A D | revoke.c | 1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local 1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); 1517 sigalg,
|
/freebsd-11-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 534 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_lib.c | 1085 int sigalg = tls12_get_sigid(pkey); local 1087 if (sigalg == -1) 1090 if (sigalg != (int)sig[1]) { 1452 * 2 bytes for the sigalg list length 1453 * + sigalg list length
|