Searched refs:sigalg (Results 1 - 15 of 15) sorted by relevance

/freebsd-11-stable/contrib/unbound/validator/
H A Dval_sigcrypt.h79 * @param sigalg: adds to signalled algorithm list too.
82 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
87 * @param sigalg: signalled algorithm list, numbers ends with 0.
89 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
96 * @param sigalg: list of signalled algos, constructed as output,
100 int fav_ds_algo, uint8_t* sigalg);
239 * @param sigalg: if nonNULL provide downgrade protection otherwise one
250 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason,
H A Dval_utils.h122 * @param sigalg: if nonNULL provide downgrade protection otherwise one
131 uint8_t* sigalg, char** reason, sldns_pkt_section section,
157 * @param sigalg: if nonNULL provide downgrade protection otherwise one
168 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
179 * @param sigalg: if nonNULL provide downgrade protection otherwise one
191 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
H A Dval_utils.c338 uint8_t* sigalg, char** reason, sldns_pkt_section section,
361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
485 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
504 if(sigalg) {
507 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
518 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) {
530 if(!sigalg || algo_needs_set_secure(&needs,
535 } else if(sigalg && sec == sec_status_bogus) {
551 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
564 uint8_t sigalg[ALGO_NEEDS_MA local
336 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument
483 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument
585 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument
702 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
[all...]
H A Dval_kentry.h182 * @param sigalg: signalled algorithm list (or NULL).
188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
H A Dval_sigcrypt.c390 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
402 sigalg[total] = algo;
406 sigalg[total] = 0;
410 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument
416 while( (algo=*sigalg++) != 0) {
426 int fav_ds_algo, uint8_t* sigalg)
442 sigalg[total] = algo;
446 sigalg[total] = 0;
488 uint8_t* sigalg, char** reason, sldns_pkt_section section,
506 if(sigalg) {
389 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument
425 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument
486 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument
[all...]
H A Dval_kentry.c298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now)
314 if(sigalg) {
315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg);
296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
H A Dautotrust.c1256 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
1259 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason,
1261 /* sigalg is ignored, it returns algorithms signalled to exist, but
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dasn1_locl.h103 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
H A Dt_x509.c339 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) argument
344 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
347 sig_nid = OBJ_obj2nid(sigalg->algorithm);
354 return ameth->sig_print(bp, sigalg, sig, 9, 0);
/freebsd-11-stable/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c381 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
384 if (OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss) {
388 pss = rsa_pss_decode(sigalg, &maskHash);
588 X509_ALGOR *sigalg, EVP_PKEY *pkey)
596 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) {
601 pss = rsa_pss_decode(sigalg, &maskHash);
697 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
701 if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) {
705 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
587 rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) argument
696 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; local
1000 sigalg = _hx509_crypto_default_sig_alg;
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
1403 sigalg,
H A Dcms.c1347 AlgorithmIdentifier sigalg; local
1351 &sigalg);
1357 &sigalg,
1361 free_AlgorithmIdentifier(&sigalg);
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1517 sigalg,
/freebsd-11-stable/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c534 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
/freebsd-11-stable/crypto/openssl/ssl/
H A Dt1_lib.c1085 int sigalg = tls12_get_sigid(pkey); local
1087 if (sigalg == -1)
1090 if (sigalg != (int)sig[1]) {
1452 * 2 bytes for the sigalg list length
1453 * + sigalg list length

Completed in 160 milliseconds