Searched refs:sigalg (Results 1 - 25 of 25) sorted by relevance

/freebsd-13-stable/contrib/unbound/validator/
H A Dval_sigcrypt.h79 * @param sigalg: adds to signalled algorithm list too.
82 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
87 * @param sigalg: signalled algorithm list, numbers ends with 0.
89 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
96 * @param sigalg: list of signalled algos, constructed as output,
100 int fav_ds_algo, uint8_t* sigalg);
239 * @param sigalg: if nonNULL provide downgrade protection otherwise one
250 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason,
H A Dval_utils.h122 * @param sigalg: if nonNULL provide downgrade protection otherwise one
131 uint8_t* sigalg, char** reason, sldns_pkt_section section,
157 * @param sigalg: if nonNULL provide downgrade protection otherwise one
168 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
179 * @param sigalg: if nonNULL provide downgrade protection otherwise one
191 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
H A Dval_utils.c338 uint8_t* sigalg, char** reason, sldns_pkt_section section,
361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
485 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
504 if(sigalg) {
507 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
518 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) {
530 if(!sigalg || algo_needs_set_secure(&needs,
535 } else if(sigalg && sec == sec_status_bogus) {
551 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
564 uint8_t sigalg[ALGO_NEEDS_MA local
336 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument
483 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument
585 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument
702 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
[all...]
H A Dval_kentry.h182 * @param sigalg: signalled algorithm list (or NULL).
188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
H A Dval_sigcrypt.c390 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
402 sigalg[total] = algo;
406 sigalg[total] = 0;
410 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument
416 while( (algo=*sigalg++) != 0) {
426 int fav_ds_algo, uint8_t* sigalg)
442 sigalg[total] = algo;
446 sigalg[total] = 0;
488 uint8_t* sigalg, char** reason, sldns_pkt_section section,
506 if(sigalg) {
389 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument
425 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument
486 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument
[all...]
H A Dval_kentry.c298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now)
314 if(sigalg) {
315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg);
296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
H A Dautotrust.c1256 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
1259 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason,
1261 /* sigalg is ignored, it returns algorithms signalled to exist, but
/freebsd-13-stable/crypto/openssl/crypto/x509/
H A Dt_x509.c301 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, argument
307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
310 sig_nid = OBJ_obj2nid(sigalg->algorithm);
317 return ameth->sig_print(bp, sigalg, sig, 9, 0);
/freebsd-13-stable/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c448 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
451 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
453 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg);
667 X509_ALGOR *sigalg, EVP_PKEY *pkey)
675 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
680 pss = rsa_pss_decode(sigalg);
783 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
787 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
791 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
859 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, argument
666 rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) argument
782 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
[all...]
/freebsd-13-stable/crypto/openssl/ssl/
H A Dt1_trce.c681 unsigned int sigalg = (p[0] << 8) | p[1]; local
685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
697 unsigned int sigalg; local
757 sigalg = (ext[0] << 8) | ext[1];
759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1267 unsigned int sigalg; local
1302 sigalg = (msg[0] << 8) | msg[1];
1304 ssl_trace_str(sigalg, ssl_sigalg_tb
[all...]
H A Dt1_lib.c637 /* Default sigalg schemes */
800 static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg) argument
807 if (s->sigalg == sigalg)
908 /* Set peer sigalg based key type */
1011 if (lu->sigalg == TLSEXT_SIGALG_ed25519)
1013 else if (lu->sigalg == TLSEXT_SIGALG_ed448)
1061 /* Check the sigalg is consistent with the key OID */
1099 /* Check sigalg matches a permissible Suite B value */
1136 * reasons we have to pass the sigalg a
2110 const SIGALG_LOOKUP *sigalg; local
[all...]
H A Dssl_local.h1494 uint16_t sigalg; member in struct:sigalg_lookup_st
1616 const SIGALG_LOOKUP *sigalg; member in struct:ssl3_state_st::__anon7298
H A Ds3_lib.c3686 if (s->s3->tmp.sigalg == NULL)
3688 *(int *)parg = s->s3->tmp.sigalg->hash;
/freebsd-13-stable/crypto/openssl/include/crypto/
H A Dasn1.h41 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; local
1000 sigalg = _hx509_crypto_default_sig_alg;
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
1403 sigalg,
H A Dcms.c1347 AlgorithmIdentifier sigalg; local
1351 &sigalg);
1357 &sigalg,
1361 free_AlgorithmIdentifier(&sigalg);
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1517 sigalg,
/freebsd-13-stable/crypto/openssh/
H A Dmonitor.c1400 char *sigalg; local
1407 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0)
1415 if (*sigalg == '\0') {
1416 free(sigalg);
1417 sigalg = NULL;
1442 sigalg, active_state->compat);
1450 free(sigalg);
H A Dmonitor_wrap.c540 const u_char *data, size_t datalen, const char *sigalg, u_int compat)
554 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0)
539 mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t datalen, const char *sigalg, u_int compat) argument
H A Dsshkey.c89 const char *sigalg; member in struct:keytype
2352 if (kt->sigalg != NULL)
2353 return kt->sigalg;
/freebsd-13-stable/crypto/openssl/crypto/ec/
H A Decx_meth.c506 X509_ALGOR *sigalg, ASN1_BIT_STRING *str,
514 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg);
505 ecd_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *str, EVP_PKEY *pkey) argument
/freebsd-13-stable/crypto/openssl/ssl/statem/
H A Dstatem_lib.c240 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg;
268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
384 unsigned int sigalg; local
386 if (!PACKET_get_net_2(pkt, &sigalg)) {
391 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
H A Dstatem_clnt.c2323 unsigned int sigalg; local
2325 if (!PACKET_get_net_2(pkt, &sigalg)) {
2330 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) {
3447 if (!tls_choose_sigalg(s, 0) || s->s3->tmp.sigalg == NULL)
H A Dstatem_srvr.c2498 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg;
2790 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
/freebsd-13-stable/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c429 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument

Completed in 315 milliseconds