/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 79 * @param sigalg: adds to signalled algorithm list too. 82 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 87 * @param sigalg: signalled algorithm list, numbers ends with 0. 89 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 96 * @param sigalg: list of signalled algos, constructed as output, 100 int fav_ds_algo, uint8_t* sigalg); 239 * @param sigalg: if nonNULL provide downgrade protection otherwise one 250 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_utils.h | 122 * @param sigalg: if nonNULL provide downgrade protection otherwise one 131 uint8_t* sigalg, char** reason, sldns_pkt_section section, 157 * @param sigalg: if nonNULL provide downgrade protection otherwise one 168 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 179 * @param sigalg: if nonNULL provide downgrade protection otherwise one 191 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_utils.c | 338 uint8_t* sigalg, char** reason, sldns_pkt_section section, 361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, 485 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 504 if(sigalg) { 507 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 518 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { 530 if(!sigalg || algo_needs_set_secure(&needs, 535 } else if(sigalg && sec == sec_status_bogus) { 551 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 564 uint8_t sigalg[ALGO_NEEDS_MA local 336 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument 483 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument 585 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, struct module_qstate* qstate) argument 702 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
H A D | val_kentry.h | 182 * @param sigalg: signalled algorithm list (or NULL). 188 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now);
|
H A D | val_sigcrypt.c | 390 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 402 sigalg[total] = algo; 406 sigalg[total] = 0; 410 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument 416 while( (algo=*sigalg++) != 0) { 426 int fav_ds_algo, uint8_t* sigalg) 442 sigalg[total] = algo; 446 sigalg[total] = 0; 488 uint8_t* sigalg, char** reason, sldns_pkt_section section, 506 if(sigalg) { 389 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument 425 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument 486 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_pkt_section section, struct module_qstate* qstate) argument [all...] |
H A D | val_kentry.c | 298 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) 314 if(sigalg) { 315 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); 296 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, time_t now) argument
|
H A D | autotrust.c | 1256 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local 1259 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, 1261 /* sigalg is ignored, it returns algorithms signalled to exist, but
|
/freebsd-13-stable/crypto/openssl/crypto/x509/ |
H A D | t_x509.c | 301 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, argument 307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 310 sig_nid = OBJ_obj2nid(sigalg->algorithm); 317 return ameth->sig_print(bp, sigalg, sig, 9, 0);
|
/freebsd-13-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 448 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument 451 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { 453 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg); 667 X509_ALGOR *sigalg, EVP_PKEY *pkey) 675 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 680 pss = rsa_pss_decode(sigalg); 783 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 787 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 791 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 859 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, argument 666 rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) argument 782 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | t1_trce.c | 681 unsigned int sigalg = (p[0] << 8) | p[1]; local 685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 697 unsigned int sigalg; local 757 sigalg = (ext[0] << 8) | ext[1]; 759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1267 unsigned int sigalg; local 1302 sigalg = (msg[0] << 8) | msg[1]; 1304 ssl_trace_str(sigalg, ssl_sigalg_tb [all...] |
H A D | t1_lib.c | 637 /* Default sigalg schemes */ 800 static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg) argument 807 if (s->sigalg == sigalg) 908 /* Set peer sigalg based key type */ 1011 if (lu->sigalg == TLSEXT_SIGALG_ed25519) 1013 else if (lu->sigalg == TLSEXT_SIGALG_ed448) 1061 /* Check the sigalg is consistent with the key OID */ 1099 /* Check sigalg matches a permissible Suite B value */ 1136 * reasons we have to pass the sigalg a 2110 const SIGALG_LOOKUP *sigalg; local [all...] |
H A D | ssl_local.h | 1494 uint16_t sigalg; member in struct:sigalg_lookup_st 1616 const SIGALG_LOOKUP *sigalg; member in struct:ssl3_state_st::__anon7298
|
H A D | s3_lib.c | 3686 if (s->s3->tmp.sigalg == NULL) 3688 *(int *)parg = s->s3->tmp.sigalg->hash;
|
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | asn1.h | 41 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 995 const AlgorithmIdentifier *sigalg; local 1000 sigalg = _hx509_crypto_default_sig_alg; 1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); 1403 sigalg,
|
H A D | cms.c | 1347 AlgorithmIdentifier sigalg; local 1351 &sigalg); 1357 &sigalg, 1361 free_AlgorithmIdentifier(&sigalg);
|
H A D | revoke.c | 1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local 1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); 1517 sigalg,
|
/freebsd-13-stable/crypto/openssh/ |
H A D | monitor.c | 1400 char *sigalg; local 1407 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0) 1415 if (*sigalg == '\0') { 1416 free(sigalg); 1417 sigalg = NULL; 1442 sigalg, active_state->compat); 1450 free(sigalg);
|
H A D | monitor_wrap.c | 540 const u_char *data, size_t datalen, const char *sigalg, u_int compat) 554 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0) 539 mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t datalen, const char *sigalg, u_int compat) argument
|
H A D | sshkey.c | 89 const char *sigalg; member in struct:keytype 2352 if (kt->sigalg != NULL) 2353 return kt->sigalg;
|
/freebsd-13-stable/crypto/openssl/crypto/ec/ |
H A D | ecx_meth.c | 506 X509_ALGOR *sigalg, ASN1_BIT_STRING *str, 514 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); 505 ecd_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, X509_ALGOR *sigalg, ASN1_BIT_STRING *str, EVP_PKEY *pkey) argument
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 240 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg; 268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { 384 unsigned int sigalg; local 386 if (!PACKET_get_net_2(pkt, &sigalg)) { 391 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
|
H A D | statem_clnt.c | 2323 unsigned int sigalg; local 2325 if (!PACKET_get_net_2(pkt, &sigalg)) { 2330 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { 3447 if (!tls_choose_sigalg(s, 0) || s->s3->tmp.sigalg == NULL)
|
H A D | statem_srvr.c | 2498 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg; 2790 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
|
/freebsd-13-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 429 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
|