/freebsd-current/crypto/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} [all...] |
H A D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine [all...] |
/freebsd-current/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 80 * @param sigalg: adds to signalled algorithm list too. 83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 88 * @param sigalg: signalled algorithm list, numbers ends with 0. 90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 97 * @param sigalg: list of signalled algos, constructed as output, 101 int fav_ds_algo, uint8_t* sigalg); 257 * @param sigalg: if nonNULL provide downgrade protection otherwise one 270 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
|
H A D | val_utils.c | 380 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, 406 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, 551 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 571 if(sigalg) { 574 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 585 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { 607 if(!sigalg || algo_needs_set_secure(&needs, 616 } else if(sigalg && sec == sec_status_bogus) { 641 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 654 uint8_t sigalg[ALGO_NEEDS_MA local 378 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int *verified) argument 549 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 678 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 826 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
H A D | val_utils.h | 143 * @param sigalg: if nonNULL provide downgrade protection otherwise one 155 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 166 * @param sigalg: if nonNULL provide downgrade protection otherwise one 179 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_kentry.h | 189 * @param sigalg: signalled algorithm list (or NULL). 197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
|
H A D | val_sigcrypt.c | 437 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 449 sigalg[total] = algo; 453 sigalg[total] = 0; 457 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument 463 while( (algo=*sigalg++) != 0) { 473 int fav_ds_algo, uint8_t* sigalg) 489 sigalg[total] = algo; 493 sigalg[total] = 0; 625 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, 646 if(sigalg) { 436 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument 472 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument 623 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int* verified) argument [all...] |
H A D | val_kentry.c | 305 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, 326 if(sigalg) { 327 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); 303 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, sldns_ede_code reason_bogus, const char* reason, time_t now) argument
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 70-test_sslsigalgs.t | 102 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to 109 "Mismatch between CertVerify sigalg and public key OID"); 266 "backwards compatible sigalg sent for compat ClientHello"); 322 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello"); 341 my $sigalg; 343 $sigalg = pack "C2", 0x00, 0x00; 345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); [all...] |
/freebsd-current/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument 404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); 524 const X509_ALGOR *sigalg, EVP_PKEY *pkey) 532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 537 pss = ossl_rsa_pss_decode(sigalg); 616 const void *asn, const X509_ALGOR *sigalg, 620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, argument 523 ossl_rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, const X509_ALGOR *sigalg, EVP_PKEY *pkey) argument 615 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, const void *asn, const X509_ALGOR *sigalg, const ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument [all...] |
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | t_x509.c | 311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, argument 318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 323 sig_nid = OBJ_obj2nid(sigalg->algorithm); 330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0);
|
/freebsd-current/crypto/openssl/ssl/ |
H A D | t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 711 unsigned int sigalg; local 771 sigalg = (ext[0] << 8) | ext[1]; 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1288 unsigned int sigalg; local 1323 sigalg = (msg[0] << 8) | msg[1]; 1325 ssl_trace_str(sigalg, ssl_sigalg_tb [all...] |
H A D | t1_lib.c | 1003 /* Default sigalg schemes */ 1222 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) argument 1231 if (lu->sigalg == sigalg) { 1355 /* Set peer sigalg based key type */ 1472 if (lu->sigalg == TLSEXT_SIGALG_ed25519) 1474 else if (lu->sigalg == TLSEXT_SIGALG_ed448) 1521 /* Check the sigalg is consistent with the key OID */ 1553 /* Check sigalg matches a permissible Suite B value */ 1585 * reasons we have to pass the sigalg a 2591 const SIGALG_LOOKUP *sigalg; local [all...] |
/freebsd-current/crypto/openssh/ |
H A D | serverloop.c | 685 const char *sigalg, *kex_rsa_sigalg = NULL; local 726 sigalg = NULL; 729 sigalg = kex_rsa_sigalg; 731 sigalg = "rsa-sha2-512"; 733 sigalg = "rsa-sha2-256"; 735 debug3_f("sign %s key (index %d) using sigalg %s", 736 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); 743 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||
|
H A D | monitor.c | 1398 char *sigalg = NULL, *fp = NULL; local 1407 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0) 1415 if (*sigalg == '\0') { 1416 free(sigalg); 1417 sigalg = NULL; 1448 sigalg, ssh->compat, &sig_details); 1450 sshkey_type(key), sigalg == NULL ? "default" : sigalg, 1503 free(sigalg);
|
H A D | sshkey.h | 193 const char *sigalg; member in struct:sshkey_impl
|
H A D | monitor_wrap.c | 504 const u_char *data, size_t datalen, const char *sigalg, u_int compat, 522 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0) 503 mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t datalen, const char *sigalg, u_int compat, struct sshkey_sig_details **sig_detailsp) argument
|
H A D | kex.c | 512 const char *sigalg; local 528 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL) 530 if (!has_any_alg(sigalg, sigalgs)) 534 has_any_alg(sigalg, ssh->kex->server_sig_algs)) 536 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg);
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
H A D | rsa.h | 115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 995 const AlgorithmIdentifier *sigalg; local 1000 sigalg = _hx509_crypto_default_sig_alg; 1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); 1403 sigalg,
|
H A D | cms.c | 1347 AlgorithmIdentifier sigalg; local 1351 &sigalg); 1357 &sigalg, 1361 free_AlgorithmIdentifier(&sigalg);
|
H A D | revoke.c | 1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local 1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); 1517 sigalg,
|
/freebsd-current/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; 308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { 434 unsigned int sigalg; local 436 if (!PACKET_get_net_2(pkt, &sigalg)) { 440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
|
/freebsd-current/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 375 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
|