Searched refs:sigalg (Results 1 - 25 of 33) sorted by relevance

12

/freebsd-current/crypto/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
84 $self->{sigalg}
[all...]
H A DServerKeyExchange.pm36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
[all...]
/freebsd-current/contrib/unbound/validator/
H A Dval_sigcrypt.h80 * @param sigalg: adds to signalled algorithm list too.
83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
88 * @param sigalg: signalled algorithm list, numbers ends with 0.
90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
97 * @param sigalg: list of signalled algos, constructed as output,
101 int fav_ds_algo, uint8_t* sigalg);
257 * @param sigalg: if nonNULL provide downgrade protection otherwise one
270 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
H A Dval_utils.c380 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
406 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
551 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
571 if(sigalg) {
574 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
585 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) {
607 if(!sigalg || algo_needs_set_secure(&needs,
616 } else if(sigalg && sec == sec_status_bogus) {
641 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
654 uint8_t sigalg[ALGO_NEEDS_MA local
378 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int *verified) argument
549 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument
678 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument
826 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
[all...]
H A Dval_utils.h143 * @param sigalg: if nonNULL provide downgrade protection otherwise one
155 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
166 * @param sigalg: if nonNULL provide downgrade protection otherwise one
179 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
H A Dval_kentry.h189 * @param sigalg: signalled algorithm list (or NULL).
197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
H A Dval_sigcrypt.c437 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
449 sigalg[total] = algo;
453 sigalg[total] = 0;
457 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) argument
463 while( (algo=*sigalg++) != 0) {
473 int fav_ds_algo, uint8_t* sigalg)
489 sigalg[total] = algo;
493 sigalg[total] = 0;
625 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
646 if(sigalg) {
436 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument
472 algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, int fav_ds_algo, uint8_t* sigalg) argument
623 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int* verified) argument
[all...]
H A Dval_kentry.c305 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
326 if(sigalg) {
327 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg);
303 key_entry_create_rrset(struct regional* region, uint8_t* name, size_t namelen, uint16_t dclass, struct ub_packed_rrset_key* rrset, uint8_t* sigalg, sldns_ede_code reason_bogus, const char* reason, time_t now) argument
/freebsd-current/crypto/openssl/test/recipes/
H A D70-test_sslsigalgs.t102 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to
109 "Mismatch between CertVerify sigalg and public key OID");
266 "backwards compatible sigalg sent for compat ClientHello");
322 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
341 my $sigalg;
343 $sigalg = pack "C2", 0x00, 0x00;
345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01;
351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04;
353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
[all...]
/freebsd-current/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg);
524 const X509_ALGOR *sigalg, EVP_PKEY *pkey)
532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
537 pss = ossl_rsa_pss_decode(sigalg);
616 const void *asn, const X509_ALGOR *sigalg,
620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, argument
523 ossl_rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, const X509_ALGOR *sigalg, EVP_PKEY *pkey) argument
615 rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, const void *asn, const X509_ALGOR *sigalg, const ASN1_BIT_STRING *sig, EVP_PKEY *pkey) argument
[all...]
/freebsd-current/crypto/openssl/crypto/x509/
H A Dt_x509.c311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, argument
318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
323 sig_nid = OBJ_obj2nid(sigalg->algorithm);
330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0);
/freebsd-current/crypto/openssl/ssl/
H A Dt1_trce.c695 unsigned int sigalg = (p[0] << 8) | p[1]; local
699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
711 unsigned int sigalg; local
771 sigalg = (ext[0] << 8) | ext[1];
773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1288 unsigned int sigalg; local
1323 sigalg = (msg[0] << 8) | msg[1];
1325 ssl_trace_str(sigalg, ssl_sigalg_tb
[all...]
H A Dt1_lib.c1003 /* Default sigalg schemes */
1222 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) argument
1231 if (lu->sigalg == sigalg) {
1355 /* Set peer sigalg based key type */
1472 if (lu->sigalg == TLSEXT_SIGALG_ed25519)
1474 else if (lu->sigalg == TLSEXT_SIGALG_ed448)
1521 /* Check the sigalg is consistent with the key OID */
1553 /* Check sigalg matches a permissible Suite B value */
1585 * reasons we have to pass the sigalg a
2591 const SIGALG_LOOKUP *sigalg; local
[all...]
/freebsd-current/crypto/openssh/
H A Dserverloop.c685 const char *sigalg, *kex_rsa_sigalg = NULL; local
726 sigalg = NULL;
729 sigalg = kex_rsa_sigalg;
731 sigalg = "rsa-sha2-512";
733 sigalg = "rsa-sha2-256";
735 debug3_f("sign %s key (index %d) using sigalg %s",
736 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
743 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||
H A Dmonitor.c1398 char *sigalg = NULL, *fp = NULL; local
1407 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0)
1415 if (*sigalg == '\0') {
1416 free(sigalg);
1417 sigalg = NULL;
1448 sigalg, ssh->compat, &sig_details);
1450 sshkey_type(key), sigalg == NULL ? "default" : sigalg,
1503 free(sigalg);
H A Dsshkey.h193 const char *sigalg; member in struct:sshkey_impl
H A Dmonitor_wrap.c504 const u_char *data, size_t datalen, const char *sigalg, u_int compat,
522 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0)
503 mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t datalen, const char *sigalg, u_int compat, struct sshkey_sig_details **sig_detailsp) argument
H A Dkex.c512 const char *sigalg; local
528 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL)
530 if (!has_any_alg(sigalg, sigalgs))
534 has_any_alg(sigalg, ssh->kex->server_sig_algs))
536 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg);
/freebsd-current/crypto/openssl/include/crypto/
H A Dasn1.h50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
H A Drsa.h115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; local
1000 sigalg = _hx509_crypto_default_sig_alg;
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
1403 sigalg,
H A Dcms.c1347 AlgorithmIdentifier sigalg; local
1351 &sigalg);
1357 &sigalg,
1361 free_AlgorithmIdentifier(&sigalg);
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1517 sigalg,
/freebsd-current/crypto/openssl/ssl/statem/
H A Dstatem_lib.c283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg;
308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
434 unsigned int sigalg; local
436 if (!PACKET_get_net_2(pkt, &sigalg)) {
440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
/freebsd-current/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c375 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, argument

Completed in 361 milliseconds

12