/netbsd-current/external/mpl/bind/dist/lib/isccfg/ |
H A D | kaspconf.c | 245 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local 252 if (keyalg == DNS_KEYALG_RSAMD5 || keyalg == DNS_KEYALG_DH || 253 keyalg == DNS_KEYALG_DSA || keyalg == DNS_KEYALG_RSASHA1) 255 badalg = keyalg; 457 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local 458 INSIST(keyalg < ARRAY_SIZE(role)); 461 if ((role[keyalg] & DNS_KASP_KEY_ROLE_ZSK) != 0) 463 warn[keyalg][ [all...] |
/netbsd-current/external/mpl/dhcp/bind/dist/lib/isccfg/ |
H A D | kaspconf.c | 196 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local 203 if (keyalg == DNS_KEYALG_RSAMD5 || keyalg == DNS_KEYALG_DH || 204 keyalg == DNS_KEYALG_DSA || keyalg == DNS_KEYALG_RSASHA1) 206 badalg = keyalg; 345 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local 346 INSIST(keyalg < ARRAY_SIZE(role)); 349 role[keyalg] |= DNS_KASP_KEY_ROLE_ZSK; 353 role[keyalg] | [all...] |
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libverify/ |
H A D | libverify.c | 408 buf[cc++] = pubkey->keyalg; 409 switch(pubkey->keyalg) { 454 if (ALG_IS_RSA(pubkey->keyalg)) { 615 print_key_mpis(pgpv_bignum_t *v, uint8_t keyalg) argument 619 switch(keyalg) { 645 printf("hi, unusual keyalg %u\n", keyalg); 673 switch(sigpkt->sig.keyalg) { 692 printf("weird type of sig! %d\n", sigpkt->sig.keyalg); 836 sigpkt->sig.keyalg 1332 fmtkeyalg(uint8_t keyalg) argument [all...] |
H A D | verify.h | 69 uint8_t keyalg; /* key algorithm */ member in struct:pgpv_pubkey_t 121 uint8_t keyalg; member in struct:pgpv_signature_t 160 uint8_t keyalg; member in struct:pgpv_onepass_t
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | libverify.c | 90 uint8_t keyalg; /* key algorithm */ member in struct:pgpv_pubkey_t 143 uint8_t keyalg; member in struct:pgpv_signature_t 184 uint8_t keyalg; member in struct:pgpv_onepass_t 775 buf[cc++] = pubkey->keyalg; /* XXX - sign, or encrypt and sign? */ 776 switch(pubkey->keyalg) { 821 if (ALG_IS_RSA(pubkey->keyalg)) { 1000 print_key_mpis(pgpv_bignum_t *v, uint8_t keyalg) argument 1004 switch(keyalg) { 1030 printf("hi, unusual keyalg %u\n", keyalg); 1731 fmtkeyalg(uint8_t keyalg) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/pem/ |
H A D | pvkfmt.c | 430 unsigned int bitlen, magic = 0, keyalg; local 435 keyalg = MS_KEYALG_DSS_SIGN; 438 keyalg = MS_KEYALG_RSA_KEYX; 444 keyalg == MS_KEYALG_DSS_SIGN ? 1 : 0, ispub); 464 write_ledword(&p, keyalg); 467 if (keyalg == MS_KEYALG_DSS_SIGN)
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/pem/ |
H A D | pvkfmt.c | 557 unsigned int bitlen = 0, magic = 0, keyalg = 0; local 562 keyalg = MS_KEYALG_RSA_KEYX; 566 keyalg = MS_KEYALG_DSS_SIGN; 573 + ossl_blob_length(bitlen, keyalg == MS_KEYALG_DSS_SIGN ? 1 : 0, ispub); 594 write_ledword(&p, keyalg); 597 if (keyalg == MS_KEYALG_RSA_KEYX)
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | req.c | 236 const char *keyalg = NULL; local 318 keyalg = opt_arg(); 579 if (keyalg != NULL) { 580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey,
|
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | req.c | 258 const char *keyalg = NULL; local 347 keyalg = opt_arg(); 643 genctx = set_keygen_ctx(keyalg, &keyalgstr, &newkey_len, gen_eng);
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/ |
H A D | kasp.sh | 952 -v keyalg="$(key_get "${1}" ALG_NUM)" \ 955 $1 == zone && $2 == ttl && $4 == qtype && $5 == keyid && $6 == keyalg && $7 == hashalg { ret=0; exit; } 966 -v keyalg="$(key_get "${1}" ALG_NUM)" \ 968 $1 == zone && $2 == ttl && $4 == qtype && $5 == flags && $7 == keyalg { ret=0; exit; }
|
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | dnssec.c | 1617 dns_secalg_t keyalg, sigalg; local 1619 keyalg = dst_key_alg(key->key); 1632 if (keyid == sigid && keyalg == sigalg) {
|
/netbsd-current/external/mpl/bind/dist/lib/dns/ |
H A D | dnssec.c | 1623 dns_secalg_t keyalg, sigalg; local 1625 keyalg = dst_key_alg(key->key); 1638 if (keyid == sigid && keyalg == sigalg) {
|