Searched refs:keyalg (Results 1 - 12 of 12) sorted by relevance

/netbsd-current/external/mpl/bind/dist/lib/isccfg/
H A Dkaspconf.c245 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local
252 if (keyalg == DNS_KEYALG_RSAMD5 || keyalg == DNS_KEYALG_DH ||
253 keyalg == DNS_KEYALG_DSA || keyalg == DNS_KEYALG_RSASHA1)
255 badalg = keyalg;
457 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local
458 INSIST(keyalg < ARRAY_SIZE(role));
461 if ((role[keyalg] & DNS_KASP_KEY_ROLE_ZSK) != 0)
463 warn[keyalg][
[all...]
/netbsd-current/external/mpl/dhcp/bind/dist/lib/isccfg/
H A Dkaspconf.c196 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local
203 if (keyalg == DNS_KEYALG_RSAMD5 || keyalg == DNS_KEYALG_DH ||
204 keyalg == DNS_KEYALG_DSA || keyalg == DNS_KEYALG_RSASHA1)
206 badalg = keyalg;
345 uint32_t keyalg = dns_kasp_key_algorithm(kkey); local
346 INSIST(keyalg < ARRAY_SIZE(role));
349 role[keyalg] |= DNS_KASP_KEY_ROLE_ZSK;
353 role[keyalg] |
[all...]
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libverify/
H A Dlibverify.c408 buf[cc++] = pubkey->keyalg;
409 switch(pubkey->keyalg) {
454 if (ALG_IS_RSA(pubkey->keyalg)) {
615 print_key_mpis(pgpv_bignum_t *v, uint8_t keyalg) argument
619 switch(keyalg) {
645 printf("hi, unusual keyalg %u\n", keyalg);
673 switch(sigpkt->sig.keyalg) {
692 printf("weird type of sig! %d\n", sigpkt->sig.keyalg);
836 sigpkt->sig.keyalg
1332 fmtkeyalg(uint8_t keyalg) argument
[all...]
H A Dverify.h69 uint8_t keyalg; /* key algorithm */ member in struct:pgpv_pubkey_t
121 uint8_t keyalg; member in struct:pgpv_signature_t
160 uint8_t keyalg; member in struct:pgpv_onepass_t
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/
H A Dlibverify.c90 uint8_t keyalg; /* key algorithm */ member in struct:pgpv_pubkey_t
143 uint8_t keyalg; member in struct:pgpv_signature_t
184 uint8_t keyalg; member in struct:pgpv_onepass_t
775 buf[cc++] = pubkey->keyalg; /* XXX - sign, or encrypt and sign? */
776 switch(pubkey->keyalg) {
821 if (ALG_IS_RSA(pubkey->keyalg)) {
1000 print_key_mpis(pgpv_bignum_t *v, uint8_t keyalg) argument
1004 switch(keyalg) {
1030 printf("hi, unusual keyalg %u\n", keyalg);
1731 fmtkeyalg(uint8_t keyalg) argument
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/pem/
H A Dpvkfmt.c430 unsigned int bitlen, magic = 0, keyalg; local
435 keyalg = MS_KEYALG_DSS_SIGN;
438 keyalg = MS_KEYALG_RSA_KEYX;
444 keyalg == MS_KEYALG_DSS_SIGN ? 1 : 0, ispub);
464 write_ledword(&p, keyalg);
467 if (keyalg == MS_KEYALG_DSS_SIGN)
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/pem/
H A Dpvkfmt.c557 unsigned int bitlen = 0, magic = 0, keyalg = 0; local
562 keyalg = MS_KEYALG_RSA_KEYX;
566 keyalg = MS_KEYALG_DSS_SIGN;
573 + ossl_blob_length(bitlen, keyalg == MS_KEYALG_DSS_SIGN ? 1 : 0, ispub);
594 write_ledword(&p, keyalg);
597 if (keyalg == MS_KEYALG_RSA_KEYX)
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A Dreq.c236 const char *keyalg = NULL; local
318 keyalg = opt_arg();
579 if (keyalg != NULL) {
580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey,
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A Dreq.c258 const char *keyalg = NULL; local
347 keyalg = opt_arg();
643 genctx = set_keygen_ctx(keyalg, &keyalgstr, &newkey_len, gen_eng);
/netbsd-current/external/mpl/bind/dist/bin/tests/system/
H A Dkasp.sh952 -v keyalg="$(key_get "${1}" ALG_NUM)" \
955 $1 == zone && $2 == ttl && $4 == qtype && $5 == keyid && $6 == keyalg && $7 == hashalg { ret=0; exit; }
966 -v keyalg="$(key_get "${1}" ALG_NUM)" \
968 $1 == zone && $2 == ttl && $4 == qtype && $5 == flags && $7 == keyalg { ret=0; exit; }
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/
H A Ddnssec.c1617 dns_secalg_t keyalg, sigalg; local
1619 keyalg = dst_key_alg(key->key);
1632 if (keyid == sigid && keyalg == sigalg) {
/netbsd-current/external/mpl/bind/dist/lib/dns/
H A Ddnssec.c1623 dns_secalg_t keyalg, sigalg; local
1625 keyalg = dst_key_alg(key->key);
1638 if (keyid == sigid && keyalg == sigalg) {

Completed in 308 milliseconds