Home
last modified time | relevance | path

Searched refs:sigalg (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
84 $self->{sigalg} = shift;
86 return $self->{sigalg};
H A DServerKeyExchange.pm36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
145 $self->{sigalg} = shift;
147 return $self->{sigalg};
/freebsd/contrib/unbound/validator/
H A Dval_utils.c407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, in val_verify_rrset() argument
433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, in val_verify_rrset()
578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, in val_verify_DNSKEY_with_DS() argument
599 if(sigalg) { in val_verify_DNSKEY_with_DS()
602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); in val_verify_DNSKEY_with_DS()
613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { in val_verify_DNSKEY_with_DS()
635 if(!sigalg || algo_needs_set_secure(&needs, in val_verify_DNSKEY_with_DS()
644 } else if(sigalg && sec == sec_status_bogus) { in val_verify_DNSKEY_with_DS()
669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { in val_verify_DNSKEY_with_DS()
683 uint8_t sigalg[ALGO_NEEDS_MAX+1]; in val_verify_new_DNSKEYs() local
[all …]
H A Dval_sigcrypt.h83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
101 int fav_ds_algo, uint8_t* sigalg);
274 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
H A Dval_sigcrypt.c437 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) in algo_needs_init_dnskey_add() argument
449 sigalg[total] = algo; in algo_needs_init_dnskey_add()
453 sigalg[total] = 0; in algo_needs_init_dnskey_add()
457 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) in algo_needs_init_list() argument
463 while( (algo=*sigalg++) != 0) { in algo_needs_init_list()
473 int fav_ds_algo, uint8_t* sigalg) in algo_needs_init_ds() argument
489 sigalg[total] = algo; in algo_needs_init_ds()
493 sigalg[total] = 0; in algo_needs_init_ds()
625 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, in dnskeyset_verify_rrset() argument
647 if(sigalg) { in dnskeyset_verify_rrset()
[all …]
H A Dval_utils.h159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
186 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
H A Dval_kentry.c305 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, in key_entry_create_rrset() argument
326 if(sigalg) { in key_entry_create_rrset()
327 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); in key_entry_create_rrset()
H A Dval_kentry.h197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslsigalgs.t341 my $sigalg;
343 $sigalg = pack "C2", 0x00, 0x00;
345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01;
351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04;
353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
465 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print()
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print()
524 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument
532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx()
537 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx()
616 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument
620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify()
624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify()
704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, in rsa_sig_info_set() argument
[all …]
/freebsd/crypto/openssl/ssl/
H A Dt1_trce.c695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local
699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature()
711 unsigned int sigalg; in ssl_print_extension() local
771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension()
773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension()
1288 unsigned int sigalg; in ssl_print_cert_request() local
1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request()
1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
H A Dt1_lib.c1223 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) in tls1_lookup_sigalg() argument
1232 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg()
1473 if (lu->sigalg == TLSEXT_SIGALG_ed25519) in sigalg_security_bits()
1475 else if (lu->sigalg == TLSEXT_SIGALG_ed448) in sigalg_security_bits()
1613 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid()
1615 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid()
1725 if (lu->sigalg == sent_sigs[j]) { in tls1_set_server_sigalgs()
2136 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed()
2137 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed()
2404 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); in SSL_get_shared_sigalgs()
[all …]
/freebsd/crypto/openssh/
H A Dserverloop.c652 const char *sigalg, *kex_rsa_sigalg = NULL; in server_input_hostkeys_prove() local
693 sigalg = NULL; in server_input_hostkeys_prove()
696 sigalg = kex_rsa_sigalg; in server_input_hostkeys_prove()
698 sigalg = "rsa-sha2-512"; in server_input_hostkeys_prove()
700 sigalg = "rsa-sha2-256"; in server_input_hostkeys_prove()
703 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); in server_input_hostkeys_prove()
710 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove()
H A Dmonitor.c1423 char *sigalg = NULL, *fp = NULL; in mm_answer_keyverify() local
1432 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0) in mm_answer_keyverify()
1440 if (*sigalg == '\0') { in mm_answer_keyverify()
1441 free(sigalg); in mm_answer_keyverify()
1442 sigalg = NULL; in mm_answer_keyverify()
1473 sigalg, ssh->compat, &sig_details); in mm_answer_keyverify()
1475 sshkey_type(key), sigalg == NULL ? "default" : sigalg, in mm_answer_keyverify()
1528 free(sigalg); in mm_answer_keyverify()
H A Dkex.c264 const char *sigalg; in kex_set_server_sig_algs() local
280 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL) in kex_set_server_sig_algs()
282 if (!kex_has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs()
286 kex_has_any_alg(sigalg, ssh->kex->server_sig_algs)) in kex_set_server_sig_algs()
288 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg); in kex_set_server_sig_algs()
H A Dmonitor_wrap.c560 const u_char *data, size_t datalen, const char *sigalg, u_int compat, in mm_sshkey_verify() argument
578 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0) in mm_sshkey_verify()
H A Dsshkey.h194 const char *sigalg; member
/freebsd/crypto/openssl/crypto/x509/
H A Dt_x509.c311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument
318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print()
323 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print()
330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
/freebsd/crypto/openssl/include/crypto/
H A Drsa.h115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
H A Dasn1.h50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
/freebsd/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; in ca_sign() local
1000 sigalg = _hx509_crypto_default_sig_alg; in ca_sign()
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); in ca_sign()
1403 sigalg, in ca_sign()
H A Dcms.c1347 AlgorithmIdentifier sigalg; in sig_process() local
1351 &sigalg); in sig_process()
1357 &sigalg, in sig_process()
1361 free_AlgorithmIdentifier(&sigalg); in sig_process()
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; in hx509_crl_sign() local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); in hx509_crl_sign()
1517 sigalg, in hx509_crl_sign()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_lib.c283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify()
308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify()
434 unsigned int sigalg; in tls_process_cert_verify() local
436 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify()
440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
/freebsd/contrib/unbound/services/
H A Dauthzone.c7804 struct auth_rrset* rrset, char** why_bogus, uint8_t* sigalg, in zonemd_dnssec_verify_rrset() argument
7834 sec = dnskeyset_verify_rrset(env, ve, &pk, dnskey, sigalg, why_bogus, NULL, in zonemd_dnssec_verify_rrset()
7878 char** reason, char** why_bogus, uint8_t* sigalg, char* reasonbuf, in zonemd_check_dnssec_absence() argument
7891 nsec, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_absence()
7934 nsec3, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_absence()
7956 uint8_t* sigalg, char* reasonbuf, size_t reasonlen) in zonemd_check_dnssec_soazonemd() argument
7969 why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_soazonemd()
7974 zonemd_rrset, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_soazonemd()
8040 int is_insecure, char** result, uint8_t* sigalg) in auth_zone_verify_zonemd_with_key() argument
8071 &reason, &why_bogus, sigalg, reasonbuf, in auth_zone_verify_zonemd_with_key()
[all …]

12