/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} = shift; 86 return $self->{sigalg};
|
H A D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine 145 $self->{sigalg} = shift; 147 return $self->{sigalg};
|
/freebsd/contrib/unbound/validator/ |
H A D | val_utils.c | 407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, in val_verify_rrset() argument 433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, in val_verify_rrset() 578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, in val_verify_DNSKEY_with_DS() argument 599 if(sigalg) { in val_verify_DNSKEY_with_DS() 602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); in val_verify_DNSKEY_with_DS() 613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { in val_verify_DNSKEY_with_DS() 635 if(!sigalg || algo_needs_set_secure(&needs, in val_verify_DNSKEY_with_DS() 644 } else if(sigalg && sec == sec_status_bogus) { in val_verify_DNSKEY_with_DS() 669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { in val_verify_DNSKEY_with_DS() 683 uint8_t sigalg[ALGO_NEEDS_MAX+1]; in val_verify_new_DNSKEYs() local [all …]
|
H A D | val_sigcrypt.h | 83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 101 int fav_ds_algo, uint8_t* sigalg); 274 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
|
H A D | val_sigcrypt.c | 437 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) in algo_needs_init_dnskey_add() argument 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 453 sigalg[total] = 0; in algo_needs_init_dnskey_add() 457 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) in algo_needs_init_list() argument 463 while( (algo=*sigalg++) != 0) { in algo_needs_init_list() 473 int fav_ds_algo, uint8_t* sigalg) in algo_needs_init_ds() argument 489 sigalg[total] = algo; in algo_needs_init_ds() 493 sigalg[total] = 0; in algo_needs_init_ds() 625 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, in dnskeyset_verify_rrset() argument 647 if(sigalg) { in dnskeyset_verify_rrset() [all …]
|
H A D | val_utils.h | 159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 186 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
|
H A D | val_kentry.c | 305 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, in key_entry_create_rrset() argument 326 if(sigalg) { in key_entry_create_rrset() 327 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); in key_entry_create_rrset()
|
H A D | val_kentry.h | 197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 70-test_sslsigalgs.t | 341 my $sigalg; 343 $sigalg = pack "C2", 0x00, 0x00; 345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); 465 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print() 524 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument 532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 537 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx() 616 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument 620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, in rsa_sig_info_set() argument [all …]
|
/freebsd/crypto/openssl/ssl/ |
H A D | t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 711 unsigned int sigalg; in ssl_print_extension() local 771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1288 unsigned int sigalg; in ssl_print_cert_request() local 1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
H A D | t1_lib.c | 1223 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) in tls1_lookup_sigalg() argument 1232 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg() 1473 if (lu->sigalg == TLSEXT_SIGALG_ed25519) in sigalg_security_bits() 1475 else if (lu->sigalg == TLSEXT_SIGALG_ed448) in sigalg_security_bits() 1613 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid() 1615 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid() 1725 if (lu->sigalg == sent_sigs[j]) { in tls1_set_server_sigalgs() 2136 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 2137 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 2404 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); in SSL_get_shared_sigalgs() [all …]
|
/freebsd/crypto/openssh/ |
H A D | serverloop.c | 652 const char *sigalg, *kex_rsa_sigalg = NULL; in server_input_hostkeys_prove() local 693 sigalg = NULL; in server_input_hostkeys_prove() 696 sigalg = kex_rsa_sigalg; in server_input_hostkeys_prove() 698 sigalg = "rsa-sha2-512"; in server_input_hostkeys_prove() 700 sigalg = "rsa-sha2-256"; in server_input_hostkeys_prove() 703 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); in server_input_hostkeys_prove() 710 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove()
|
H A D | monitor.c | 1423 char *sigalg = NULL, *fp = NULL; in mm_answer_keyverify() local 1432 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0) in mm_answer_keyverify() 1440 if (*sigalg == '\0') { in mm_answer_keyverify() 1441 free(sigalg); in mm_answer_keyverify() 1442 sigalg = NULL; in mm_answer_keyverify() 1473 sigalg, ssh->compat, &sig_details); in mm_answer_keyverify() 1475 sshkey_type(key), sigalg == NULL ? "default" : sigalg, in mm_answer_keyverify() 1528 free(sigalg); in mm_answer_keyverify()
|
H A D | kex.c | 264 const char *sigalg; in kex_set_server_sig_algs() local 280 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL) in kex_set_server_sig_algs() 282 if (!kex_has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs() 286 kex_has_any_alg(sigalg, ssh->kex->server_sig_algs)) in kex_set_server_sig_algs() 288 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg); in kex_set_server_sig_algs()
|
H A D | monitor_wrap.c | 560 const u_char *data, size_t datalen, const char *sigalg, u_int compat, in mm_sshkey_verify() argument 578 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0) in mm_sshkey_verify()
|
H A D | sshkey.h | 194 const char *sigalg; member
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | t_x509.c | 311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 323 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rsa.h | 115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
H A D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 995 const AlgorithmIdentifier *sigalg; in ca_sign() local 1000 sigalg = _hx509_crypto_default_sig_alg; in ca_sign() 1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); in ca_sign() 1403 sigalg, in ca_sign()
|
H A D | cms.c | 1347 AlgorithmIdentifier sigalg; in sig_process() local 1351 &sigalg); in sig_process() 1357 &sigalg, in sig_process() 1361 free_AlgorithmIdentifier(&sigalg); in sig_process()
|
H A D | revoke.c | 1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; in hx509_crl_sign() local 1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); in hx509_crl_sign() 1517 sigalg, in hx509_crl_sign()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify() 308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 434 unsigned int sigalg; in tls_process_cert_verify() local 436 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
/freebsd/contrib/unbound/services/ |
H A D | authzone.c | 7804 struct auth_rrset* rrset, char** why_bogus, uint8_t* sigalg, in zonemd_dnssec_verify_rrset() argument 7834 sec = dnskeyset_verify_rrset(env, ve, &pk, dnskey, sigalg, why_bogus, NULL, in zonemd_dnssec_verify_rrset() 7878 char** reason, char** why_bogus, uint8_t* sigalg, char* reasonbuf, in zonemd_check_dnssec_absence() argument 7891 nsec, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_absence() 7934 nsec3, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_absence() 7956 uint8_t* sigalg, char* reasonbuf, size_t reasonlen) in zonemd_check_dnssec_soazonemd() argument 7969 why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_soazonemd() 7974 zonemd_rrset, why_bogus, sigalg, reasonbuf, reasonlen)) { in zonemd_check_dnssec_soazonemd() 8040 int is_insecure, char** result, uint8_t* sigalg) in auth_zone_verify_zonemd_with_key() argument 8071 &reason, &why_bogus, sigalg, reasonbuf, in auth_zone_verify_zonemd_with_key() [all …]
|