Home
last modified time | relevance | path

Searched refs:sigalg (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
84 $self->{sigalg} = shift;
86 return $self->{sigalg};
H A DServerKeyExchange.pm36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
145 $self->{sigalg} = shift;
147 return $self->{sigalg};
/freebsd/contrib/unbound/validator/
H A Dval_utils.c571 if(sigalg) { in val_verify_DNSKEY_with_DS()
607 if(!sigalg || algo_needs_set_secure(&needs, in val_verify_DNSKEY_with_DS()
616 } else if(sigalg && sec == sec_status_bogus) { in val_verify_DNSKEY_with_DS()
654 uint8_t sigalg[ALGO_NEEDS_MAX+1]; in val_verify_new_DNSKEYs() local
663 downprot?sigalg:NULL, LDNS_EDE_NONE, NULL, in val_verify_new_DNSKEYs()
715 if(sigalg) { in val_verify_DNSKEY_with_TA()
747 if(!sigalg || algo_needs_set_secure(&needs, in val_verify_DNSKEY_with_TA()
756 } else if(sigalg && sec == sec_status_bogus) { in val_verify_DNSKEY_with_TA()
779 if(!sigalg || algo_needs_set_secure(&needs, in val_verify_DNSKEY_with_TA()
788 } else if(sigalg && sec == sec_status_bogus) { in val_verify_DNSKEY_with_TA()
[all …]
H A Dval_sigcrypt.h83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
101 int fav_ds_algo, uint8_t* sigalg);
270 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
H A Dval_sigcrypt.c449 sigalg[total] = algo; in algo_needs_init_dnskey_add()
453 sigalg[total] = 0; in algo_needs_init_dnskey_add()
463 while( (algo=*sigalg++) != 0) { in algo_needs_init_list()
473 int fav_ds_algo, uint8_t* sigalg) in algo_needs_init_ds() argument
489 sigalg[total] = algo; in algo_needs_init_ds()
493 sigalg[total] = 0; in algo_needs_init_ds()
646 if(sigalg) { in dnskeyset_verify_rrset()
647 algo_needs_init_list(&needs, sigalg); in dnskeyset_verify_rrset()
662 if(!sigalg) in dnskeyset_verify_rrset()
667 } else if(sigalg && sec == sec_status_bogus) { in dnskeyset_verify_rrset()
[all …]
H A Dval_utils.h155 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
179 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
H A Dval_kentry.c305 struct ub_packed_rrset_key* rrset, uint8_t* sigalg, in key_entry_create_rrset() argument
326 if(sigalg) { in key_entry_create_rrset()
327 d->algo = (uint8_t*)regional_strdup(region, (char*)sigalg); in key_entry_create_rrset()
H A Dval_kentry.h197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslsigalgs.t341 my $sigalg;
343 $sigalg = pack "C2", 0x00, 0x00;
345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01;
351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04;
353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
465 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_ameth.c401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print()
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print()
524 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument
532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx()
537 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx()
616 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument
620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify()
624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify()
715 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) in rsa_sig_info_set()
[all …]
/freebsd/crypto/openssl/ssl/
H A Dt1_trce.c695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local
699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature()
711 unsigned int sigalg; in ssl_print_extension() local
771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension()
773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension()
1288 unsigned int sigalg; in ssl_print_cert_request() local
1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request()
1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
H A Dt1_lib.c1231 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg()
1612 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid()
1614 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid()
2135 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed()
2136 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed()
2561 *sptr++ = curr->sigalg; in tls1_set_sigalgs()
2591 const SIGALG_LOOKUP *sigalg; in tls1_check_sig_alg() local
2611 sigalg = use_pc_sigalgs in tls1_check_sig_alg()
2614 if (sigalg != NULL && sig_nid == sigalg->sigandhash) in tls1_check_sig_alg()
3245 s->s3.tmp.sigalg = NULL; in tls_choose_sigalg()
[all …]
/freebsd/crypto/openssh/
H A Dserverloop.c685 const char *sigalg, *kex_rsa_sigalg = NULL; in server_input_hostkeys_prove() local
726 sigalg = NULL; in server_input_hostkeys_prove()
729 sigalg = kex_rsa_sigalg; in server_input_hostkeys_prove()
731 sigalg = "rsa-sha2-512"; in server_input_hostkeys_prove()
733 sigalg = "rsa-sha2-256"; in server_input_hostkeys_prove()
736 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); in server_input_hostkeys_prove()
743 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 || in server_input_hostkeys_prove()
H A Dmonitor.c1398 char *sigalg = NULL, *fp = NULL; in mm_answer_keyverify() local
1407 (r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0) in mm_answer_keyverify()
1415 if (*sigalg == '\0') { in mm_answer_keyverify()
1416 free(sigalg); in mm_answer_keyverify()
1417 sigalg = NULL; in mm_answer_keyverify()
1448 sigalg, ssh->compat, &sig_details); in mm_answer_keyverify()
1450 sshkey_type(key), sigalg == NULL ? "default" : sigalg, in mm_answer_keyverify()
1503 free(sigalg); in mm_answer_keyverify()
H A Dkex.c512 const char *sigalg; in kex_set_server_sig_algs() local
528 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL) in kex_set_server_sig_algs()
530 if (!has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs()
534 has_any_alg(sigalg, ssh->kex->server_sig_algs)) in kex_set_server_sig_algs()
536 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg); in kex_set_server_sig_algs()
H A Dmonitor_wrap.c504 const u_char *data, size_t datalen, const char *sigalg, u_int compat, in mm_sshkey_verify() argument
522 (r = sshbuf_put_cstring(m, sigalg == NULL ? "" : sigalg)) != 0) in mm_sshkey_verify()
H A Dsshkey.h193 const char *sigalg; member
/freebsd/crypto/openssl/crypto/x509/
H A Dt_x509.c311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument
318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print()
323 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print()
330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
/freebsd/crypto/openssl/include/crypto/
H A Drsa.h115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
H A Dasn1.h50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
/freebsd/crypto/heimdal/lib/hx509/
H A Dca.c995 const AlgorithmIdentifier *sigalg; in ca_sign() local
1000 sigalg = _hx509_crypto_default_sig_alg; in ca_sign()
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature); in ca_sign()
1403 sigalg, in ca_sign()
H A Dcms.c1347 AlgorithmIdentifier sigalg; in sig_process() local
1351 &sigalg); in sig_process()
1357 &sigalg, in sig_process()
1361 free_AlgorithmIdentifier(&sigalg); in sig_process()
H A Drevoke.c1430 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; in hx509_crl_sign() local
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); in hx509_crl_sign()
1517 sigalg, in hx509_crl_sign()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_lib.c283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify()
308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify()
434 unsigned int sigalg; in tls_process_cert_verify() local
436 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify()
440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
/freebsd/contrib/unbound/services/
H A Dauthzone.c7866 nsec, why_bogus, sigalg)) { in zonemd_check_dnssec_absence()
7909 nsec3, why_bogus, sigalg)) { in zonemd_check_dnssec_absence()
7931 uint8_t* sigalg) in zonemd_check_dnssec_soazonemd() argument
7944 why_bogus, sigalg)) { in zonemd_check_dnssec_soazonemd()
7949 zonemd_rrset, why_bogus, sigalg)) { in zonemd_check_dnssec_soazonemd()
8015 int is_insecure, char** result, uint8_t* sigalg) in auth_zone_verify_zonemd_with_key() argument
8045 &reason, &why_bogus, sigalg)) { in auth_zone_verify_zonemd_with_key()
8053 zonemd_rrset, &reason, &why_bogus, sigalg)) { in auth_zone_verify_zonemd_with_key()
8242 uint8_t sigalg[ALGO_NEEDS_MAX+1]; in auth_zonemd_dnskey_lookup_callback() local
8349 &keystorage, downprot?sigalg:NULL); in auth_zonemd_dnskey_lookup_callback()
[all …]

12