/dports/dns/bind-tools/bind-9.16.27/lib/dns/ |
H A D | openssleddsa_link.c | 69 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl() 75 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl() 171 key->key_alg == DST_ALG_ED448); in openssleddsa_sign() 222 key->key_alg == DST_ALG_ED448); in openssleddsa_verify() 234 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify() 304 key->key_alg == DST_ALG_ED448); in openssleddsa_generate() 386 key->key_alg == DST_ALG_ED448); in openssleddsa_todns() 414 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns() 441 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile() 516 key->key_alg == DST_ALG_ED448); in openssleddsa_parse() [all …]
|
H A D | opensslecdsa_link.c | 88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx() 116 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx() 129 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata() 164 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign() 170 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign() 220 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify() 226 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify() 332 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate() 336 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate() 442 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns() [all …]
|
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/ |
H A D | openssleddsa_link.c | 67 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl() 73 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl() 169 key->key_alg == DST_ALG_ED448); in openssleddsa_sign() 220 key->key_alg == DST_ALG_ED448); in openssleddsa_verify() 232 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify() 302 key->key_alg == DST_ALG_ED448); in openssleddsa_generate() 384 key->key_alg == DST_ALG_ED448); in openssleddsa_todns() 412 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns() 439 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile() 514 key->key_alg == DST_ALG_ED448); in openssleddsa_parse() [all …]
|
H A D | opensslecdsa_link.c | 86 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx() 114 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx() 127 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata() 162 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign() 168 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign() 218 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify() 224 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify() 330 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate() 334 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate() 440 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns() [all …]
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/ |
H A D | openssleddsa_link.c | 64 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl() 70 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl() 166 key->key_alg == DST_ALG_ED448); in openssleddsa_sign() 217 key->key_alg == DST_ALG_ED448); in openssleddsa_verify() 229 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify() 299 key->key_alg == DST_ALG_ED448); in openssleddsa_generate() 381 key->key_alg == DST_ALG_ED448); in openssleddsa_todns() 409 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns() 436 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile() 511 key->key_alg == DST_ALG_ED448); in openssleddsa_parse() [all …]
|
H A D | opensslecdsa_link.c | 83 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx() 111 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx() 124 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata() 159 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign() 165 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign() 215 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify() 221 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify() 327 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate() 331 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate() 437 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns() [all …]
|
/dports/dns/bind916/bind-9.16.27/lib/dns/ |
H A D | openssleddsa_link.c | 69 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl() 75 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl() 171 key->key_alg == DST_ALG_ED448); in openssleddsa_sign() 222 key->key_alg == DST_ALG_ED448); in openssleddsa_verify() 234 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify() 304 key->key_alg == DST_ALG_ED448); in openssleddsa_generate() 386 key->key_alg == DST_ALG_ED448); in openssleddsa_todns() 414 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns() 441 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile() 516 key->key_alg == DST_ALG_ED448); in openssleddsa_parse() [all …]
|
H A D | opensslecdsa_link.c | 88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx() 116 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx() 129 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata() 164 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign() 170 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign() 220 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify() 226 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify() 332 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate() 336 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate() 442 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns() [all …]
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Crypto/ |
H A D | generate_key.pm | 75 key_alg => { isa => 'Str', default => 'rsa' }, 83 my $key_alg = lc($params->key_alg); 91 KEY_ALG => $key_alg, 97 if ($key_alg eq "rsa") { 101 elsif ($key_alg eq "ec") { 114 elsif ($key_alg eq "dsa") { 139 CTX('log')->audit('key')->info("generating private key", { key_alg => $key_alg });
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Crypto/ |
H A D | generate_key.pm | 75 key_alg => { isa => 'Str', default => 'rsa' }, 83 my $key_alg = lc($params->key_alg); 91 KEY_ALG => $key_alg, 97 if ($key_alg eq "rsa") { 101 elsif ($key_alg eq "ec") { 114 elsif ($key_alg eq "dsa") { 139 CTX('log')->audit('key')->info("generating private key", { key_alg => $key_alg });
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Validator/ |
H A D | KeyGenerationParams.pm | 18 my ( $self, $wf, $cert_profile, $key_alg, $key_gen_params, $enc_alg ) = @_; 20 if (!$key_alg) { 32 if ($key_alg eq 'rsa') { 34 } elsif ($key_alg eq 'dsa') { 36 } elsif ($key_alg eq 'ec') { 51 if (!grep(/\A$key_alg\z/, @{$algs})) { 53 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg"); 58 …my $params = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
|
H A D | KeyParams.pm | 28 my $key_alg = 'unknown'; 46 $key_alg = 'rsa'; 49 $key_alg = 'dsa'; 52 $key_alg = 'ec'; 66 if (!grep(/\A$key_alg\z/, @{$algs})) { 68 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg"); 72 …my $key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall =>…
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Validator/ |
H A D | KeyGenerationParams.pm | 18 my ( $self, $wf, $cert_profile, $key_alg, $key_gen_params, $enc_alg ) = @_; 20 if (!$key_alg) { 32 if ($key_alg eq 'rsa') { 34 } elsif ($key_alg eq 'dsa') { 36 } elsif ($key_alg eq 'ec') { 51 if (!grep(/\A$key_alg\z/, @{$algs})) { 53 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg"); 58 …my $params = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
|
H A D | KeyParams.pm | 28 my $key_alg = 'unknown'; 46 $key_alg = 'rsa'; 49 $key_alg = 'dsa'; 52 $key_alg = 'ec'; 66 if (!grep(/\A$key_alg\z/, @{$algs})) { 68 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg"); 72 …my $key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall =>…
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Condition/ |
H A D | KeyParams.pm | 18 my $key_alg = $self->param('key_alg'); 24 if (!$key_alg || !$key_params || ref $key_params ne 'HASH') { 34 if (!$key_rules->{$key_alg}) { 37 $key_rules = $key_rules->{$key_alg}; 50 if (!grep(/\A$key_alg\z/, @{$algs})) { 52 CTX('log')->application()->debug("KeyParam validation failed on algo $key_alg"); 56 …$key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Condition/ |
H A D | KeyParams.pm | 18 my $key_alg = $self->param('key_alg'); 24 if (!$key_alg || !$key_params || ref $key_params ne 'HASH') { 34 if (!$key_rules->{$key_alg}) { 37 $key_rules = $key_rules->{$key_alg}; 50 if (!grep(/\A$key_alg\z/, @{$algs})) { 52 CTX('log')->application()->debug("KeyParam validation failed on algo $key_alg"); 56 …$key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
|
/dports/dns/bind911/bind-9.11.37/lib/dns/ |
H A D | openssleddsa_link.c | 209 dctx->key->key_alg == DST_ALG_ED448); in openssleddsa_createctx() 222 dctx->key->key_alg == DST_ALG_ED448); in openssleddsa_destroyctx() 268 key->key_alg == DST_ALG_ED448); in openssleddsa_sign() 273 if (key->key_alg == DST_ALG_ED25519) in openssleddsa_sign() 317 key->key_alg == DST_ALG_ED448); in openssleddsa_verify() 322 if (key->key_alg == DST_ALG_ED25519) in openssleddsa_verify() 388 key->key_alg == DST_ALG_ED448); in openssleddsa_generate() 460 switch (key->key_alg) { in openssleddsa_todns() 490 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns() 523 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile() [all …]
|
H A D | opensslrsa_link.c | 265 dctx->key->key_alg == DST_ALG_RSASHA1 || in opensslrsa_createctx() 279 switch (dctx->key->key_alg) { in opensslrsa_createctx() 309 switch (dctx->key->key_alg) { in opensslrsa_createctx() 342 switch (dctx->key->key_alg) { in opensslrsa_createctx() 426 switch (dctx->key->key_alg) { in opensslrsa_destroyctx() 511 switch (dctx->key->key_alg) { in opensslrsa_adddata() 615 switch (dctx->key->key_alg) { in opensslrsa_sign() 671 switch (dctx->key->key_alg) { in opensslrsa_sign() 779 switch (dctx->key->key_alg) { in opensslrsa_verify2() 838 switch (dctx->key->key_alg) { in opensslrsa_verify2() [all …]
|
H A D | opensslecdsa_link.c | 88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx() 115 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx() 162 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign() 167 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_sign() 216 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify() 221 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_verify() 318 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate() 423 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns() 557 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_parse() 576 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_parse() [all …]
|
/dports/security/rnp/rnp-0.15.2/src/lib/ |
H A D | generate-key.cpp | 166 if ((crypto.key_alg != PGP_PKA_DSA) && (crypto.key_alg != PGP_PKA_ECDSA)) { in adjust_hash_alg() 170 pgp_hash_alg_t min_hash = (crypto.key_alg == PGP_PKA_ECDSA) ? in adjust_hash_alg() 183 if (!crypto.key_alg) { in keygen_merge_crypto_defaults() 184 crypto.key_alg = PGP_PKA_RSA; in keygen_merge_crypto_defaults() 187 switch (crypto.key_alg) { in keygen_merge_crypto_defaults() 240 if (!(pgp_pk_alg_capabilities(desc->crypto.key_alg) & PGP_KF_CERTIFY)) { in validate_keygen_primary() 267 switch (crypto->key_alg) { in get_numbits() 324 desc.cert.key_flags = pk_alg_default_flags(desc.crypto.key_alg); in keygen_primary_merge_defaults() 330 pgp_show_pka(desc.crypto.key_alg), in keygen_primary_merge_defaults() 568 printf("key_alg: %s (%d)\n", pgp_show_pka(crypto->key_alg), crypto->key_alg); in print_keygen_crypto() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/lib/ |
H A D | generate-key.cpp | 168 if ((crypto.key_alg != PGP_PKA_DSA) && (crypto.key_alg != PGP_PKA_ECDSA)) { in adjust_hash_alg() 172 pgp_hash_alg_t min_hash = (crypto.key_alg == PGP_PKA_ECDSA) ? in adjust_hash_alg() 185 if (!crypto.key_alg) { in keygen_merge_crypto_defaults() 186 crypto.key_alg = PGP_PKA_RSA; in keygen_merge_crypto_defaults() 189 switch (crypto.key_alg) { in keygen_merge_crypto_defaults() 242 if (!(pgp_pk_alg_capabilities(desc.crypto.key_alg) & PGP_KF_CERTIFY)) { in validate_keygen_primary() 243 RNP_LOG("primary key alg (%d) must be able to sign", desc.crypto.key_alg); in validate_keygen_primary() 268 switch (crypto->key_alg) { in get_numbits() 319 desc.cert.key_flags = pk_alg_default_flags(desc.crypto.key_alg); in keygen_primary_merge_defaults() 325 id_str_pair::lookup(pubkey_alg_map, desc.crypto.key_alg), in keygen_primary_merge_defaults() [all …]
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/qatest/backend/api2/ |
H A D | 22_generate_key.t | 78 key_alg => "RSA", 89 key_alg => "RSA", 103 key_alg => "DSA", 118 key_alg => "EC", 134 key_alg => "EC",
|
/dports/security/p5-openxpki/openxpki-3.16.1/qatest/backend/api2/ |
H A D | 22_generate_key.t | 78 key_alg => "RSA", 89 key_alg => "RSA", 103 key_alg => "DSA", 118 key_alg => "EC", 134 key_alg => "EC",
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Crypto/Backend/OpenSSL/Command/ |
H A D | create_pkey.pm | 27 my $key_alg = $self->{KEY_ALG}; 42 if (!$key_alg && !$self->{PARAM}) { 52 …push @command, ('-algorithm', $key_alg) if ($key_alg); # no algorithm for e.g. DSA from params file
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Crypto/Backend/OpenSSL/Command/ |
H A D | create_pkey.pm | 27 my $key_alg = $self->{KEY_ALG}; 42 if (!$key_alg && !$self->{PARAM}) { 52 …push @command, ('-algorithm', $key_alg) if ($key_alg); # no algorithm for e.g. DSA from params file
|