Home
last modified time | relevance | path

Searched refs:key_alg (Results 1 – 25 of 629) sorted by relevance

12345678910>>...26

/dports/dns/bind-tools/bind-9.16.27/lib/dns/
H A Dopenssleddsa_link.c69 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl()
75 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl()
171 key->key_alg == DST_ALG_ED448); in openssleddsa_sign()
222 key->key_alg == DST_ALG_ED448); in openssleddsa_verify()
234 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify()
304 key->key_alg == DST_ALG_ED448); in openssleddsa_generate()
386 key->key_alg == DST_ALG_ED448); in openssleddsa_todns()
414 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns()
441 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile()
516 key->key_alg == DST_ALG_ED448); in openssleddsa_parse()
[all …]
H A Dopensslecdsa_link.c88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx()
116 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx()
129 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata()
164 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign()
170 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign()
220 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify()
226 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify()
332 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate()
336 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate()
442 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns()
[all …]
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/
H A Dopenssleddsa_link.c67 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl()
73 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl()
169 key->key_alg == DST_ALG_ED448); in openssleddsa_sign()
220 key->key_alg == DST_ALG_ED448); in openssleddsa_verify()
232 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify()
302 key->key_alg == DST_ALG_ED448); in openssleddsa_generate()
384 key->key_alg == DST_ALG_ED448); in openssleddsa_todns()
412 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns()
439 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile()
514 key->key_alg == DST_ALG_ED448); in openssleddsa_parse()
[all …]
H A Dopensslecdsa_link.c86 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx()
114 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx()
127 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata()
162 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign()
168 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign()
218 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify()
224 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify()
330 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate()
334 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate()
440 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns()
[all …]
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/
H A Dopenssleddsa_link.c64 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl()
70 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl()
166 key->key_alg == DST_ALG_ED448); in openssleddsa_sign()
217 key->key_alg == DST_ALG_ED448); in openssleddsa_verify()
229 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify()
299 key->key_alg == DST_ALG_ED448); in openssleddsa_generate()
381 key->key_alg == DST_ALG_ED448); in openssleddsa_todns()
409 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns()
436 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile()
511 key->key_alg == DST_ALG_ED448); in openssleddsa_parse()
[all …]
H A Dopensslecdsa_link.c83 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx()
111 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx()
124 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata()
159 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign()
165 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign()
215 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify()
221 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify()
327 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate()
331 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate()
437 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns()
[all …]
/dports/dns/bind916/bind-9.16.27/lib/dns/
H A Dopenssleddsa_link.c69 if (key_alg == DST_ALG_ED25519) { in raw_key_to_ossl()
75 if (key_alg == DST_ALG_ED448) { in raw_key_to_ossl()
171 key->key_alg == DST_ALG_ED448); in openssleddsa_sign()
222 key->key_alg == DST_ALG_ED448); in openssleddsa_verify()
234 if (key->key_alg == DST_ALG_ED448) { in openssleddsa_verify()
304 key->key_alg == DST_ALG_ED448); in openssleddsa_generate()
386 key->key_alg == DST_ALG_ED448); in openssleddsa_todns()
414 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns()
441 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile()
516 key->key_alg == DST_ALG_ED448); in openssleddsa_parse()
[all …]
H A Dopensslecdsa_link.c88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx()
116 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx()
129 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_adddata()
164 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign()
170 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_sign()
220 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify()
226 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_verify()
332 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate()
336 if (key->key_alg == DST_ALG_ECDSA256) { in opensslecdsa_generate()
442 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns()
[all …]
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Crypto/
H A Dgenerate_key.pm75 key_alg => { isa => 'Str', default => 'rsa' },
83 my $key_alg = lc($params->key_alg);
91 KEY_ALG => $key_alg,
97 if ($key_alg eq "rsa") {
101 elsif ($key_alg eq "ec") {
114 elsif ($key_alg eq "dsa") {
139 CTX('log')->audit('key')->info("generating private key", { key_alg => $key_alg });
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Crypto/
H A Dgenerate_key.pm75 key_alg => { isa => 'Str', default => 'rsa' },
83 my $key_alg = lc($params->key_alg);
91 KEY_ALG => $key_alg,
97 if ($key_alg eq "rsa") {
101 elsif ($key_alg eq "ec") {
114 elsif ($key_alg eq "dsa") {
139 CTX('log')->audit('key')->info("generating private key", { key_alg => $key_alg });
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Validator/
H A DKeyGenerationParams.pm18 my ( $self, $wf, $cert_profile, $key_alg, $key_gen_params, $enc_alg ) = @_;
20 if (!$key_alg) {
32 if ($key_alg eq 'rsa') {
34 } elsif ($key_alg eq 'dsa') {
36 } elsif ($key_alg eq 'ec') {
51 if (!grep(/\A$key_alg\z/, @{$algs})) {
53 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg");
58 …my $params = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
H A DKeyParams.pm28 my $key_alg = 'unknown';
46 $key_alg = 'rsa';
49 $key_alg = 'dsa';
52 $key_alg = 'ec';
66 if (!grep(/\A$key_alg\z/, @{$algs})) {
68 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg");
72 …my $key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall =>…
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Validator/
H A DKeyGenerationParams.pm18 my ( $self, $wf, $cert_profile, $key_alg, $key_gen_params, $enc_alg ) = @_;
20 if (!$key_alg) {
32 if ($key_alg eq 'rsa') {
34 } elsif ($key_alg eq 'dsa') {
36 } elsif ($key_alg eq 'ec') {
51 if (!grep(/\A$key_alg\z/, @{$algs})) {
53 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg");
58 …my $params = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
H A DKeyParams.pm28 my $key_alg = 'unknown';
46 $key_alg = 'rsa';
49 $key_alg = 'dsa';
52 $key_alg = 'ec';
66 if (!grep(/\A$key_alg\z/, @{$algs})) {
68 CTX('log')->application()->error("KeyParam validation failed on algo $key_alg");
72 …my $key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall =>…
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Condition/
H A DKeyParams.pm18 my $key_alg = $self->param('key_alg');
24 if (!$key_alg || !$key_params || ref $key_params ne 'HASH') {
34 if (!$key_rules->{$key_alg}) {
37 $key_rules = $key_rules->{$key_alg};
50 if (!grep(/\A$key_alg\z/, @{$algs})) {
52 CTX('log')->application()->debug("KeyParam validation failed on algo $key_alg");
56 …$key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Condition/
H A DKeyParams.pm18 my $key_alg = $self->param('key_alg');
24 if (!$key_alg || !$key_params || ref $key_params ne 'HASH') {
34 if (!$key_rules->{$key_alg}) {
37 $key_rules = $key_rules->{$key_alg};
50 if (!grep(/\A$key_alg\z/, @{$algs})) {
52 CTX('log')->application()->debug("KeyParam validation failed on algo $key_alg");
56 …$key_rules = CTX('api2')->get_key_params( profile => $cert_profile, alg => $key_alg, showall => 1 …
/dports/dns/bind911/bind-9.11.37/lib/dns/
H A Dopenssleddsa_link.c209 dctx->key->key_alg == DST_ALG_ED448); in openssleddsa_createctx()
222 dctx->key->key_alg == DST_ALG_ED448); in openssleddsa_destroyctx()
268 key->key_alg == DST_ALG_ED448); in openssleddsa_sign()
273 if (key->key_alg == DST_ALG_ED25519) in openssleddsa_sign()
317 key->key_alg == DST_ALG_ED448); in openssleddsa_verify()
322 if (key->key_alg == DST_ALG_ED25519) in openssleddsa_verify()
388 key->key_alg == DST_ALG_ED448); in openssleddsa_generate()
460 switch (key->key_alg) { in openssleddsa_todns()
490 key->key_alg == DST_ALG_ED448); in openssleddsa_fromdns()
523 key->key_alg == DST_ALG_ED448); in openssleddsa_tofile()
[all …]
H A Dopensslrsa_link.c265 dctx->key->key_alg == DST_ALG_RSASHA1 || in opensslrsa_createctx()
279 switch (dctx->key->key_alg) { in opensslrsa_createctx()
309 switch (dctx->key->key_alg) { in opensslrsa_createctx()
342 switch (dctx->key->key_alg) { in opensslrsa_createctx()
426 switch (dctx->key->key_alg) { in opensslrsa_destroyctx()
511 switch (dctx->key->key_alg) { in opensslrsa_adddata()
615 switch (dctx->key->key_alg) { in opensslrsa_sign()
671 switch (dctx->key->key_alg) { in opensslrsa_sign()
779 switch (dctx->key->key_alg) { in opensslrsa_verify2()
838 switch (dctx->key->key_alg) { in opensslrsa_verify2()
[all …]
H A Dopensslecdsa_link.c88 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_createctx()
115 dctx->key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_destroyctx()
162 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_sign()
167 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_sign()
216 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_verify()
221 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_verify()
318 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_generate()
423 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_fromdns()
557 key->key_alg == DST_ALG_ECDSA384); in opensslecdsa_parse()
576 if (key->key_alg == DST_ALG_ECDSA256) in opensslecdsa_parse()
[all …]
/dports/security/rnp/rnp-0.15.2/src/lib/
H A Dgenerate-key.cpp166 if ((crypto.key_alg != PGP_PKA_DSA) && (crypto.key_alg != PGP_PKA_ECDSA)) { in adjust_hash_alg()
170 pgp_hash_alg_t min_hash = (crypto.key_alg == PGP_PKA_ECDSA) ? in adjust_hash_alg()
183 if (!crypto.key_alg) { in keygen_merge_crypto_defaults()
184 crypto.key_alg = PGP_PKA_RSA; in keygen_merge_crypto_defaults()
187 switch (crypto.key_alg) { in keygen_merge_crypto_defaults()
240 if (!(pgp_pk_alg_capabilities(desc->crypto.key_alg) & PGP_KF_CERTIFY)) { in validate_keygen_primary()
267 switch (crypto->key_alg) { in get_numbits()
324 desc.cert.key_flags = pk_alg_default_flags(desc.crypto.key_alg); in keygen_primary_merge_defaults()
330 pgp_show_pka(desc.crypto.key_alg), in keygen_primary_merge_defaults()
568 printf("key_alg: %s (%d)\n", pgp_show_pka(crypto->key_alg), crypto->key_alg); in print_keygen_crypto()
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/lib/
H A Dgenerate-key.cpp168 if ((crypto.key_alg != PGP_PKA_DSA) && (crypto.key_alg != PGP_PKA_ECDSA)) { in adjust_hash_alg()
172 pgp_hash_alg_t min_hash = (crypto.key_alg == PGP_PKA_ECDSA) ? in adjust_hash_alg()
185 if (!crypto.key_alg) { in keygen_merge_crypto_defaults()
186 crypto.key_alg = PGP_PKA_RSA; in keygen_merge_crypto_defaults()
189 switch (crypto.key_alg) { in keygen_merge_crypto_defaults()
242 if (!(pgp_pk_alg_capabilities(desc.crypto.key_alg) & PGP_KF_CERTIFY)) { in validate_keygen_primary()
243 RNP_LOG("primary key alg (%d) must be able to sign", desc.crypto.key_alg); in validate_keygen_primary()
268 switch (crypto->key_alg) { in get_numbits()
319 desc.cert.key_flags = pk_alg_default_flags(desc.crypto.key_alg); in keygen_primary_merge_defaults()
325 id_str_pair::lookup(pubkey_alg_map, desc.crypto.key_alg), in keygen_primary_merge_defaults()
[all …]
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/qatest/backend/api2/
H A D22_generate_key.t78 key_alg => "RSA",
89 key_alg => "RSA",
103 key_alg => "DSA",
118 key_alg => "EC",
134 key_alg => "EC",
/dports/security/p5-openxpki/openxpki-3.16.1/qatest/backend/api2/
H A D22_generate_key.t78 key_alg => "RSA",
89 key_alg => "RSA",
103 key_alg => "DSA",
118 key_alg => "EC",
134 key_alg => "EC",
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Crypto/Backend/OpenSSL/Command/
H A Dcreate_pkey.pm27 my $key_alg = $self->{KEY_ALG};
42 if (!$key_alg && !$self->{PARAM}) {
52 …push @command, ('-algorithm', $key_alg) if ($key_alg); # no algorithm for e.g. DSA from params file
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Crypto/Backend/OpenSSL/Command/
H A Dcreate_pkey.pm27 my $key_alg = $self->{KEY_ALG};
42 if (!$key_alg && !$self->{PARAM}) {
52 …push @command, ('-algorithm', $key_alg) if ($key_alg); # no algorithm for e.g. DSA from params file

12345678910>>...26