HomeSort by: relevance | last modified time | path
    Searched refs:sigalg (Results 1 - 25 of 70) sorted by relevancy

1 2 3

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 40 $self->{sigalg} = -1;
50 my $sigalg = -1;
57 $sigalg = unpack('n', $remdata);
66 print " SigAlg:".$sigalg."\n";
69 $self->sigalg($sigalg);
81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
89 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 44 $self->{sigalg} = -1;
53 my $sigalg = -1;
81 $sigalg = unpack('n', substr($self->data, $ptr));
85 if (defined $sigalg) {
97 $self->sigalg($sigalg) if defined $sigalg;
114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
149 sub sigalg subroutine
    [all...]
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
CertificateVerify.pm 32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_sigcrypt.h 80 * @param sigalg: adds to signalled algorithm list too.
83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
88 * @param sigalg: signalled algorithm list, numbers ends with 0.
90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
97 * @param sigalg: list of signalled algos, constructed as output,
101 int fav_ds_algo, uint8_t* sigalg);
259 * @param sigalg: if nonNULL provide downgrade protection otherwise one
274 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
val_utils.c 407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
599 if(sigalg) {
602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) {
635 if(!sigalg || algo_needs_set_secure(&needs,
644 } else if(sigalg && sec == sec_status_bogus) {
669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
683 uint8_t sigalg[ALGO_NEEDS_MAX+1] local
858 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
    [all...]
val_utils.h 145 * @param sigalg: if nonNULL provide downgrade protection otherwise one
159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
171 * @param sigalg: if nonNULL provide downgrade protection otherwise one
186 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
val_kentry.h 189 * @param sigalg: signalled algorithm list (or NULL).
197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
val_sigcrypt.c 438 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
450 sigalg[total] = algo;
454 sigalg[total] = 0;
458 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg)
464 while( (algo=*sigalg++) != 0) {
474 int fav_ds_algo, uint8_t* sigalg)
490 sigalg[total] = algo;
494 sigalg[total] = 0;
626 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
648 if(sigalg) {
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/recipes/
70-test_sslsigalgs.t 115 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to
123 "Mismatch between CertVerify sigalg and public key OID");
129 #Test 8: Modify the CertificateVerify sigalg from mldsa44 to mldsa65.
141 "Mismatch between CertVerify sigalg and public key OID (ML-DSA)");
247 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
299 "backwards compatible sigalg sent for compat ClientHello");
355 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
372 my $sigalg;
374 $sigalg = pack "C2", 0x00, 0x00;
376 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
ca.c 66 AlgorithmIdentifier *sigalg; member in struct:hx509_ca_tbs
114 if ((*tbs)->sigalg) {
115 free_AlgorithmIdentifier((*tbs)->sigalg);
116 free((*tbs)->sigalg);
918 * @param sigalg signature algorithm to use
928 const AlgorithmIdentifier *sigalg)
932 tbs->sigalg = calloc(1, sizeof(*tbs->sigalg));
933 if (tbs->sigalg == NULL) {
937 ret = copy_AlgorithmIdentifier(sigalg, tbs->sigalg)
1035 const AlgorithmIdentifier *sigalg; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
70-test_sslsigalgs.t 102 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to
109 "Mismatch between CertVerify sigalg and public key OID");
214 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
266 "backwards compatible sigalg sent for compat ClientHello");
322 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
341 my $sigalg;
343 $sigalg = pack "C2", 0x00, 0x00;
345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01;
351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
70-test_sslsigalgs.t 100 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to
107 "Mismatch between CertVerify sigalg and public key OID");
212 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2");
248 "DSA/SHA2 sigalg sent for 1.3-only ClientHello");
259 "DSA sigalg not sent for compat ClientHello");
317 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello");
336 my $sigalg;
338 $sigalg = pack "C2", 0x00, 0x00;
340 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
343 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
t_x509.c 301 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg,
307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
310 sig_nid = OBJ_obj2nid(sigalg->algorithm);
317 return ameth->sig_print(bp, sigalg, sig, 9, 0);
  /src/crypto/external/apache2/openssl/dist/crypto/rsa/
rsa_ameth.c 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg);
542 const X509_ALGOR *sigalg, EVP_PKEY *pkey)
550 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
555 pss = ossl_rsa_pss_decode(sigalg);
634 const void *asn, const X509_ALGOR *sigalg,
638 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
642 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
722 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg,
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/rsa/
rsa_ameth.c 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg);
524 const X509_ALGOR *sigalg, EVP_PKEY *pkey)
532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
537 pss = ossl_rsa_pss_decode(sigalg);
616 const void *asn, const X509_ALGOR *sigalg,
620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg,
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/
rsa_ameth.c 449 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
452 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
454 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg);
668 X509_ALGOR *sigalg, EVP_PKEY *pkey)
676 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
681 pss = rsa_pss_decode(sigalg);
784 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
788 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
792 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
860 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg,
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
t1_trce.c 681 unsigned int sigalg = (p[0] << 8) | p[1]; local
685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
697 unsigned int sigalg; local
757 sigalg = (ext[0] << 8) | ext[1];
759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1267 unsigned int sigalg; local
1302 sigalg = (msg[0] << 8) | msg[1];
1304 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
t1_lib.c 637 /* Default sigalg schemes */
800 static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg)
807 if (s->sigalg == sigalg)
908 /* Set peer sigalg based key type */
1011 if (lu->sigalg == TLSEXT_SIGALG_ed25519)
1013 else if (lu->sigalg == TLSEXT_SIGALG_ed448)
1061 /* Check the sigalg is consistent with the key OID */
1099 /* Check sigalg matches a permissible Suite B value */
1136 * reasons we have to pass the sigalg as a two byte char array
2110 const SIGALG_LOOKUP *sigalg; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
t_x509.c 311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg,
318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
323 sig_nid = OBJ_obj2nid(sigalg->algorithm);
330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0);
  /src/crypto/external/apache2/openssl/dist/ssl/
t1_trce.c 745 unsigned int sigalg = (p[0] << 8) | p[1]; local
749 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
761 unsigned int sigalg; local
829 sigalg = (ext[0] << 8) | ext[1];
831 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1475 unsigned int sigalg; local
1510 sigalg = (msg[0] << 8) | msg[1];
1512 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/
t1_trce.c 695 unsigned int sigalg = (p[0] << 8) | p[1]; local
699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
711 unsigned int sigalg; local
771 sigalg = (ext[0] << 8) | ext[1];
773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1288 unsigned int sigalg; local
1323 sigalg = (msg[0] << 8) | msg[1];
1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
  /src/crypto/external/bsd/openssh/dist/
serverloop.c 697 const char *sigalg, *kex_rsa_sigalg = NULL; local
738 sigalg = sshkey_ssh_name(key);
741 sigalg = kex_rsa_sigalg;
743 sigalg = "rsa-sha2-512";
745 sigalg = "rsa-sha2-256";
748 debug3_f("sign %s key (index %d) using sigalg %s",
749 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
756 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||

Completed in 49 milliseconds

1 2 3