| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 40 $self->{sigalg} = -1; 50 my $sigalg = -1; 57 $sigalg = unpack('n', $remdata); 66 print " SigAlg:".$sigalg."\n"; 69 $self->sigalg($sigalg); 81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 89 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 44 $self->{sigalg} = -1; 53 my $sigalg = -1; 81 $sigalg = unpack('n', substr($self->data, $ptr)); 85 if (defined $sigalg) { 97 $self->sigalg($sigalg) if defined $sigalg; 114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 149 sub sigalg subroutine [all...] |
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine [all...] |
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_sigcrypt.h | 80 * @param sigalg: adds to signalled algorithm list too. 83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 88 * @param sigalg: signalled algorithm list, numbers ends with 0. 90 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg); 97 * @param sigalg: list of signalled algos, constructed as output, 101 int fav_ds_algo, uint8_t* sigalg); 259 * @param sigalg: if nonNULL provide downgrade protection otherwise one 274 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg,
|
| val_utils.c | 407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, 433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, 578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 599 if(sigalg) { 602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { 635 if(!sigalg || algo_needs_set_secure(&needs, 644 } else if(sigalg && sec == sec_status_bogus) { 669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 683 uint8_t sigalg[ALGO_NEEDS_MAX+1] local 858 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
| val_utils.h | 145 * @param sigalg: if nonNULL provide downgrade protection otherwise one 159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 171 * @param sigalg: if nonNULL provide downgrade protection otherwise one 186 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
|
| val_kentry.h | 189 * @param sigalg: signalled algorithm list (or NULL). 197 struct ub_packed_rrset_key* rrset, uint8_t* sigalg,
|
| val_sigcrypt.c | 438 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 450 sigalg[total] = algo; 454 sigalg[total] = 0; 458 void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) 464 while( (algo=*sigalg++) != 0) { 474 int fav_ds_algo, uint8_t* sigalg) 490 sigalg[total] = algo; 494 sigalg[total] = 0; 626 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, 648 if(sigalg) { [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_sslsigalgs.t | 115 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to 123 "Mismatch between CertVerify sigalg and public key OID"); 129 #Test 8: Modify the CertificateVerify sigalg from mldsa44 to mldsa65. 141 "Mismatch between CertVerify sigalg and public key OID (ML-DSA)"); 247 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2"); 299 "backwards compatible sigalg sent for compat ClientHello"); 355 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello"); 372 my $sigalg; 374 $sigalg = pack "C2", 0x00, 0x00; 376 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| ca.c | 66 AlgorithmIdentifier *sigalg; member in struct:hx509_ca_tbs 114 if ((*tbs)->sigalg) { 115 free_AlgorithmIdentifier((*tbs)->sigalg); 116 free((*tbs)->sigalg); 918 * @param sigalg signature algorithm to use 928 const AlgorithmIdentifier *sigalg) 932 tbs->sigalg = calloc(1, sizeof(*tbs->sigalg)); 933 if (tbs->sigalg == NULL) { 937 ret = copy_AlgorithmIdentifier(sigalg, tbs->sigalg) 1035 const AlgorithmIdentifier *sigalg; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_sslsigalgs.t | 102 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to 109 "Mismatch between CertVerify sigalg and public key OID"); 214 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2"); 266 "backwards compatible sigalg sent for compat ClientHello"); 322 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello"); 341 my $sigalg; 343 $sigalg = pack "C2", 0x00, 0x00; 345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_sslsigalgs.t | 100 #Test 7: Modify the CertificateVerify sigalg from rsa_pss_rsae_sha256 to 107 "Mismatch between CertVerify sigalg and public key OID"); 212 ok(TLSProxy::Message->fail, "Sigalg we did not send in TLSv1.2"); 248 "DSA/SHA2 sigalg sent for 1.3-only ClientHello"); 259 "DSA sigalg not sent for compat ClientHello"); 317 ok(TLSProxy::Message->success(), "Unrecognized sigalg in ClientHello"); 336 my $sigalg; 338 $sigalg = pack "C2", 0x00, 0x00; 340 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 343 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| t_x509.c | 301 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, 307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 310 sig_nid = OBJ_obj2nid(sigalg->algorithm); 317 return ameth->sig_print(bp, sigalg, sig, 9, 0);
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_ameth.c | 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, 404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); 542 const X509_ALGOR *sigalg, EVP_PKEY *pkey) 550 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 555 pss = ossl_rsa_pss_decode(sigalg); 634 const void *asn, const X509_ALGOR *sigalg, 638 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 642 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 722 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_ameth.c | 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, 404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); 524 const X509_ALGOR *sigalg, EVP_PKEY *pkey) 532 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 537 pss = ossl_rsa_pss_decode(sigalg); 616 const void *asn, const X509_ALGOR *sigalg, 620 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 624 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 704 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_ameth.c | 449 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, 452 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { 454 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg); 668 X509_ALGOR *sigalg, EVP_PKEY *pkey) 676 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 681 pss = rsa_pss_decode(sigalg); 784 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 788 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { 792 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { 860 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_trce.c | 681 unsigned int sigalg = (p[0] << 8) | p[1]; local 685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 697 unsigned int sigalg; local 757 sigalg = (ext[0] << 8) | ext[1]; 759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1267 unsigned int sigalg; local 1302 sigalg = (msg[0] << 8) | msg[1]; 1304 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| t1_lib.c | 637 /* Default sigalg schemes */ 800 static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg) 807 if (s->sigalg == sigalg) 908 /* Set peer sigalg based key type */ 1011 if (lu->sigalg == TLSEXT_SIGALG_ed25519) 1013 else if (lu->sigalg == TLSEXT_SIGALG_ed448) 1061 /* Check the sigalg is consistent with the key OID */ 1099 /* Check sigalg matches a permissible Suite B value */ 1136 * reasons we have to pass the sigalg as a two byte char array 2110 const SIGALG_LOOKUP *sigalg; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| t_x509.c | 311 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, 318 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) 323 sig_nid = OBJ_obj2nid(sigalg->algorithm); 330 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0);
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_trce.c | 745 unsigned int sigalg = (p[0] << 8) | p[1]; local 749 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 761 unsigned int sigalg; local 829 sigalg = (ext[0] << 8) | ext[1]; 831 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1475 unsigned int sigalg; local 1510 sigalg = (msg[0] << 8) | msg[1]; 1512 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 711 unsigned int sigalg; local 771 sigalg = (ext[0] << 8) | ext[1]; 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1288 unsigned int sigalg; local 1323 sigalg = (msg[0] << 8) | msg[1]; 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| serverloop.c | 697 const char *sigalg, *kex_rsa_sigalg = NULL; local 738 sigalg = sshkey_ssh_name(key); 741 sigalg = kex_rsa_sigalg; 743 sigalg = "rsa-sha2-512"; 745 sigalg = "rsa-sha2-256"; 748 debug3_f("sign %s key (index %d) using sigalg %s", 749 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); 756 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||
|