| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 40 $self->{sigalg} = -1; 50 my $sigalg = -1; 57 $sigalg = unpack('n', $remdata); 66 print " SigAlg:".$sigalg."\n"; 69 $self->sigalg($sigalg); 81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 89 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 44 $self->{sigalg} = -1; 53 my $sigalg = -1; 81 $sigalg = unpack('n', substr($self->data, $ptr)); 85 if (defined $sigalg) { 97 $self->sigalg($sigalg) if defined $sigalg; 114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 149 sub sigalg subroutine [all...] |
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine [all...] |
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine [all...] |
| ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine [all...] |
| /src/external/bsd/unbound/dist/testcode/ |
| unitverify.c | 165 setup_sigalg(struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 174 sigalg[n++] = algo; 177 sigalg[n] = 0; 189 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local 196 setup_sigalg(dnskey, sigalg); /* check all algorithms in the dnskey */ 198 sec = dnskeyset_verify_rrset(env, ve, rrset, dnskey, sigalg, &reason,
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| cms.c | 1367 AlgorithmIdentifier sigalg; local 1371 &sigalg); 1377 &sigalg, 1381 free_AlgorithmIdentifier(&sigalg);
|
| ca.c | 66 AlgorithmIdentifier *sigalg; member in struct:hx509_ca_tbs 114 if ((*tbs)->sigalg) { 115 free_AlgorithmIdentifier((*tbs)->sigalg); 116 free((*tbs)->sigalg); 918 * @param sigalg signature algorithm to use 928 const AlgorithmIdentifier *sigalg) 932 tbs->sigalg = calloc(1, sizeof(*tbs->sigalg)); 933 if (tbs->sigalg == NULL) { 937 ret = copy_AlgorithmIdentifier(sigalg, tbs->sigalg) 1035 const AlgorithmIdentifier *sigalg; local [all...] |
| revoke.c | 1536 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local 1560 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature); 1623 sigalg,
|
| hxtool.c | 1949 const AlgorithmIdentifier *sigalg; local 1951 sigalg = hx509_signature_rsa_with_sha1(); 1953 sigalg = hx509_signature_rsa_with_sha256(); 1956 hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg);
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 711 unsigned int sigalg; local 771 sigalg = (ext[0] << 8) | ext[1]; 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1288 unsigned int sigalg; local 1323 sigalg = (msg[0] << 8) | msg[1]; 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_trce.c | 681 unsigned int sigalg = (p[0] << 8) | p[1]; local 685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 697 unsigned int sigalg; local 757 sigalg = (ext[0] << 8) | ext[1]; 759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1267 unsigned int sigalg; local 1302 sigalg = (msg[0] << 8) | msg[1]; 1304 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_utils.c | 407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, 433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason, 578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 599 if(sigalg) { 602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg); 613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) { 635 if(!sigalg || algo_needs_set_secure(&needs, 644 } else if(sigalg && sec == sec_status_bogus) { 669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { 683 uint8_t sigalg[ALGO_NEEDS_MAX+1] local 858 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/fips/ |
| self_test_kats.c | 485 EVP_SIGNATURE *sigalg = NULL; local 522 sigalg = EVP_SIGNATURE_fetch(libctx, t->sigalgorithm, NULL); 523 if (sigalg == NULL) 536 if (EVP_PKEY_sign_init_ex2(ctx, sigalg, paramsinit) <= 0) 539 if (EVP_PKEY_sign_message_init(ctx, sigalg, paramsinit) <= 0) 575 if (EVP_PKEY_verify_init_ex2(ctx, sigalg, paramsverify) <= 0) 578 if (EVP_PKEY_verify_message_init(ctx, sigalg, paramsverify) <= 0) 592 EVP_SIGNATURE_free(sigalg);
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_trce.c | 745 unsigned int sigalg = (p[0] << 8) | p[1]; local 749 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 761 unsigned int sigalg; local 829 sigalg = (ext[0] << 8) | ext[1]; 831 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); 1475 unsigned int sigalg; local 1510 sigalg = (msg[0] << 8) | msg[1]; 1512 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg) [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| kex.c | 266 const char *sigalg; local 282 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL) 284 if (!kex_has_any_alg(sigalg, sigalgs)) 288 kex_has_any_alg(sigalg, ssh->kex->server_sig_algs)) 290 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg);
|
| serverloop.c | 697 const char *sigalg, *kex_rsa_sigalg = NULL; local 738 sigalg = sshkey_ssh_name(key); 741 sigalg = kex_rsa_sigalg; 743 sigalg = "rsa-sha2-512"; 745 sigalg = "rsa-sha2-256"; 748 debug3_f("sign %s key (index %d) using sigalg %s", 749 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); 756 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||
|
| sshkey.h | 172 const char *sigalg; member in struct:sshkey_impl
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_lib.c | 283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; 308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { 434 unsigned int sigalg; local 436 if (!PACKET_get_net_2(pkt, &sigalg)) { 440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_lib.c | 240 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg; 268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { 384 unsigned int sigalg; local 386 if (!PACKET_get_net_2(pkt, &sigalg)) { 391 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
|
| /src/external/mpl/bind/dist/lib/dns/ |
| dnssec.c | 1442 dns_secalg_t keyalg, sigalg; local 1455 sigalg = sig.algorithm; 1457 if (keyid == sigid && keyalg == sigalg) {
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| dnssec.c | 1617 dns_secalg_t keyalg, sigalg; local 1630 sigalg = sig.algorithm; 1632 if (keyid == sigid && keyalg == sigalg) {
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| s_cb.c | 1307 const char *sigalg; local 1325 if (SSL_get0_peer_signature_name(s, &sigalg)) 1326 BIO_printf(bio_err, "Signature type: %s\n", sigalg); 1330 if (SSL_get0_peer_signature_name(s, &sigalg)) 1331 BIO_printf(bio_err, "Signature type: %s\n", sigalg);
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 2506 unsigned int sigalg; local 2508 if (!PACKET_get_net_2(pkt, &sigalg)) { 2512 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { 3704 if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL)
|