HomeSort by: relevance | last modified time | path
    Searched defs:sigalg (Results 1 - 25 of 37) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 40 $self->{sigalg} = -1;
50 my $sigalg = -1;
57 $sigalg = unpack('n', $remdata);
66 print " SigAlg:".$sigalg."\n";
69 $self->sigalg($sigalg);
81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
89 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 44 $self->{sigalg} = -1;
53 my $sigalg = -1;
81 $sigalg = unpack('n', substr($self->data, $ptr));
85 if (defined $sigalg) {
97 $self->sigalg($sigalg) if defined $sigalg;
114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
149 sub sigalg subroutine
    [all...]
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
CertificateVerify.pm 32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
CertificateVerify.pm 32 $self->{sigalg} = -1;
42 my $sigalg = -1;
48 $sigalg = unpack('n', $remdata);
57 print " SigAlg:".$sigalg."\n";
60 $self->sigalg($sigalg);
72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
80 sub sigalg subroutine
    [all...]
ServerKeyExchange.pm 36 $self->{sigalg} = -1;
45 my $sigalg = -1;
73 $sigalg = unpack('n', substr($self->data, $ptr));
77 if (defined $sigalg) {
89 $self->sigalg($sigalg) if defined $sigalg;
106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
141 sub sigalg subroutine
    [all...]
  /src/external/bsd/unbound/dist/testcode/
unitverify.c 165 setup_sigalg(struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
174 sigalg[n++] = algo;
177 sigalg[n] = 0;
189 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
196 setup_sigalg(dnskey, sigalg); /* check all algorithms in the dnskey */
198 sec = dnskeyset_verify_rrset(env, ve, rrset, dnskey, sigalg, &reason,
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
cms.c 1367 AlgorithmIdentifier sigalg; local
1371 &sigalg);
1377 &sigalg,
1381 free_AlgorithmIdentifier(&sigalg);
ca.c 66 AlgorithmIdentifier *sigalg; member in struct:hx509_ca_tbs
114 if ((*tbs)->sigalg) {
115 free_AlgorithmIdentifier((*tbs)->sigalg);
116 free((*tbs)->sigalg);
918 * @param sigalg signature algorithm to use
928 const AlgorithmIdentifier *sigalg)
932 tbs->sigalg = calloc(1, sizeof(*tbs->sigalg));
933 if (tbs->sigalg == NULL) {
937 ret = copy_AlgorithmIdentifier(sigalg, tbs->sigalg)
1035 const AlgorithmIdentifier *sigalg; local
    [all...]
revoke.c 1536 const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg; local
1560 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1623 sigalg,
hxtool.c 1949 const AlgorithmIdentifier *sigalg; local
1951 sigalg = hx509_signature_rsa_with_sha1();
1953 sigalg = hx509_signature_rsa_with_sha256();
1956 hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg);
  /src/crypto/external/bsd/openssl/dist/ssl/
t1_trce.c 695 unsigned int sigalg = (p[0] << 8) | p[1]; local
699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
711 unsigned int sigalg; local
771 sigalg = (ext[0] << 8) | ext[1];
773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1288 unsigned int sigalg; local
1323 sigalg = (msg[0] << 8) | msg[1];
1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
t1_trce.c 681 unsigned int sigalg = (p[0] << 8) | p[1]; local
685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
697 unsigned int sigalg; local
757 sigalg = (ext[0] << 8) | ext[1];
759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1267 unsigned int sigalg; local
1302 sigalg = (msg[0] << 8) | msg[1];
1304 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_utils.c 407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
599 if(sigalg) {
602 algo_needs_init_ds(&needs, ds_rrset, digest_algo, sigalg);
613 (sigalg && (ds_get_digest_algo(ds_rrset, i) != digest_algo))) {
635 if(!sigalg || algo_needs_set_secure(&needs,
644 } else if(sigalg && sec == sec_status_bogus) {
669 if(sigalg && (alg=algo_needs_missing(&needs)) != 0) {
683 uint8_t sigalg[ALGO_NEEDS_MAX+1] local
858 uint8_t sigalg[ALGO_NEEDS_MAX+1]; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/fips/
self_test_kats.c 485 EVP_SIGNATURE *sigalg = NULL; local
522 sigalg = EVP_SIGNATURE_fetch(libctx, t->sigalgorithm, NULL);
523 if (sigalg == NULL)
536 if (EVP_PKEY_sign_init_ex2(ctx, sigalg, paramsinit) <= 0)
539 if (EVP_PKEY_sign_message_init(ctx, sigalg, paramsinit) <= 0)
575 if (EVP_PKEY_verify_init_ex2(ctx, sigalg, paramsverify) <= 0)
578 if (EVP_PKEY_verify_message_init(ctx, sigalg, paramsverify) <= 0)
592 EVP_SIGNATURE_free(sigalg);
  /src/crypto/external/apache2/openssl/dist/ssl/
t1_trce.c 745 unsigned int sigalg = (p[0] << 8) | p[1]; local
749 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
761 unsigned int sigalg; local
829 sigalg = (ext[0] << 8) | ext[1];
831 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg);
1475 unsigned int sigalg; local
1510 sigalg = (msg[0] << 8) | msg[1];
1512 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg)
    [all...]
  /src/crypto/external/bsd/openssh/dist/
kex.c 266 const char *sigalg; local
282 if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL)
284 if (!kex_has_any_alg(sigalg, sigalgs))
288 kex_has_any_alg(sigalg, ssh->kex->server_sig_algs))
290 xextendf(&ssh->kex->server_sig_algs, ",", "%s", sigalg);
serverloop.c 697 const char *sigalg, *kex_rsa_sigalg = NULL; local
738 sigalg = sshkey_ssh_name(key);
741 sigalg = kex_rsa_sigalg;
743 sigalg = "rsa-sha2-512";
745 sigalg = "rsa-sha2-256";
748 debug3_f("sign %s key (index %d) using sigalg %s",
749 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
756 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), sigalg)) != 0 ||
sshkey.h 172 const char *sigalg; member in struct:sshkey_impl
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_lib.c 283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg;
308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
434 unsigned int sigalg; local
436 if (!PACKET_get_net_2(pkt, &sigalg)) {
440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_lib.c 240 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg;
268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {
384 unsigned int sigalg; local
386 if (!PACKET_get_net_2(pkt, &sigalg)) {
391 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
  /src/external/mpl/bind/dist/lib/dns/
dnssec.c 1442 dns_secalg_t keyalg, sigalg; local
1455 sigalg = sig.algorithm;
1457 if (keyid == sigid && keyalg == sigalg) {
  /src/external/mpl/dhcp/bind/dist/lib/dns/
dnssec.c 1617 dns_secalg_t keyalg, sigalg; local
1630 sigalg = sig.algorithm;
1632 if (keyid == sigid && keyalg == sigalg) {
  /src/crypto/external/apache2/openssl/dist/apps/lib/
s_cb.c 1307 const char *sigalg; local
1325 if (SSL_get0_peer_signature_name(s, &sigalg))
1326 BIO_printf(bio_err, "Signature type: %s\n", sigalg);
1330 if (SSL_get0_peer_signature_name(s, &sigalg))
1331 BIO_printf(bio_err, "Signature type: %s\n", sigalg);
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_clnt.c 2506 unsigned int sigalg; local
2508 if (!PACKET_get_net_2(pkt, &sigalg)) {
2512 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {
3704 if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL)

Completed in 112 milliseconds

1 2