sigblock
int sigblock(int);
PROTO_DEPRECATED(sigblock);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
SECItem secsig = {siBuffer, sigblock, sigblock_len};
_verify_nettle_dsa(sldns_buffer* buf, unsigned char* sigblock,
if(key[0] != sigblock[0])
nettle_mpz_set_str_256_u(signature.r, 20, sigblock+1);
nettle_mpz_set_str_256_u(signature.s, 20, sigblock+1+20);
(uint8_t*)sigblock) != ASN1_ITERATOR_CONSTRUCTED
_verify_nettle_rsa(sldns_buffer* buf, unsigned int digest_size, char* sigblock,
nettle_mpz_init_set_str_256_u(signature, sigblock_len, (uint8_t*)sigblock);
_verify_nettle_ecdsa(sldns_buffer* buf, unsigned int digest_size, unsigned char* sigblock,
nettle_mpz_set_str_256_u(signature.r, SHA256_DIGEST_SIZE, sigblock);
nettle_mpz_set_str_256_u(signature.s, SHA256_DIGEST_SIZE, sigblock+SHA256_DIGEST_SIZE);
nettle_mpz_set_str_256_u(signature.r, SHA384_DIGEST_SIZE, sigblock);
nettle_mpz_set_str_256_u(signature.s, SHA384_DIGEST_SIZE, sigblock+SHA384_DIGEST_SIZE);
_verify_nettle_ed25519(sldns_buffer* buf, unsigned char* sigblock,
sldns_buffer_begin(buf), (uint8_t*)sigblock);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
*reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
*reason = _verify_nettle_rsa(buf, digest_size, (char*)sigblock,
*reason = _verify_nettle_ecdsa(buf, digest_size, sigblock,
*reason = _verify_nettle_ed25519(buf, sigblock, sigblock_len,
unsigned char* sigblock, int dofree, int docrypto_free)
if(dofree) free(sigblock);
else if(docrypto_free) OPENSSL_free(sigblock);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
if(!setup_dsa_sig(&sigblock, &sigblock_len)) {
if(!setup_ecdsa_sig(&sigblock, &sigblock_len)) {
if(dofree) free(sigblock);
else if(docrypto_free) OPENSSL_free(sigblock);
digest_ctx_free(ctx, evp_key, sigblock,
digest_ctx_free(ctx, evp_key, sigblock,
res = EVP_VerifyFinal(ctx, sigblock, sigblock_len, evp_key);
digest_ctx_free(ctx, evp_key, sigblock,
res = EVP_DigestVerify(ctx, sigblock, sigblock_len,
digest_ctx_free(ctx, evp_key, sigblock,
unsigned char* sigblock, unsigned int sigblock_len,
unsigned char* sigblock; /* signature rdata field */
sigblock = (unsigned char*)signer+signer_len;
sigblock, sigblock_len, key, keylen, reason);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
SECItem secsig = {siBuffer, sigblock, sigblock_len};
_verify_nettle_dsa(sldns_buffer* buf, unsigned char* sigblock,
if(key[0] != sigblock[0])
nettle_mpz_set_str_256_u(signature.r, 20, sigblock+1);
nettle_mpz_set_str_256_u(signature.s, 20, sigblock+1+20);
(uint8_t*)sigblock) != ASN1_ITERATOR_CONSTRUCTED
_verify_nettle_rsa(sldns_buffer* buf, unsigned int digest_size, char* sigblock,
nettle_mpz_init_set_str_256_u(signature, sigblock_len, (uint8_t*)sigblock);
_verify_nettle_ecdsa(sldns_buffer* buf, unsigned int digest_size, unsigned char* sigblock,
nettle_mpz_set_str_256_u(signature.r, SHA256_DIGEST_SIZE, sigblock);
nettle_mpz_set_str_256_u(signature.s, SHA256_DIGEST_SIZE, sigblock+SHA256_DIGEST_SIZE);
nettle_mpz_set_str_256_u(signature.r, SHA384_DIGEST_SIZE, sigblock);
nettle_mpz_set_str_256_u(signature.s, SHA384_DIGEST_SIZE, sigblock+SHA384_DIGEST_SIZE);
_verify_nettle_ed25519(sldns_buffer* buf, unsigned char* sigblock,
sldns_buffer_begin(buf), (uint8_t*)sigblock);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
*reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
*reason = _verify_nettle_rsa(buf, digest_size, (char*)sigblock,
*reason = _verify_nettle_ecdsa(buf, digest_size, sigblock,
*reason = _verify_nettle_ed25519(buf, sigblock, sigblock_len,
unsigned char* sigblock, int dofree, int docrypto_free)
if(dofree) free(sigblock);
else if(docrypto_free) OPENSSL_free(sigblock);
verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
if(!setup_dsa_sig(&sigblock, &sigblock_len)) {
if(!setup_ecdsa_sig(&sigblock, &sigblock_len)) {
if(dofree) free(sigblock);
else if(docrypto_free) OPENSSL_free(sigblock);
digest_ctx_free(ctx, evp_key, sigblock,
digest_ctx_free(ctx, evp_key, sigblock,
res = EVP_VerifyFinal(ctx, sigblock, sigblock_len, evp_key);
digest_ctx_free(ctx, evp_key, sigblock,
res = EVP_DigestVerify(ctx, sigblock, sigblock_len,
digest_ctx_free(ctx, evp_key, sigblock,
unsigned char* sigblock, unsigned int sigblock_len,
unsigned char* sigblock; /* signature rdata field */
sigblock = (unsigned char*)signer+signer_len;
sigblock, sigblock_len, key, keylen, reason);