static int check_data(const dst_private_t *priv, const unsigned int alg, isc_boolean_t old) { /* XXXVIX this switch statement is too sparse to gen a jump table. */ switch (alg) { case DST_ALG_RSAMD5: case DST_ALG_RSASHA1: return (check_rsa(priv)); case DST_ALG_DH: return (check_dh(priv)); case DST_ALG_DSA: return (check_dsa(priv)); case DST_ALG_HMACMD5: return (check_hmac_md5(priv, old)); case DST_ALG_HMACSHA1: return (check_hmac_sha(priv, HMACSHA1_NTAGS, alg)); case DST_ALG_HMACSHA224: return (check_hmac_sha(priv, HMACSHA224_NTAGS, alg)); case DST_ALG_HMACSHA256: return (check_hmac_sha(priv, HMACSHA256_NTAGS, alg)); case DST_ALG_HMACSHA384: return (check_hmac_sha(priv, HMACSHA384_NTAGS, alg)); case DST_ALG_HMACSHA512: return (check_hmac_sha(priv, HMACSHA512_NTAGS, alg)); default: return (DST_R_UNSUPPORTEDALG); } }
void doit(void) { if (check_x509_privkey() != 0) { fail("error in privkey check\n"); exit(1); } if (check_privkey_import_export() != 0) { fail("error in privkey import/export check\n"); exit(1); } if (check_dsa() != 0) { fail("error in DSA check\n"); exit(1); } if (check_rsa() != 0) { fail("error in RSA check\n"); exit(1); } if (check_ecc() != 0) { fail("error in ecdsa check\n"); } if (check_ed25519() != 0) { fail("error in ed25519 check\n"); } if (check_gost() != 0) { fail("error in gost check\n"); } }
static int check_data(const dst_private_t *priv, const unsigned int alg) { /* XXXVIX this switch statement is too sparse to gen a jump table. */ switch (alg) { case DST_ALG_RSAMD5: case DST_ALG_RSASHA1: return (check_rsa(priv)); case DST_ALG_DH: return (check_dh(priv)); case DST_ALG_DSA: return (check_dsa(priv)); case DST_ALG_HMACMD5: return (check_hmac_md5(priv)); default: return (DST_R_UNSUPPORTEDALG); } }