/third_party/openssl/util/perl/TLSProxy/ |
D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} = shift; 86 return $self->{sigalg};
|
D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine 145 $self->{sigalg} = shift; 147 return $self->{sigalg};
|
/third_party/openssl/test/recipes/ |
D | 70-test_sslsigalgs.t | 336 my $sigalg; 338 $sigalg = pack "C2", 0x00, 0x00; 340 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 343 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 346 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 348 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); 460 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
|
/third_party/openssl/crypto/rsa/ |
D | rsa_ameth.c | 448 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 451 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 453 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg); in rsa_sig_print() 667 X509_ALGOR *sigalg, EVP_PKEY *pkey) in rsa_pss_to_ctx() argument 675 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_pss_to_ctx() 680 pss = rsa_pss_decode(sigalg); in rsa_pss_to_ctx() 783 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, in rsa_item_verify() argument 787 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 791 if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 859 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, in rsa_sig_info_set() argument [all …]
|
/third_party/openssl/ssl/ |
D | t1_trce.c | 681 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 685 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 697 unsigned int sigalg; in ssl_print_extension() local 757 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 759 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1267 unsigned int sigalg; in ssl_print_cert_request() local 1302 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1304 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
D | t1_lib.c | 800 static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg) in tls1_lookup_sigalg() argument 807 if (s->sigalg == sigalg) in tls1_lookup_sigalg() 1011 if (lu->sigalg == TLSEXT_SIGALG_ed25519) in sigalg_security_bits() 1013 else if (lu->sigalg == TLSEXT_SIGALG_ed448) in sigalg_security_bits() 1164 if (s->s3->tmp.sigalg == NULL) in SSL_get_signature_type_nid() 1166 *pnid = s->s3->tmp.sigalg->sig; in SSL_get_signature_type_nid() 1276 if (lu->sigalg == sent_sigs[j]) { in tls1_set_server_sigalgs() 1656 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 1657 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 1922 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); in SSL_get_shared_sigalgs() [all …]
|
D | ssl_local.h | 1492 uint16_t sigalg; member 1614 const SIGALG_LOOKUP *sigalg; member
|
D | s3_lib.c | 3686 if (s->s3->tmp.sigalg == NULL) in ssl3_ctrl() 3688 *(int *)parg = s->s3->tmp.sigalg->hash; in ssl3_ctrl()
|
/third_party/openssl/crypto/x509/ |
D | t_x509.c | 301 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 310 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 317 return ameth->sig_print(bp, sigalg, sig, 9, 0); in X509_signature_print()
|
/third_party/openssl/include/crypto/ |
D | asn1.h | 41 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/third_party/openssl/crypto/ec/ |
D | ecx_meth.c | 506 X509_ALGOR *sigalg, ASN1_BIT_STRING *str, in ecd_item_verify() argument 514 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 240 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg; in tls_construct_cert_verify() 268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 384 unsigned int sigalg; in tls_process_cert_verify() local 386 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 391 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
D | statem_clnt.c | 2324 unsigned int sigalg; in tls_process_key_exchange() local 2326 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_key_exchange() 2331 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { in tls_process_key_exchange() 3448 if (!tls_choose_sigalg(s, 0) || s->s3->tmp.sigalg == NULL) in ssl3_check_client_certificate()
|
D | statem_srvr.c | 2498 const SIGALG_LOOKUP *lu = s->s3->tmp.sigalg; in tls_construct_server_key_exchange() 2790 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_server_key_exchange()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_ASN1_METHOD.pod | 239 const X509_ALGOR *sigalg, const ASN1_STRING *sig, 244 B<sigalg> contains the exact signature algorithm.
|
/third_party/openssl/crypto/dsa/ |
D | dsa_ameth.c | 429 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in dsa_sig_print() argument
|
/third_party/curl/lib/vtls/ |
D | openssl.c | 3601 const X509_ALGOR *sigalg = NULL; in get_cert_chain() local 3605 X509_get0_signature(&psig, &sigalg, x); in get_cert_chain() 3606 if(sigalg) { in get_cert_chain() 3607 i2a_ASN1_OBJECT(mem, sigalg->algorithm); in get_cert_chain()
|