/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} = shift; 86 return $self->{sigalg};
|
D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine 145 $self->{sigalg} = shift; 147 return $self->{sigalg};
|
/third_party/openssl/util/perl/TLSProxy/ |
D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} = shift; 86 return $self->{sigalg};
|
D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine 145 $self->{sigalg} = shift; 147 return $self->{sigalg};
|
/third_party/openssl/crypto/rsa/ |
D | rsa_ameth.c | 398 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 401 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 403 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print() 521 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument 529 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 534 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx() 613 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument 617 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 621 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 669 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, in rsa_sig_info_set() argument [all …]
|
/third_party/openssl/test/recipes/ |
D | 70-test_sslsigalgs.t | 341 my $sigalg; 343 $sigalg = pack "C2", 0x00, 0x00; 345 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 348 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 351 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 353 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); 465 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_ameth.c | 398 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 401 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 403 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print() 521 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument 529 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 534 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx() 613 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument 617 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 621 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 701 static int rsa_sig_info_set(X509_SIG_INFO *siginf, const X509_ALGOR *sigalg, in rsa_sig_info_set() argument [all …]
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 711 unsigned int sigalg; in ssl_print_extension() local 771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1288 unsigned int sigalg; in ssl_print_cert_request() local 1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
D | t1_lib.c | 1222 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) in tls1_lookup_sigalg() argument 1231 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg() 1472 if (lu->sigalg == TLSEXT_SIGALG_ed25519) in sigalg_security_bits() 1474 else if (lu->sigalg == TLSEXT_SIGALG_ed448) in sigalg_security_bits() 1612 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid() 1614 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid() 1724 if (lu->sigalg == sent_sigs[j]) { in tls1_set_server_sigalgs() 2135 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 2136 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 2403 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); in SSL_get_shared_sigalgs() [all …]
|
/third_party/openssl/ssl/ |
D | t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 711 unsigned int sigalg; in ssl_print_extension() local 771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1288 unsigned int sigalg; in ssl_print_cert_request() local 1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
D | t1_lib.c | 1201 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg) in tls1_lookup_sigalg() argument 1210 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg() 1451 if (lu->sigalg == TLSEXT_SIGALG_ed25519) in sigalg_security_bits() 1453 else if (lu->sigalg == TLSEXT_SIGALG_ed448) in sigalg_security_bits() 1591 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid() 1593 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid() 1703 if (lu->sigalg == sent_sigs[j]) { in tls1_set_server_sigalgs() 2114 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 2115 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 2382 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); in SSL_get_shared_sigalgs() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | t_x509.c | 313 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 320 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 325 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 332 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
|
/third_party/openssl/crypto/x509/ |
D | t_x509.c | 313 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 320 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 325 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 332 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
|
/third_party/cups/ |
D | ohos-add-openssl.patch | 643 + const char *sigalg; // Signature algorithm 654 + sigalg = "SHA1WithECDSAEncryption"; 657 + sigalg = "SHA224WithECDSAEncryption"; 660 + sigalg = "SHA256WithECDSAEncryption"; 663 + sigalg = "SHA384WithECDSAEncryption"; 666 + sigalg = "SHA512WithECDSAEncryption"; 669 + sigalg = "SHA1WithRSAEncryption"; 672 + sigalg = "SHA224WithRSAEncryption"; 675 + sigalg = "SHA256WithRSAEncryption"; 678 + sigalg = "SHA384WithRSAEncryption"; [all …]
|
/third_party/openssl/open_harmony_openssl_config/ |
D | openssl.cnf | 27 # the following `CipherString` and `MinProtocol` are meant to solve 'legacy sigalg disallowed or un…
|
/third_party/openssl/ohos_lite/include/crypto/ |
D | asn1.h | 41 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
D | rsa.h | 115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/third_party/openssl/include/crypto/ |
D | rsa.h | 115 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 283 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify() 308 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 434 unsigned int sigalg; in tls_process_cert_verify() local 436 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 440 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | statem_lib.c | 304 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify() 329 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 455 unsigned int sigalg; in tls_process_cert_verify() local 457 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 461 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_ASN1_METHOD.pod | 239 const X509_ALGOR *sigalg, const ASN1_STRING *sig, 244 B<sigalg> contains the exact signature algorithm.
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
D | ecx_meth.c | 543 const void *asn, const X509_ALGOR *sigalg, in ecd_item_verify() argument 551 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
|
/third_party/openssl/crypto/ec/ |
D | ecx_meth.c | 543 const void *asn, const X509_ALGOR *sigalg, in ecd_item_verify() argument 551 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
|