Searched refs:signatureAndHash (Results 1 – 7 of 7) sorted by relevance
/external/boringssl/src/ssl/test/runner/ |
D | prf.go | 326 …entCertSignatureAlgorithm(serverList, clientList []signatureAndHash, sigType uint8) (signatureAndH… 329 return signatureAndHash{signature: sigType}, nil 337 …return signatureAndHash{}, errors.New("tls: no supported signature algorithm found for signing cli… 342 func (h finishedHash) hashForClientCertificate(signatureAndHash signatureAndHash, masterSecret []by… 344 if signatureAndHash.signature != signatureRSA { 355 hashAlg, err := lookupTLSHash(signatureAndHash.hash) 363 if signatureAndHash.signature == signatureECDSA {
|
D | common.go | 150 type signatureAndHash struct { struct 156 var supportedSKXSignatureAlgorithms = []signatureAndHash{ 166 var supportedClientCertSignatureAlgorithms = []signatureAndHash{ 377 SignatureAndHashes []signatureAndHash 844 func (c *Config) signatureAndHashesForServer() []signatureAndHash { 851 func (c *Config) signatureAndHashesForClient() []signatureAndHash { 1070 func isSupportedSignatureAndHash(sigHash signatureAndHash, sigHashes []signatureAndHash) bool { argument
|
D | handshake_server.go | 665 var signatureAndHash signatureAndHash 667 signatureAndHash = certVerify.signatureAndHash 668 if !isSupportedSignatureAndHash(signatureAndHash, config.signatureAndHashesForServer()) { 677 signatureAndHash.signature = signatureECDSA 679 signatureAndHash.signature = signatureRSA 685 if signatureAndHash.signature != signatureECDSA { 698 digest, _, err = hs.finishedHash.hashForClientCertificate(signatureAndHash, hs.masterSecret) 707 if signatureAndHash.signature != signatureRSA { 713 …digest, hashFunc, err = hs.finishedHash.hashForClientCertificate(signatureAndHash, hs.masterSecret)
|
D | handshake_messages.go | 25 signatureAndHashes []signatureAndHash 544 m.signatureAndHashes = make([]signatureAndHash, n) 1352 signatureAndHashes []signatureAndHash 1461 m.signatureAndHashes = make([]signatureAndHash, numSigAndHash) 1506 signatureAndHash signatureAndHash member 1518 m.signatureAndHash.hash == m1.signatureAndHash.hash && 1519 m.signatureAndHash.signature == m1.signatureAndHash.signature && 1541 y[0] = m.signatureAndHash.hash 1542 y[1] = m.signatureAndHash.signature 1568 m.signatureAndHash.hash = data[0] [all …]
|
D | runner.go | 3112 SignatureAndHashes: []signatureAndHash{ 3129 SignatureAndHashes: []signatureAndHash{ 3143 SignatureAndHashes: []signatureAndHash{ 3160 SignatureAndHashes: []signatureAndHash{ 3173 SignatureAndHashes: []signatureAndHash{ 3191 SignatureAndHashes: []signatureAndHash{ 3207 SignatureAndHashes: []signatureAndHash{ 3228 SignatureAndHashes: []signatureAndHash{
|
D | key_agreement.go | 215 func pickTLS12HashForSignature(sigType uint8, clientList, serverList []signatureAndHash) (uint8, er… argument 367 …if !isSupportedSignatureAndHash(signatureAndHash{ka.sigType, tls12HashId}, config.signatureAndHash…
|
D | handshake_client.go | 600 …certVerify.signatureAndHash, err = hs.finishedHash.selectClientCertSignatureAlgorithm(certReq.sign… 605 …digest, hashFunc, err := hs.finishedHash.hashForClientCertificate(certVerify.signatureAndHash, hs.…
|