Home
last modified time | relevance | path

Searched refs:sigalg (Results 1 – 9 of 9) sorted by relevance

/external/boringssl/src/ssl/
Dssl_privkey.cc100 uint16_t sigalg; member
129 static const SSL_SIGNATURE_ALGORITHM *get_signature_algorithm(uint16_t sigalg) { in get_signature_algorithm() argument
131 if (kSignatureAlgorithms[i].sigalg == sigalg) { in get_signature_algorithm()
143 uint16_t sigalg) { in pkey_supports_algorithm() argument
144 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in pkey_supports_algorithm()
168 static int setup_ctx(SSL *ssl, EVP_MD_CTX *ctx, EVP_PKEY *pkey, uint16_t sigalg, in setup_ctx() argument
170 if (!pkey_supports_algorithm(ssl, pkey, sigalg)) { in setup_ctx()
175 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in setup_ctx()
198 uint16_t sigalg, Span<const uint8_t> in) { in ssl_private_key_sign() argument
205 ret = ssl->cert->key_method->sign(ssl, out, out_len, max_out, sigalg, in ssl_private_key_sign()
[all …]
Dt1_lib.cc475 for (uint16_t sigalg : sigalgs) { in tls12_add_verify_sigalgs() local
477 sigalg == SSL_SIGN_ED25519 && in tls12_add_verify_sigalgs()
481 if (!CBB_add_u16(out, sigalg)) { in tls12_add_verify_sigalgs()
490 uint16_t sigalg) { in tls12_check_peer_sigalg() argument
504 if (sigalg == sigalgs[i]) { in tls12_check_peer_sigalg()
3485 for (uint16_t sigalg : sigalgs) { in tls1_choose_signature_algorithm() local
3488 if (sigalg == SSL_SIGN_RSA_PKCS1_MD5_SHA1 || in tls1_choose_signature_algorithm()
3489 !ssl_private_key_supports_signature_algorithm(hs, sigalg)) { in tls1_choose_signature_algorithm()
3494 if (sigalg == peer_sigalg) { in tls1_choose_signature_algorithm()
3495 *out = sigalg; in tls1_choose_signature_algorithm()
Dinternal.h869 uint16_t sigalg, Span<const uint8_t> in);
880 uint16_t sigalg);
885 uint16_t sigalg, EVP_PKEY *pkey,
1691 uint16_t sigalg);
/external/boringssl/src/crypto/x509/
Dalgorithm.c113 int x509_digest_verify_init(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, in x509_digest_verify_init() argument
116 int sigalg_nid = OBJ_obj2nid(sigalg->algorithm); in x509_digest_verify_init()
132 return x509_rsa_pss_to_ctx(ctx, sigalg, pkey); in x509_digest_verify_init()
135 if (sigalg->parameter != NULL) { in x509_digest_verify_init()
Dinternal.h33 int x509_rsa_pss_to_ctx(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, EVP_PKEY *pkey);
43 int x509_print_rsa_pss_params(BIO *bp, const X509_ALGOR *sigalg, int indent,
58 int x509_digest_verify_init(EVP_MD_CTX *ctx, X509_ALGOR *sigalg,
Drsa_pss.c245 int x509_rsa_pss_to_ctx(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) { in x509_rsa_pss_to_ctx() argument
246 assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); in x509_rsa_pss_to_ctx()
251 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg, &maskHash); in x509_rsa_pss_to_ctx()
298 int x509_print_rsa_pss_params(BIO *bp, const X509_ALGOR *sigalg, int indent, in x509_print_rsa_pss_params() argument
300 assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); in x509_print_rsa_pss_params()
304 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg, &maskHash); in x509_print_rsa_pss_params()
Dt_x509.c302 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument
307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print()
311 int sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print()
313 !x509_print_rsa_pss_params(bp, sigalg, 9, 0)) { in X509_signature_print()
/external/boringssl/src/tool/
Dtransport_common.cc248 uint16_t sigalg = SSL_get_peer_signature_algorithm(ssl); in PrintConnectionInfo() local
249 if (sigalg != 0) { in PrintConnectionInfo()
252 sigalg, SSL_version(ssl) != TLS1_2_VERSION)); in PrintConnectionInfo()
/external/boringssl/src/include/openssl/
Dssl.h984 OPENSSL_EXPORT const char *SSL_get_signature_algorithm_name(uint16_t sigalg,
989 OPENSSL_EXPORT int SSL_get_signature_algorithm_key_type(uint16_t sigalg);
994 uint16_t sigalg);
998 OPENSSL_EXPORT int SSL_is_signature_algorithm_rsa_pss(uint16_t sigalg);