/external/boringssl/src/ssl/ |
D | ssl_privkey.cc | 100 uint16_t sigalg; member 129 static const SSL_SIGNATURE_ALGORITHM *get_signature_algorithm(uint16_t sigalg) { in get_signature_algorithm() argument 131 if (kSignatureAlgorithms[i].sigalg == sigalg) { in get_signature_algorithm() 143 uint16_t sigalg) { in pkey_supports_algorithm() argument 144 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in pkey_supports_algorithm() 168 static int setup_ctx(SSL *ssl, EVP_MD_CTX *ctx, EVP_PKEY *pkey, uint16_t sigalg, in setup_ctx() argument 170 if (!pkey_supports_algorithm(ssl, pkey, sigalg)) { in setup_ctx() 175 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in setup_ctx() 198 uint16_t sigalg, Span<const uint8_t> in) { in ssl_private_key_sign() argument 205 ret = ssl->cert->key_method->sign(ssl, out, out_len, max_out, sigalg, in ssl_private_key_sign() [all …]
|
D | t1_lib.cc | 475 for (uint16_t sigalg : sigalgs) { in tls12_add_verify_sigalgs() local 477 sigalg == SSL_SIGN_ED25519 && in tls12_add_verify_sigalgs() 481 if (!CBB_add_u16(out, sigalg)) { in tls12_add_verify_sigalgs() 490 uint16_t sigalg) { in tls12_check_peer_sigalg() argument 504 if (sigalg == sigalgs[i]) { in tls12_check_peer_sigalg() 3485 for (uint16_t sigalg : sigalgs) { in tls1_choose_signature_algorithm() local 3488 if (sigalg == SSL_SIGN_RSA_PKCS1_MD5_SHA1 || in tls1_choose_signature_algorithm() 3489 !ssl_private_key_supports_signature_algorithm(hs, sigalg)) { in tls1_choose_signature_algorithm() 3494 if (sigalg == peer_sigalg) { in tls1_choose_signature_algorithm() 3495 *out = sigalg; in tls1_choose_signature_algorithm()
|
D | internal.h | 869 uint16_t sigalg, Span<const uint8_t> in); 880 uint16_t sigalg); 885 uint16_t sigalg, EVP_PKEY *pkey, 1691 uint16_t sigalg);
|
/external/boringssl/src/crypto/x509/ |
D | algorithm.c | 113 int x509_digest_verify_init(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, in x509_digest_verify_init() argument 116 int sigalg_nid = OBJ_obj2nid(sigalg->algorithm); in x509_digest_verify_init() 132 return x509_rsa_pss_to_ctx(ctx, sigalg, pkey); in x509_digest_verify_init() 135 if (sigalg->parameter != NULL) { in x509_digest_verify_init()
|
D | internal.h | 33 int x509_rsa_pss_to_ctx(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, EVP_PKEY *pkey); 43 int x509_print_rsa_pss_params(BIO *bp, const X509_ALGOR *sigalg, int indent, 58 int x509_digest_verify_init(EVP_MD_CTX *ctx, X509_ALGOR *sigalg,
|
D | rsa_pss.c | 245 int x509_rsa_pss_to_ctx(EVP_MD_CTX *ctx, X509_ALGOR *sigalg, EVP_PKEY *pkey) { in x509_rsa_pss_to_ctx() argument 246 assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); in x509_rsa_pss_to_ctx() 251 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg, &maskHash); in x509_rsa_pss_to_ctx() 298 int x509_print_rsa_pss_params(BIO *bp, const X509_ALGOR *sigalg, int indent, in x509_print_rsa_pss_params() argument 300 assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); in x509_print_rsa_pss_params() 304 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg, &maskHash); in x509_print_rsa_pss_params()
|
D | t_x509.c | 302 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 307 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 311 int sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 313 !x509_print_rsa_pss_params(bp, sigalg, 9, 0)) { in X509_signature_print()
|
/external/boringssl/src/tool/ |
D | transport_common.cc | 248 uint16_t sigalg = SSL_get_peer_signature_algorithm(ssl); in PrintConnectionInfo() local 249 if (sigalg != 0) { in PrintConnectionInfo() 252 sigalg, SSL_version(ssl) != TLS1_2_VERSION)); in PrintConnectionInfo()
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 984 OPENSSL_EXPORT const char *SSL_get_signature_algorithm_name(uint16_t sigalg, 989 OPENSSL_EXPORT int SSL_get_signature_algorithm_key_type(uint16_t sigalg); 994 uint16_t sigalg); 998 OPENSSL_EXPORT int SSL_is_signature_algorithm_rsa_pss(uint16_t sigalg);
|