/openssl-master/util/perl/TLSProxy/ |
A D | CertificateVerify.pm | 32 $self->{sigalg} = -1; 42 my $sigalg = -1; 48 $sigalg = unpack('n', $remdata); 57 print " SigAlg:".$sigalg."\n"; 60 $self->sigalg($sigalg); 72 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 80 sub sigalg subroutine 84 $self->{sigalg} = shift; 86 return $self->{sigalg};
|
A D | ServerKeyExchange.pm | 36 $self->{sigalg} = -1; 45 my $sigalg = -1; 73 $sigalg = unpack('n', substr($self->data, $ptr)); 77 if (defined $sigalg) { 89 $self->sigalg($sigalg) if defined $sigalg; 106 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 141 sub sigalg subroutine 145 $self->{sigalg} = shift; 147 return $self->{sigalg};
|
/openssl-master/test/recipes/ |
A D | 70-test_sslsigalgs.t | 340 my $sigalg; 342 $sigalg = pack "C2", 0x00, 0x00; 344 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 347 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 350 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 352 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); 464 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
|
/openssl-master/crypto/rsa/ |
A D | rsa_ameth.c | 397 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 400 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 402 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print() 520 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument 528 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 533 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx() 612 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument 616 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 620 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 671 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) in rsa_sig_info_set() [all …]
|
/openssl-master/ssl/ |
A D | t1_trce.c | 695 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 699 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 711 unsigned int sigalg; in ssl_print_extension() local 771 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 773 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1288 unsigned int sigalg; in ssl_print_cert_request() local 1323 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1325 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
A D | t1_lib.c | 1204 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg() 1585 if (s->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid() 1587 *pnid = s->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid() 2103 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 2104 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 2529 *sptr++ = curr->sigalg; in tls1_set_sigalgs() 2559 const SIGALG_LOOKUP *sigalg; in tls1_check_sig_alg() local 2579 sigalg = use_pc_sigalgs in tls1_check_sig_alg() 2582 if (sigalg != NULL && sig_nid == sigalg->sigandhash) in tls1_check_sig_alg() 3213 s->s3.tmp.sigalg = NULL; in tls_choose_sigalg() [all …]
|
A D | ssl_local.h | 1342 const struct sigalg_lookup_st *sigalg; member 1806 uint16_t sigalg; member
|
A D | s3_lib.c | 3692 if (s->s3.tmp.sigalg == NULL) in ssl3_ctrl() 3694 *(int *)parg = s->s3.tmp.sigalg->hash; in ssl3_ctrl()
|
/openssl-master/crypto/x509/ |
A D | t_x509.c | 313 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 320 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 325 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 332 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
|
/openssl-master/include/crypto/ |
A D | rsa.h | 114 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
A D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/openssl-master/ssl/statem/ |
A D | statem_lib.c | 282 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify() 307 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 433 unsigned int sigalg; in tls_process_cert_verify() local 435 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 439 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
A D | statem_clnt.c | 2236 unsigned int sigalg; in tls_process_key_exchange() local 2238 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_key_exchange() 2242 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { in tls_process_key_exchange() 3401 if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL) in ssl3_check_client_certificate()
|
A D | statem_srvr.c | 2427 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_server_key_exchange() 2675 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_server_key_exchange()
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_ASN1_METHOD.pod | 239 const X509_ALGOR *sigalg, const ASN1_STRING *sig, 244 B<sigalg> contains the exact signature algorithm.
|
/openssl-master/crypto/dsa/ |
A D | dsa_ameth.c | 372 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in dsa_sig_print() argument
|
/openssl-master/crypto/ec/ |
A D | ecx_meth.c | 543 const void *asn, const X509_ALGOR *sigalg, in ecd_item_verify() argument 551 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
|