Home
last modified time | relevance | path

Searched refs:sigalg (Results 1 – 20 of 20) sorted by relevance

/openssl/util/perl/TLSProxy/
H A DCertificateVerify.pm40 $self->{sigalg} = -1;
50 my $sigalg = -1;
57 $sigalg = unpack('n', $remdata);
66 print " SigAlg:".$sigalg."\n";
69 $self->sigalg($sigalg);
81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1);
89 sub sigalg subroutine
93 $self->{sigalg} = shift;
95 return $self->{sigalg};
H A DServerKeyExchange.pm44 $self->{sigalg} = -1;
53 my $sigalg = -1;
81 $sigalg = unpack('n', substr($self->data, $ptr));
85 if (defined $sigalg) {
97 $self->sigalg($sigalg) if defined $sigalg;
114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1);
149 sub sigalg subroutine
153 $self->{sigalg} = shift;
155 return $self->{sigalg};
/openssl/test/recipes/
H A D70-test_sslsigalgs.t340 my $sigalg;
342 $sigalg = pack "C2", 0x00, 0x00;
344 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff;
347 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01;
350 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04;
352 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg);
464 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
/openssl/crypto/rsa/
H A Drsa_ameth.c401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument
404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print()
406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print()
542 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument
550 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx()
555 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx()
634 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument
638 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify()
642 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify()
733 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) in rsa_sig_info_set()
[all …]
/openssl/providers/fips/
H A Dself_test_kats.c455 EVP_SIGNATURE *sigalg = NULL; in self_test_digest_sign() local
503 sigalg = EVP_SIGNATURE_fetch(libctx, t->sigalgorithm, NULL); in self_test_digest_sign()
504 if (sigalg == NULL) in self_test_digest_sign()
517 if (EVP_PKEY_sign_init_ex2(ctx, sigalg, paramsinit) <= 0) in self_test_digest_sign()
520 if (EVP_PKEY_sign_message_init(ctx, sigalg, paramsinit) <= 0) in self_test_digest_sign()
534 if (EVP_PKEY_verify_init_ex2(ctx, sigalg, NULL) <= 0) in self_test_digest_sign()
537 if (EVP_PKEY_verify_message_init(ctx, sigalg, NULL) <= 0) in self_test_digest_sign()
550 EVP_SIGNATURE_free(sigalg); in self_test_digest_sign()
/openssl/ssl/
H A Dt1_trce.c731 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local
735 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature()
747 unsigned int sigalg; in ssl_print_extension() local
815 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension()
817 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension()
1462 unsigned int sigalg; in ssl_print_cert_request() local
1497 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request()
1499 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
H A Dt1_lib.c1743 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg()
2159 if (sc->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid()
2161 *pnid = sc->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid()
2706 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed()
2707 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed()
3179 *sptr++ = curr->sigalg; in tls1_set_sigalgs()
3209 const SIGALG_LOOKUP *sigalg; in tls1_check_sig_alg() local
3230 sigalg = use_pc_sigalgs in tls1_check_sig_alg()
3233 if (sigalg != NULL && sig_nid == sigalg->sigandhash) in tls1_check_sig_alg()
3903 s->s3.tmp.sigalg = NULL; in tls_choose_sigalg()
[all …]
H A Dssl_local.h1349 const struct sigalg_lookup_st *sigalg; member
1852 uint16_t sigalg; member
H A Ds3_lib.c3790 if (sc->s3.tmp.sigalg == NULL) in ssl3_ctrl()
3792 *(int *)parg = sc->s3.tmp.sigalg->hash; in ssl3_ctrl()
/openssl/crypto/x509/
H A Dt_x509.c287 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument
294 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print()
299 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print()
306 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
/openssl/include/crypto/
H A Drsa.h125 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
H A Dasn1.h50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
/openssl/doc/man7/
H A Dprovider-base.pod680 =item "sigalg-name" (B<OSSL_CAPABILITY_TLS_SIGALG_NAME>) <UTF8 string>
690 =item "sigalg-oid" (B<OSSL_CAPABILITY_TLS_SIGALG_OID>) <UTF8 string>
692 The OID of the "sigalg-name" algorithm in canonical numeric text form. If
694 a NID for this OID, using the "sigalg-name" parameter for its (short) name.
702 "sigalg-name". If "sigalg-name" is implemented by the provider, this
717 The name of the hash algorithm that is part of a composite "sigalg-name".
718 If "sigalg-name" is implemented by the provider, this parameter is redundant
735 otherwise "sigalg-name".
/openssl/ssl/statem/
H A Dstatem_lib.c320 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify()
346 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify()
471 unsigned int sigalg; in tls_process_cert_verify() local
473 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify()
477 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
H A Dstatem_clnt.c2468 unsigned int sigalg; in tls_process_key_exchange() local
2470 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_key_exchange()
2474 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { in tls_process_key_exchange()
3658 if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL) in ssl3_check_client_certificate()
H A Dstatem_srvr.c2523 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_server_key_exchange()
2774 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_server_key_exchange()
/openssl/doc/man3/
H A DEVP_PKEY_ASN1_METHOD.pod239 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
244 B<sigalg> contains the exact signature algorithm.
/openssl/crypto/dsa/
H A Ddsa_ameth.c375 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in dsa_sig_print() argument
/openssl/crypto/ec/
H A Decx_meth.c541 const void *asn, const X509_ALGOR *sigalg, in ecd_item_verify() argument
549 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
/openssl/crypto/err/
H A Dopenssl.txt1467 legacy sigalg disallowed or unsupported

Completed in 101 milliseconds