/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 40 $self->{sigalg} = -1; 50 my $sigalg = -1; 57 $sigalg = unpack('n', $remdata); 66 print " SigAlg:".$sigalg."\n"; 69 $self->sigalg($sigalg); 81 $data .= pack("n", $self->sigalg()) if ($self->sigalg() != -1); 89 sub sigalg subroutine 93 $self->{sigalg} = shift; 95 return $self->{sigalg};
|
H A D | ServerKeyExchange.pm | 44 $self->{sigalg} = -1; 53 my $sigalg = -1; 81 $sigalg = unpack('n', substr($self->data, $ptr)); 85 if (defined $sigalg) { 97 $self->sigalg($sigalg) if defined $sigalg; 114 $data .= pack('n', $self->sigalg) if ($self->sigalg != -1); 149 sub sigalg subroutine 153 $self->{sigalg} = shift; 155 return $self->{sigalg};
|
/openssl/test/recipes/ |
H A D | 70-test_sslsigalgs.t | 340 my $sigalg; 342 $sigalg = pack "C2", 0x00, 0x00; 344 $sigalg = pack "C4", 0x00, 0x02, 0xff, 0xff; 347 $sigalg = pack "C4", 0x00, 0x02, 0x04, 0x01; 350 $sigalg = pack "C4", 0x00, 0x02, 0x08, 0x04; 352 $message->set_extension(TLSProxy::Message::EXT_SIG_ALGS, $sigalg); 464 $message->sigalg(TLSProxy::Message::SIG_ALG_RSA_PSS_PSS_SHA256);
|
/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 401 static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in rsa_sig_print() argument 404 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); in rsa_sig_print() 542 const X509_ALGOR *sigalg, EVP_PKEY *pkey) in ossl_rsa_pss_to_ctx() argument 550 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 555 pss = ossl_rsa_pss_decode(sigalg); in ossl_rsa_pss_to_ctx() 634 const void *asn, const X509_ALGOR *sigalg, in rsa_item_verify() argument 638 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 642 if (ossl_rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) { in rsa_item_verify() 733 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) in rsa_sig_info_set() [all …]
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 455 EVP_SIGNATURE *sigalg = NULL; in self_test_digest_sign() local 503 sigalg = EVP_SIGNATURE_fetch(libctx, t->sigalgorithm, NULL); in self_test_digest_sign() 504 if (sigalg == NULL) in self_test_digest_sign() 517 if (EVP_PKEY_sign_init_ex2(ctx, sigalg, paramsinit) <= 0) in self_test_digest_sign() 520 if (EVP_PKEY_sign_message_init(ctx, sigalg, paramsinit) <= 0) in self_test_digest_sign() 534 if (EVP_PKEY_verify_init_ex2(ctx, sigalg, NULL) <= 0) in self_test_digest_sign() 537 if (EVP_PKEY_verify_message_init(ctx, sigalg, NULL) <= 0) in self_test_digest_sign() 550 EVP_SIGNATURE_free(sigalg); in self_test_digest_sign()
|
/openssl/ssl/ |
H A D | t1_trce.c | 731 unsigned int sigalg = (p[0] << 8) | p[1]; in ssl_print_signature() local 735 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_signature() 747 unsigned int sigalg; in ssl_print_extension() local 815 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 817 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_extension() 1462 unsigned int sigalg; in ssl_print_cert_request() local 1497 sigalg = (msg[0] << 8) | msg[1]; in ssl_print_cert_request() 1499 ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); in ssl_print_cert_request()
|
H A D | t1_lib.c | 1743 if (lu->sigalg == sigalg) { in tls1_lookup_sigalg() 2159 if (sc->s3.tmp.sigalg == NULL) in SSL_get_signature_type_nid() 2161 *pnid = sc->s3.tmp.sigalg->sig; in SSL_get_signature_type_nid() 2706 sigalgstr[0] = (lu->sigalg >> 8) & 0xff; in tls12_sigalg_allowed() 2707 sigalgstr[1] = lu->sigalg & 0xff; in tls12_sigalg_allowed() 3179 *sptr++ = curr->sigalg; in tls1_set_sigalgs() 3209 const SIGALG_LOOKUP *sigalg; in tls1_check_sig_alg() local 3230 sigalg = use_pc_sigalgs in tls1_check_sig_alg() 3233 if (sigalg != NULL && sig_nid == sigalg->sigandhash) in tls1_check_sig_alg() 3903 s->s3.tmp.sigalg = NULL; in tls_choose_sigalg() [all …]
|
H A D | ssl_local.h | 1349 const struct sigalg_lookup_st *sigalg; member 1852 uint16_t sigalg; member
|
H A D | s3_lib.c | 3790 if (sc->s3.tmp.sigalg == NULL) in ssl3_ctrl() 3792 *(int *)parg = sc->s3.tmp.sigalg->hash; in ssl3_ctrl()
|
/openssl/crypto/x509/ |
H A D | t_x509.c | 287 int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, in X509_signature_print() argument 294 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) in X509_signature_print() 299 sig_nid = OBJ_obj2nid(sigalg->algorithm); in X509_signature_print() 306 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0); in X509_signature_print()
|
/openssl/include/crypto/ |
H A D | rsa.h | 125 const X509_ALGOR *sigalg, EVP_PKEY *pkey);
|
H A D | asn1.h | 50 const X509_ALGOR *sigalg, const ASN1_STRING *sig,
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 680 =item "sigalg-name" (B<OSSL_CAPABILITY_TLS_SIGALG_NAME>) <UTF8 string> 690 =item "sigalg-oid" (B<OSSL_CAPABILITY_TLS_SIGALG_OID>) <UTF8 string> 692 The OID of the "sigalg-name" algorithm in canonical numeric text form. If 694 a NID for this OID, using the "sigalg-name" parameter for its (short) name. 702 "sigalg-name". If "sigalg-name" is implemented by the provider, this 717 The name of the hash algorithm that is part of a composite "sigalg-name". 718 If "sigalg-name" is implemented by the provider, this parameter is redundant 735 otherwise "sigalg-name".
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 320 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_cert_verify() 346 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_cert_verify() 471 unsigned int sigalg; in tls_process_cert_verify() local 473 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_cert_verify() 477 if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { in tls_process_cert_verify()
|
H A D | statem_clnt.c | 2468 unsigned int sigalg; in tls_process_key_exchange() local 2470 if (!PACKET_get_net_2(pkt, &sigalg)) { in tls_process_key_exchange() 2474 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { in tls_process_key_exchange() 3658 if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL) in ssl3_check_client_certificate()
|
H A D | statem_srvr.c | 2523 const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; in tls_construct_server_key_exchange() 2774 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { in tls_construct_server_key_exchange()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_ASN1_METHOD.pod | 239 const X509_ALGOR *sigalg, const ASN1_STRING *sig, 244 B<sigalg> contains the exact signature algorithm.
|
/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 375 static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, in dsa_sig_print() argument
|
/openssl/crypto/ec/ |
H A D | ecx_meth.c | 541 const void *asn, const X509_ALGOR *sigalg, in ecd_item_verify() argument 549 X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); in ecd_item_verify()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1467 legacy sigalg disallowed or unsupported
|