/mbedtls-latest/tests/scripts/ |
D | generate_tls13_compat_tests.py | 92 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._sig_algs]) 102 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._cert_sig_algs]) 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 428 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument 483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) 487 signature_algorithm=sig_alg, 488 cert_sig_alg=sig_alg) 491 signature_algorithm=sig_alg, [all …]
|
/mbedtls-latest/library/ |
D | ssl_misc.h | 1301 unsigned int sig_alg); 2429 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in mbedtls_ssl_sig_alg_is_received() local 2430 if (sig_alg == NULL) { in mbedtls_ssl_sig_alg_is_received() 2434 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in mbedtls_ssl_sig_alg_is_received() 2435 if (*sig_alg == own_sig_alg) { in mbedtls_ssl_sig_alg_is_received() 2443 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported() argument 2445 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported() 2483 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_is_supported() argument 2485 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_is_supported() 2502 sig_alg); in mbedtls_ssl_tls13_sig_alg_is_supported() [all …]
|
D | ssl_tls13_generic.c | 233 mbedtls_pk_type_t sig_alg; in ssl_tls13_parse_certificate_verify() local 279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify() 294 if (!mbedtls_pk_can_do(&ssl->session_negotiate->peer_cert->pk, sig_alg)) { in ssl_tls13_parse_certificate_verify() 317 if (sig_alg == MBEDTLS_PK_RSASSA_PSS) { in ssl_tls13_parse_certificate_verify() 325 if ((ret = mbedtls_pk_verify_ext(sig_alg, options, in ssl_tls13_parse_certificate_verify() 854 int mbedtls_ssl_tls13_check_sig_alg_cert_key_match(uint16_t sig_alg, in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() argument 865 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 869 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 873 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 880 switch (sig_alg) { in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() [all …]
|
D | ssl_tls13_server.c | 1083 static psa_algorithm_t ssl_tls13_iana_sig_alg_to_psa_alg(uint16_t sig_alg) in ssl_tls13_iana_sig_alg_to_psa_alg() argument 1085 switch (sig_alg) { in ssl_tls13_iana_sig_alg_to_psa_alg() 1118 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in ssl_tls13_pick_key_cert() local 1132 for (; *sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++) { in ssl_tls13_pick_key_cert() 1133 if (!mbedtls_ssl_sig_alg_is_offered(ssl, *sig_alg)) { in ssl_tls13_pick_key_cert() 1137 if (!mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported(*sig_alg)) { in ssl_tls13_pick_key_cert() 1167 mbedtls_ssl_sig_alg_to_str(*sig_alg), in ssl_tls13_pick_key_cert() 1168 *sig_alg)); in ssl_tls13_pick_key_cert() 1170 psa_alg = ssl_tls13_iana_sig_alg_to_psa_alg(*sig_alg); in ssl_tls13_pick_key_cert() 1174 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() [all …]
|
D | ssl_tls12_server.c | 1672 mbedtls_pk_type_t sig_alg = mbedtls_ssl_get_ciphersuite_sig_alg(ciphersuite_info); in ssl_parse_client_hello() local 1673 if (sig_alg != MBEDTLS_PK_NONE) { in ssl_parse_client_hello() 1675 ssl, mbedtls_ssl_sig_from_pk_alg(sig_alg)); in ssl_parse_client_hello() 1680 "%u - should not happen", (unsigned) sig_alg)); in ssl_parse_client_hello() 2493 const uint16_t *sig_alg = mbedtls_ssl_get_sig_algs(ssl); in ssl_write_certificate_request() local 2494 if (sig_alg == NULL) { in ssl_write_certificate_request() 2498 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in ssl_write_certificate_request() 2499 unsigned char hash = MBEDTLS_BYTE_1(*sig_alg); in ssl_write_certificate_request() 2504 if (!mbedtls_ssl_sig_alg_is_supported(ssl, *sig_alg)) { in ssl_write_certificate_request() 2512 MBEDTLS_PUT_UINT16_BE(*sig_alg, p, sa_len); in ssl_write_certificate_request() [all …]
|
D | ssl_tls12_client.c | 2303 uint16_t sig_alg; in ssl_parse_server_key_exchange() local 2322 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_parse_server_key_exchange() 2324 sig_alg, &pk_alg, &md_alg) != 0 && in ssl_parse_server_key_exchange() 2325 !mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg) && in ssl_parse_server_key_exchange() 2326 !mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg)) { in ssl_parse_server_key_exchange() 2494 unsigned char *sig_alg; in ssl_parse_certificate_request() local 2611 sig_alg = buf + mbedtls_ssl_hs_hdr_len(ssl) + 3 + n; in ssl_parse_certificate_request() 2615 sig_alg[i], sig_alg[i + 1])); in ssl_parse_certificate_request()
|
D | oid.c | 473 FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg) 478 sig_alg, 485 sig_alg,
|
D | ssl_tls.c | 6583 uint16_t sig_alg; in mbedtls_ssl_parse_sig_alg_ext() local 6597 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in mbedtls_ssl_parse_sig_alg_ext() 6600 sig_alg, in mbedtls_ssl_parse_sig_alg_ext() 6601 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext() 6604 (!(mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg) && in mbedtls_ssl_parse_sig_alg_ext() 6605 mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg)))) { in mbedtls_ssl_parse_sig_alg_ext() 6611 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext() 6614 ssl->handshake->received_sig_algs[common_idx] = sig_alg; in mbedtls_ssl_parse_sig_alg_ext() 9219 unsigned int sig_alg) in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg() argument 9224 if (sig_alg == MBEDTLS_SSL_SIG_ANON) { in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg() [all …]
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 193 and `MBEDTLS_TLS_EXT_SIG_ALG`, `sig_alg` standing for
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.data | 2486 X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg) 2494 X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)
|