Home
last modified time | relevance | path

Searched refs:sig_alg (Results 1 – 10 of 10) sorted by relevance

/mbedtls-latest/tests/scripts/
Dgenerate_tls13_compat_tests.py92 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._sig_algs])
102 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._cert_sig_algs])
192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
428 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument
483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group)
487 signature_algorithm=sig_alg,
488 cert_sig_alg=sig_alg)
491 signature_algorithm=sig_alg,
[all …]
/mbedtls-latest/library/
Dssl_misc.h1301 unsigned int sig_alg);
2429 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in mbedtls_ssl_sig_alg_is_received() local
2430 if (sig_alg == NULL) { in mbedtls_ssl_sig_alg_is_received()
2434 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in mbedtls_ssl_sig_alg_is_received()
2435 if (*sig_alg == own_sig_alg) { in mbedtls_ssl_sig_alg_is_received()
2443 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported() argument
2445 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported()
2483 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_is_supported() argument
2485 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_is_supported()
2502 sig_alg); in mbedtls_ssl_tls13_sig_alg_is_supported()
[all …]
Dssl_tls13_generic.c233 mbedtls_pk_type_t sig_alg; in ssl_tls13_parse_certificate_verify() local
279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify()
294 if (!mbedtls_pk_can_do(&ssl->session_negotiate->peer_cert->pk, sig_alg)) { in ssl_tls13_parse_certificate_verify()
317 if (sig_alg == MBEDTLS_PK_RSASSA_PSS) { in ssl_tls13_parse_certificate_verify()
325 if ((ret = mbedtls_pk_verify_ext(sig_alg, options, in ssl_tls13_parse_certificate_verify()
854 int mbedtls_ssl_tls13_check_sig_alg_cert_key_match(uint16_t sig_alg, in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() argument
865 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match()
869 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match()
873 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match()
880 switch (sig_alg) { in mbedtls_ssl_tls13_check_sig_alg_cert_key_match()
[all …]
Dssl_tls13_server.c1083 static psa_algorithm_t ssl_tls13_iana_sig_alg_to_psa_alg(uint16_t sig_alg) in ssl_tls13_iana_sig_alg_to_psa_alg() argument
1085 switch (sig_alg) { in ssl_tls13_iana_sig_alg_to_psa_alg()
1118 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in ssl_tls13_pick_key_cert() local
1132 for (; *sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++) { in ssl_tls13_pick_key_cert()
1133 if (!mbedtls_ssl_sig_alg_is_offered(ssl, *sig_alg)) { in ssl_tls13_pick_key_cert()
1137 if (!mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported(*sig_alg)) { in ssl_tls13_pick_key_cert()
1167 mbedtls_ssl_sig_alg_to_str(*sig_alg), in ssl_tls13_pick_key_cert()
1168 *sig_alg)); in ssl_tls13_pick_key_cert()
1170 psa_alg = ssl_tls13_iana_sig_alg_to_psa_alg(*sig_alg); in ssl_tls13_pick_key_cert()
1174 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert()
[all …]
Dssl_tls12_server.c1672 mbedtls_pk_type_t sig_alg = mbedtls_ssl_get_ciphersuite_sig_alg(ciphersuite_info); in ssl_parse_client_hello() local
1673 if (sig_alg != MBEDTLS_PK_NONE) { in ssl_parse_client_hello()
1675 ssl, mbedtls_ssl_sig_from_pk_alg(sig_alg)); in ssl_parse_client_hello()
1680 "%u - should not happen", (unsigned) sig_alg)); in ssl_parse_client_hello()
2493 const uint16_t *sig_alg = mbedtls_ssl_get_sig_algs(ssl); in ssl_write_certificate_request() local
2494 if (sig_alg == NULL) { in ssl_write_certificate_request()
2498 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in ssl_write_certificate_request()
2499 unsigned char hash = MBEDTLS_BYTE_1(*sig_alg); in ssl_write_certificate_request()
2504 if (!mbedtls_ssl_sig_alg_is_supported(ssl, *sig_alg)) { in ssl_write_certificate_request()
2512 MBEDTLS_PUT_UINT16_BE(*sig_alg, p, sa_len); in ssl_write_certificate_request()
[all …]
Dssl_tls12_client.c2303 uint16_t sig_alg; in ssl_parse_server_key_exchange() local
2322 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_parse_server_key_exchange()
2324 sig_alg, &pk_alg, &md_alg) != 0 && in ssl_parse_server_key_exchange()
2325 !mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg) && in ssl_parse_server_key_exchange()
2326 !mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg)) { in ssl_parse_server_key_exchange()
2494 unsigned char *sig_alg; in ssl_parse_certificate_request() local
2611 sig_alg = buf + mbedtls_ssl_hs_hdr_len(ssl) + 3 + n; in ssl_parse_certificate_request()
2615 sig_alg[i], sig_alg[i + 1])); in ssl_parse_certificate_request()
Doid.c473 FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg)
478 sig_alg,
485 sig_alg,
Dssl_tls.c6583 uint16_t sig_alg; in mbedtls_ssl_parse_sig_alg_ext() local
6597 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in mbedtls_ssl_parse_sig_alg_ext()
6600 sig_alg, in mbedtls_ssl_parse_sig_alg_ext()
6601 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext()
6604 (!(mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg) && in mbedtls_ssl_parse_sig_alg_ext()
6605 mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg)))) { in mbedtls_ssl_parse_sig_alg_ext()
6611 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext()
6614 ssl->handshake->received_sig_algs[common_idx] = sig_alg; in mbedtls_ssl_parse_sig_alg_ext()
9219 unsigned int sig_alg) in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg() argument
9224 if (sig_alg == MBEDTLS_SSL_SIG_ANON) { in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg()
[all …]
/mbedtls-latest/docs/architecture/
Dtls13-support.md193 and `MBEDTLS_TLS_EXT_SIG_ALG`, `sig_alg` standing for
/mbedtls-latest/tests/suites/
Dtest_suite_x509parse.data2486 X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg)
2494 X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)