/openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
D | generate_tls13_compat_tests.py | 92 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._sig_algs]) 102 [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._cert_sig_algs]) 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 428 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument 483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) 487 signature_algorithm=sig_alg, 488 cert_sig_alg=sig_alg) 491 signature_algorithm=sig_alg, [all …]
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_misc.h | 1301 unsigned int sig_alg); 2374 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in mbedtls_ssl_sig_alg_is_received() local 2375 if (sig_alg == NULL) { in mbedtls_ssl_sig_alg_is_received() 2379 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in mbedtls_ssl_sig_alg_is_received() 2380 if (*sig_alg == own_sig_alg) { in mbedtls_ssl_sig_alg_is_received() 2388 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported() argument 2390 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported() 2428 const uint16_t sig_alg) in mbedtls_ssl_tls13_sig_alg_is_supported() argument 2430 switch (sig_alg) { in mbedtls_ssl_tls13_sig_alg_is_supported() 2447 sig_alg); in mbedtls_ssl_tls13_sig_alg_is_supported() [all …]
|
D | ssl_tls13_generic.c | 223 mbedtls_pk_type_t sig_alg; in ssl_tls13_parse_certificate_verify() local 269 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify() 284 if (!mbedtls_pk_can_do(&ssl->session_negotiate->peer_cert->pk, sig_alg)) { in ssl_tls13_parse_certificate_verify() 307 if (sig_alg == MBEDTLS_PK_RSASSA_PSS) { in ssl_tls13_parse_certificate_verify() 315 if ((ret = mbedtls_pk_verify_ext(sig_alg, options, in ssl_tls13_parse_certificate_verify() 955 int mbedtls_ssl_tls13_check_sig_alg_cert_key_match(uint16_t sig_alg, in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() argument 966 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 970 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 974 sig_alg == MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512; in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() 981 switch (sig_alg) { in mbedtls_ssl_tls13_check_sig_alg_cert_key_match() [all …]
|
D | ssl_tls13_server.c | 1084 static psa_algorithm_t ssl_tls13_iana_sig_alg_to_psa_alg(uint16_t sig_alg) in ssl_tls13_iana_sig_alg_to_psa_alg() argument 1086 switch (sig_alg) { in ssl_tls13_iana_sig_alg_to_psa_alg() 1119 const uint16_t *sig_alg = ssl->handshake->received_sig_algs; in ssl_tls13_pick_key_cert() local 1133 for (; *sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++) { in ssl_tls13_pick_key_cert() 1134 if (!mbedtls_ssl_sig_alg_is_offered(ssl, *sig_alg)) { in ssl_tls13_pick_key_cert() 1138 if (!mbedtls_ssl_tls13_sig_alg_for_cert_verify_is_supported(*sig_alg)) { in ssl_tls13_pick_key_cert() 1168 mbedtls_ssl_sig_alg_to_str(*sig_alg), in ssl_tls13_pick_key_cert() 1169 *sig_alg)); in ssl_tls13_pick_key_cert() 1171 psa_alg = ssl_tls13_iana_sig_alg_to_psa_alg(*sig_alg); in ssl_tls13_pick_key_cert() 1175 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() [all …]
|
D | ssl_tls12_server.c | 1670 mbedtls_pk_type_t sig_alg = mbedtls_ssl_get_ciphersuite_sig_alg(ciphersuite_info); in ssl_parse_client_hello() local 1671 if (sig_alg != MBEDTLS_PK_NONE) { in ssl_parse_client_hello() 1673 ssl, mbedtls_ssl_sig_from_pk_alg(sig_alg)); in ssl_parse_client_hello() 1678 "%u - should not happen", (unsigned) sig_alg)); in ssl_parse_client_hello() 2491 const uint16_t *sig_alg = mbedtls_ssl_get_sig_algs(ssl); in ssl_write_certificate_request() local 2492 if (sig_alg == NULL) { in ssl_write_certificate_request() 2496 for (; *sig_alg != MBEDTLS_TLS_SIG_NONE; sig_alg++) { in ssl_write_certificate_request() 2497 unsigned char hash = MBEDTLS_BYTE_1(*sig_alg); in ssl_write_certificate_request() 2502 if (!mbedtls_ssl_sig_alg_is_supported(ssl, *sig_alg)) { in ssl_write_certificate_request() 2510 MBEDTLS_PUT_UINT16_BE(*sig_alg, p, sa_len); in ssl_write_certificate_request() [all …]
|
D | oid.c | 473 FN_OID_TYPED_FROM_ASN1(oid_sig_alg_t, sig_alg, oid_sig_alg) 478 sig_alg, 485 sig_alg,
|
D | ssl_tls12_client.c | 2301 uint16_t sig_alg; in ssl_parse_server_key_exchange() local 2320 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_parse_server_key_exchange() 2322 sig_alg, &pk_alg, &md_alg) != 0 && in ssl_parse_server_key_exchange() 2323 !mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg) && in ssl_parse_server_key_exchange() 2324 !mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg)) { in ssl_parse_server_key_exchange() 2492 unsigned char *sig_alg; in ssl_parse_certificate_request() local 2609 sig_alg = buf + mbedtls_ssl_hs_hdr_len(ssl) + 3 + n; in ssl_parse_certificate_request() 2613 sig_alg[i], sig_alg[i + 1])); in ssl_parse_certificate_request()
|
D | ssl_tls.c | 6618 uint16_t sig_alg; in mbedtls_ssl_parse_sig_alg_ext() local 6632 sig_alg = MBEDTLS_GET_UINT16_BE(p, 0); in mbedtls_ssl_parse_sig_alg_ext() 6635 sig_alg, in mbedtls_ssl_parse_sig_alg_ext() 6636 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext() 6639 (!(mbedtls_ssl_sig_alg_is_supported(ssl, sig_alg) && in mbedtls_ssl_parse_sig_alg_ext() 6640 mbedtls_ssl_sig_alg_is_offered(ssl, sig_alg)))) { in mbedtls_ssl_parse_sig_alg_ext() 6646 mbedtls_ssl_sig_alg_to_str(sig_alg))); in mbedtls_ssl_parse_sig_alg_ext() 6649 ssl->handshake->received_sig_algs[common_idx] = sig_alg; in mbedtls_ssl_parse_sig_alg_ext() 9442 unsigned int sig_alg) in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg() argument 9447 if (sig_alg == MBEDTLS_SSL_SIG_ANON) { in mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg() [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | tls13-support.md | 193 and `MBEDTLS_TLS_EXT_SIG_ALG`, `sig_alg` standing for
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_x509parse.data | 2486 X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg) 2494 X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)
|