/third_party/mbedtls/library/ |
H A D | pkparse.c | 473 mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params, in pk_get_pk_alg() 485 ret = mbedtls_oid_get_pk_alg(&alg_oid, pk_alg); in pk_get_pk_alg() 490 *pk_alg = MBEDTLS_PK_ECKEY; in pk_get_pk_alg() 503 if (*pk_alg == MBEDTLS_PK_RSA && in pk_get_pk_alg() 523 mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE; in mbedtls_pk_parse_subpubkey() local 534 if ((ret = pk_get_pk_alg(p, end, &pk_alg, &alg_params, &ec_grp_id)) != 0) { in mbedtls_pk_parse_subpubkey() 547 if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) { in mbedtls_pk_parse_subpubkey() 556 if (pk_alg == MBEDTLS_PK_RSA) { in mbedtls_pk_parse_subpubkey() 571 if (pk_alg == MBEDTLS_PK_ECKEY_DH || pk_alg in mbedtls_pk_parse_subpubkey() 471 pk_get_pk_alg(unsigned char **p, const unsigned char *end, mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params, mbedtls_ecp_group_id *ec_grp_id) pk_get_pk_alg() argument 752 mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE; pk_parse_key_pkcs8_unencrypted_der() local [all...] |
H A D | x509write_csr.c | 144 mbedtls_pk_type_t pk_alg; in x509write_csr_der_internal() local 235 pk_alg = MBEDTLS_PK_RSA; in x509write_csr_der_internal() 237 pk_alg = MBEDTLS_PK_ECDSA; in x509write_csr_der_internal() 242 if ((ret = mbedtls_oid_get_oid_by_sig_alg(pk_alg, ctx->md_alg, in x509write_csr_der_internal() 261 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
|
H A D | x509_internal.h | 37 mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, 47 mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, 61 mbedtls_pk_type_t pk_alg);
|
H A D | oid.c | 376 mbedtls_pk_type_t pk_alg; member 489 pk_alg) 494 pk_alg, 503 mbedtls_pk_type_t pk_alg; member 526 FN_OID_TYPED_FROM_ASN1(oid_pk_alg_t, pk_alg, oid_pk_alg) 527 FN_OID_GET_ATTR1(mbedtls_oid_get_pk_alg, oid_pk_alg_t, pk_alg, mbedtls_pk_type_t, pk_alg) 532 pk_alg)
|
H A D | x509write_crt.c | 434 mbedtls_pk_type_t pk_alg; in mbedtls_x509write_crt_der() local 447 pk_alg = MBEDTLS_PK_RSA; in mbedtls_x509write_crt_der() 449 pk_alg = MBEDTLS_PK_ECDSA; in mbedtls_x509write_crt_der() 454 if ((ret = mbedtls_oid_get_oid_by_sig_alg(pk_alg, ctx->md_alg, in mbedtls_x509write_crt_der() 527 if (pk_alg == MBEDTLS_PK_ECDSA) { in mbedtls_x509write_crt_der() 633 sig, sig_len, pk_alg)); in mbedtls_x509write_crt_der()
|
H A D | ssl_tls12_server.c | 692 psa_algorithm_t pk_alg = in ssl_pick_cert() local 697 mbedtls_pk_type_t pk_alg = in ssl_pick_cert() local 711 pk_alg_is_none = (pk_alg == PSA_ALG_NONE); in ssl_pick_cert() 713 pk_alg_is_none = (pk_alg == MBEDTLS_PK_NONE); in ssl_pick_cert() 736 mbedtls_pk_can_do_ext(cur->key, pk_alg, pk_usage)) && in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 740 mbedtls_pk_can_do_ext(cur->key, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 766 if (pk_alg == MBEDTLS_PK_ECDSA && in ssl_pick_cert() 4104 mbedtls_pk_type_t pk_alg; in ssl_parse_certificate_verify() local [all...] |
H A D | x509.c | 718 mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, in mbedtls_x509_get_sig_alg() 727 if ((ret = mbedtls_oid_get_sig_alg(sig_oid, md_alg, pk_alg)) != 0) { in mbedtls_x509_get_sig_alg() 732 if (*pk_alg == MBEDTLS_PK_RSASSA_PSS) { in mbedtls_x509_get_sig_alg() 979 mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, in mbedtls_x509_sig_alg_gets() 996 if (pk_alg == MBEDTLS_PK_RSASSA_PSS) { in mbedtls_x509_sig_alg_gets() 1011 ((void) pk_alg); in mbedtls_x509_sig_alg_gets() 717 mbedtls_x509_get_sig_alg(const mbedtls_x509_buf *sig_oid, const mbedtls_x509_buf *sig_params, mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, void **sig_opts) mbedtls_x509_get_sig_alg() argument 978 mbedtls_x509_sig_alg_gets(char *buf, size_t size, const mbedtls_x509_buf *sig_oid, mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, const void *sig_opts) mbedtls_x509_sig_alg_gets() argument
|
H A D | x509_crt.c | 186 * Check pk_alg against profile 187 * Return 0 if pk_alg is acceptable for this profile, -1 otherwise 190 mbedtls_pk_type_t pk_alg) in x509_profile_check_pk_alg() 192 if (pk_alg == MBEDTLS_PK_NONE) { in x509_profile_check_pk_alg() 196 if ((profile->allowed_pks & MBEDTLS_X509_ID_FLAG(pk_alg)) != 0) { in x509_profile_check_pk_alg() 210 const mbedtls_pk_type_t pk_alg = mbedtls_pk_get_type(pk); in x509_profile_check_key() local 213 if (pk_alg == MBEDTLS_PK_RSA || pk_alg == MBEDTLS_PK_RSASSA_PSS) { in x509_profile_check_key() 223 if (pk_alg == MBEDTLS_PK_ECDSA || in x509_profile_check_key() 224 pk_alg in x509_profile_check_key() 189 x509_profile_check_pk_alg(const mbedtls_x509_crt_profile *profile, mbedtls_pk_type_t pk_alg) x509_profile_check_pk_alg() argument [all...] |
H A D | x509_create.c | 468 mbedtls_pk_type_t pk_alg) in mbedtls_x509_write_sig() 494 if (pk_alg == MBEDTLS_PK_ECDSA) { in mbedtls_x509_write_sig() 465 mbedtls_x509_write_sig(unsigned char **p, unsigned char *start, const char *oid, size_t oid_len, unsigned char *sig, size_t size, mbedtls_pk_type_t pk_alg) mbedtls_x509_write_sig() argument
|
H A D | ssl_tls12_client.c | 2297 mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE; in ssl_parse_server_key_exchange() local 2322 sig_alg, &pk_alg, &md_alg) != 0 && in ssl_parse_server_key_exchange() 2335 if (!mbedtls_pk_can_do(peer_pk, pk_alg)) { in ssl_parse_server_key_exchange() 2391 if (!mbedtls_pk_can_do(peer_pk, pk_alg)) { in ssl_parse_server_key_exchange() 2407 if (pk_alg == MBEDTLS_PK_RSASSA_PSS) { in ssl_parse_server_key_exchange() 2416 ret = mbedtls_pk_verify_ext(pk_alg, &rsassa_pss_options, in ssl_parse_server_key_exchange()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | oid.h | 542 * \param pk_alg place to store public key algorithm 546 int mbedtls_oid_get_pk_alg(const mbedtls_asn1_buf *oid, mbedtls_pk_type_t *pk_alg); 551 * \param pk_alg Public key type to look for 557 int mbedtls_oid_get_oid_by_pk_alg(mbedtls_pk_type_t pk_alg, 613 * \param pk_alg place to store public key algorithm 618 mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg); 634 * \param pk_alg public key algorithm 640 int mbedtls_oid_get_oid_by_sig_alg(mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg,
|
/third_party/mbedtls/tests/include/test/ |
H A D | ssl_helpers.h | 100 int pk_alg; member 436 int pk_alg, 447 * \p pk_alg the algorithm to use, currently only MBEDTLS_PK_RSA and
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 60 opts->pk_alg = MBEDTLS_PK_RSA; in mbedtls_test_init_handshake_options() 592 int pk_alg, in mbedtls_test_ssl_endpoint_certificate_init() 629 if (pk_alg == MBEDTLS_PK_RSA) { in mbedtls_test_ssl_endpoint_certificate_init() 657 if (pk_alg == MBEDTLS_PK_RSA) { in mbedtls_test_ssl_endpoint_certificate_init() 878 ret = mbedtls_test_ssl_endpoint_certificate_init(ep, options->pk_alg, in mbedtls_test_ssl_endpoint_init() 591 mbedtls_test_ssl_endpoint_certificate_init(mbedtls_test_ssl_endpoint *ep, int pk_alg, int opaque_alg, int opaque_alg2, int opaque_usage) mbedtls_test_ssl_endpoint_certificate_init() argument
|