Lines Matching refs:signature

1005 	/* This also works for an ECDSA signature */
1008 PORT_Free(buf->data); /* discard unencoded signature. */
1009 *buf = derSig; /* give caller encoded signature. */
1030 SECItem * signature = NULL;
1066 signature = DSAU_DecodeDerSigToLen(buf, SECKEY_SignatureLen(key));
1067 if (!signature) {
1071 buf = signature;
1116 if (signature) {
1117 SECITEM_FreeItem(signature, PR_TRUE);
4033 * signature.
4037 * does not support SHA-256 as a signature hash, we can either
4501 /* ssl3_TLSSignatureAlgorithmForKeyType returns the TLS 1.2 signature algorithm
4523 /* ssl3_TLSSignatureAlgorithmForCertificate returns the TLS 1.2 signature
4543 /* ssl3_CheckSignatureAndHashAlgorithmConsistency checks that the signature
6800 SECItem signature = {siBuffer, NULL, 0};
6851 rv = ssl3_ConsumeHandshakeVariable(ss, &signature, 2, &b, &length);
6862 /* TLS: send decrypt_error if signature failed. */
6877 rv = ssl3_VerifySignedHashes(&hashes, ss->sec.peerCert, &signature,
6953 rv = ssl3_ConsumeHandshakeVariable(ss, &signature, 2, &b, &length);
6968 /* TLS: send decrypt_error if signature failed. */
6983 rv = ssl3_VerifySignedHashes(&hashes, ss->sec.peerCert, &signature,
7048 * Returns the TLS signature algorithm for the client authentication key and
7125 /* Determine the key's signature algorithm and whether it prefers SHA-1. */
7131 /* Determine the server's hash support for that signature algorithm. */
9110 * signature algorithm.) Prior to TLS 1.2, the MD5/SHA1 combination is always
9111 * used. With TLS 1.2, a client may advertise its support for signature and
10454 * key size based on cert->signatureWrap.signature.data
10455 * (which contains the DER encoded signature). The field
10456 * cert->signatureWrap.signature.len contains the
10457 * length of the encoded signature in bits.
10461 cert->signatureWrap.signature.data[3]*8;
10462 if (cert->signatureWrap.signature.data[4] == 0x00)
10469 ss->sec.authKeyBits = cert->signatureWrap.signature.len;
10773 static const char CHANNEL_ID_MAGIC[] = "TLS Channel ID signature";
10792 * bytes of ECDSA signature. */
10806 unsigned char signature[64];
10818 PK11_SignatureLen(ss->ssl3.channelID) != sizeof(signature)) {
10879 signature_item.data = signature;
10880 signature_item.len = sizeof(signature);
10889 rv = ssl3_AppendHandshake(ss, signature, sizeof(signature));