diff options
author | tb <> | 2024-08-28 07:15:04 +0000 |
---|---|---|
committer | tb <> | 2024-08-28 07:15:04 +0000 |
commit | 075c048b99cefdce1245c13c4aa449b28ce8366c (patch) | |
tree | bb2a05a5261bd27ee87b1f4c8d85ebba6042d17d /src/lib/libssl/tls13_client.c | |
parent | a03c40153c8f8e484e8b98ea5a52b87116f9bf5a (diff) | |
download | openbsd-075c048b99cefdce1245c13c4aa449b28ce8366c.tar.gz openbsd-075c048b99cefdce1245c13c4aa449b28ce8366c.tar.bz2 openbsd-075c048b99cefdce1245c13c4aa449b28ce8366c.zip |
Implement X509_get_signature_info()
This is a slightly strange combination of OBJ_find_sigid_algs() and the
security level API necessary because OBJ_find_sigid_algs() on its own
isn't smart enough for the special needs of RSA-PSS and EdDSA.
The API extracts the hash's NID and the pubkey's NID from the certificate's
signatureAlgorithm and invokes special handlers for RSA-PSS and EdDSA
for retrieving the corresponding information. This isn't entirely free
for RSA-PSS, but for now we don't cache this information.
The security bits calculation is a bit hand-wavy, but that's something
that comes along with this sort of numerology.
ok jsing
Diffstat (limited to 'src/lib/libssl/tls13_client.c')
0 files changed, 0 insertions, 0 deletions