Sortix volatile manual
This manual documents Sortix volatile, a development build that has not been officially released. You can instead view this document in the latest official manual.
NAME
X509_get0_signature, X509_REQ_get0_signature, X509_CRL_get0_signature, X509_get0_tbs_sigalg, X509_CRL_get0_tbs_sigalg, X509_get_signature_type, X509_get_signature_nid, X509_REQ_get_signature_nid, X509_CRL_get_signature_nid, X509_get_signature_info — signature informationSYNOPSIS
#include <openssl/x509.h>X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **palg, const X509 *x);
X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig, const X509_ALGOR **palg);
X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig, const X509_ALGOR **palg);
X509_get0_tbs_sigalg(const X509 *x);
X509_CRL_get0_tbs_sigalg(const X509_CRL *crl);
X509_get_signature_type(const X509 *x);
X509_get_signature_nid(const X509 *x);
X509_REQ_get_signature_nid(const X509_REQ *req);
X509_CRL_get_signature_nid(const X509_CRL *crl);
X509_get_signature_info(X509 *x, int *md_nid, int *pkey_nid, int *security_bits, uint32_t *flags);
DESCRIPTION
X509_get0_signature(), X509_REQ_get0_signature(), and X509_CRL_get0_signature() set *psig to the signature and *palg to the signature algorithm of x, req, or crl, respectively. X509_get0_tbs_sigalg() and X509_CRL_get0_tbs_sigalg() return the signature algorithm in the signed portion of x or crl, respectively. The values returned are internal pointers that must not be freed by the caller.- X509_SIG_INFO_VALID
- No error occurred. This flag is set if X509_get_signature_info() returns 1.
- X509_SIG_INFO_TLS
- The signature algorithm is appropriate for use in TLS. For a supported EdDSA algorithm (in LibreSSL this is Ed25519) this flag is always set. For an RSASSA-PSS PSS algorithm this flag is set if the parameters are DER encoded, the digest algorithm is one of SHA256, SHA384, or SHA512, the same digest algorithm is used in the mask generation function, and the salt length is equal to the digest algorithm's output length. For all other signature algorithms this flag is set if the digest algorithm is one of SHA1, SHA256, SHA384, or SHA512.