boringssl/crypto/obj
David Benjamin d69d94e7e3 Teach crypto/x509 how to verify an Ed25519 signature.
BUG=187

Change-Id: I5775ce0886041b0c12174a7d665f3af1e8bce511
Reviewed-on: https://boringssl-review.googlesource.com/14505
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2017-04-05 23:35:30 +00:00
..
CMakeLists.txt
obj_dat.h Implement draft-ietf-curdle-pkix-04's serialization. 2017-04-05 23:02:22 +00:00
obj_mac.num Implement draft-ietf-curdle-pkix-04's serialization. 2017-04-05 23:02:22 +00:00
obj_test.cc
obj_xref.c Teach crypto/x509 how to verify an Ed25519 signature. 2017-04-05 23:35:30 +00:00
obj.c Reimplement objects.pl in Go. 2016-12-21 22:14:13 +00:00
objects.go Reimplement objects.pl in Go. 2016-12-21 22:14:13 +00:00
objects.txt Implement draft-ietf-curdle-pkix-04's serialization. 2017-04-05 23:02:22 +00:00
README Reimplement objects.pl in Go. 2016-12-21 22:14:13 +00:00

The files nid.h, obj_mac.num, and obj_dat.h are generated from objects.txt and
obj_mac.num. To regenerate them, run:

    go run objects.go

objects.txt contains the list of all built-in OIDs. It is processed by
objects.go to output obj_mac.num, obj_dat.h, and nid.h.

obj_mac.num is the list of NID values for each OID. This is an input/output
file so NID values are stable across regenerations.

nid.h is the header which defines macros for all the built-in OIDs in C.

obj_dat.h contains the ASN1_OBJECTs corresponding to built-in OIDs themselves
along with lookup tables for search by short name, OID, etc.