HomeSort by: relevance | last modified time | path
    Searched refs:sigalgs (Results 1 - 9 of 9) sorted by relevancy

  /src/crypto/external/bsd/openssl.old/dist/ssl/
t1_lib.c 775 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
926 * If Suite B mode use Suite B sigalgs only, ignore any other
1050 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type
1598 /* See if sigalgs is recognised and if hash is enabled */
1669 const uint16_t *sigalgs; local
1676 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs);
1677 for (i = 0; i < sigalgslen; i++, sigalgs++) {
1678 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*sigalgs);
1724 /* Given preference and allowed sigalgs set shared sigalgs */
1934 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon2216
2039 uint16_t *sigalgs; local
2062 uint16_t *sigalgs, *sptr; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/
t1_lib.c 554 /* No provider sigalgs are supported in DTLS, reset after checking. */
577 /* Ignore unusable sigalgs */
671 * Reconsider testing retval when legacy sigalgs are also loaded this way.
698 * For now, leave it at this: legacy sigalgs stay in their own
2144 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
2269 /* Append any provider sigalgs not yet handled */
2525 * If Suite B mode use Suite B sigalgs only, ignore any other
2631 * For provider-based sigalgs we have secbits information available
2731 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type
3403 const uint16_t *sigalgs; local
3677 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon646
3831 uint16_t *sigalgs; local
3852 uint16_t *sigalgs, *sptr; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/
t1_lib.c 1144 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
1374 * If Suite B mode use Suite B sigalgs only, ignore any other
1512 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type
2149 const uint16_t *sigalgs; local
2156 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs);
2157 for (i = 0; i < sigalgslen; i++, sigalgs++) {
2158 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs);
2205 /* Given preference and allowed sigalgs set shared sigalgs */
2410 /* Maximum possible number of unique entries in sigalgs array *
2416 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon1682
2521 uint16_t *sigalgs; local
2544 uint16_t *sigalgs, *sptr; local
    [all...]
  /src/crypto/external/bsd/openssh/dist/
kex.c 265 char *alg, *oalgs, *algs, *sigalgs; local
275 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL)
284 if (!kex_has_any_alg(sigalg, sigalgs))
293 free(sigalgs);
sshkey.c 276 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs)
280 if (sigalgs == NULL || *sigalgs == '\0' ||
284 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 ||
285 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 ||
286 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1;
289 sigalgs, 0) == 1 ||
291 sigalgs, 0) == 1 ||
293 sigalgs, 0) == 1;
295 return match_pattern_list(keyname, sigalgs, 0) == 1
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
tls_openssl.c 3266 uint16_t sigalgs[3] = { SSL_SIGN_RSA_PKCS1_SHA384 }; local
3271 sigalgs[num++] = SSL_SIGN_ECDSA_SECP384R1_SHA384;
3274 sigalgs[num++] = SSL_SIGN_RSA_PSS_RSAE_SHA384;
3278 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs,
3281 "OpenSSL: Failed to set Suite B sigalgs");
3292 "OpenSSL: Failed to set Suite B sigalgs");
3304 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; local
3313 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs,
3316 "OpenSSL: Failed to set Suite B sigalgs");
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_clnt.c 2522 PACKET sigalgs; local
2524 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) {
2533 * with pre-TLS 1.3 and use the regular sigalgs field.
2535 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_clnt.c 2672 PACKET sigalgs; local
2674 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) {
2681 * with pre-TLS 1.3 and use the regular sigalgs field.
2683 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_clnt.c 2403 PACKET sigalgs; local
2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) {
2412 * with pre-TLS 1.3 and use the regular sigalgs field.
2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {

Completed in 149 milliseconds