| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_lib.c | 775 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 926 * If Suite B mode use Suite B sigalgs only, ignore any other 1050 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type 1598 /* See if sigalgs is recognised and if hash is enabled */ 1669 const uint16_t *sigalgs; local 1676 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); 1677 for (i = 0; i < sigalgslen; i++, sigalgs++) { 1678 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*sigalgs); 1724 /* Given preference and allowed sigalgs set shared sigalgs */ 1934 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon2216 2039 uint16_t *sigalgs; local 2062 uint16_t *sigalgs, *sptr; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_lib.c | 554 /* No provider sigalgs are supported in DTLS, reset after checking. */ 577 /* Ignore unusable sigalgs */ 671 * Reconsider testing retval when legacy sigalgs are also loaded this way. 698 * For now, leave it at this: legacy sigalgs stay in their own 2144 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 2269 /* Append any provider sigalgs not yet handled */ 2525 * If Suite B mode use Suite B sigalgs only, ignore any other 2631 * For provider-based sigalgs we have secbits information available 2731 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type 3403 const uint16_t *sigalgs; local 3677 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon646 3831 uint16_t *sigalgs; local 3852 uint16_t *sigalgs, *sptr; local [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_lib.c | 1144 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 1374 * If Suite B mode use Suite B sigalgs only, ignore any other 1512 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type 2149 const uint16_t *sigalgs; local 2156 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); 2157 for (i = 0; i < sigalgslen; i++, sigalgs++) { 2158 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); 2205 /* Given preference and allowed sigalgs set shared sigalgs */ 2410 /* Maximum possible number of unique entries in sigalgs array * 2416 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon1682 2521 uint16_t *sigalgs; local 2544 uint16_t *sigalgs, *sptr; local [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| kex.c | 265 char *alg, *oalgs, *algs, *sigalgs; local 275 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL) 284 if (!kex_has_any_alg(sigalg, sigalgs)) 293 free(sigalgs);
|
| sshkey.c | 276 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) 280 if (sigalgs == NULL || *sigalgs == '\0' || 284 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || 285 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || 286 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; 289 sigalgs, 0) == 1 || 291 sigalgs, 0) == 1 || 293 sigalgs, 0) == 1; 295 return match_pattern_list(keyname, sigalgs, 0) == 1 [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_openssl.c | 3266 uint16_t sigalgs[3] = { SSL_SIGN_RSA_PKCS1_SHA384 }; local 3271 sigalgs[num++] = SSL_SIGN_ECDSA_SECP384R1_SHA384; 3274 sigalgs[num++] = SSL_SIGN_RSA_PSS_RSAE_SHA384; 3278 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, 3281 "OpenSSL: Failed to set Suite B sigalgs"); 3292 "OpenSSL: Failed to set Suite B sigalgs"); 3304 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; local 3313 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, 3316 "OpenSSL: Failed to set Suite B sigalgs");
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 2522 PACKET sigalgs; local 2524 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { 2533 * with pre-TLS 1.3 and use the regular sigalgs field. 2535 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 2672 PACKET sigalgs; local 2674 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { 2681 * with pre-TLS 1.3 and use the regular sigalgs field. 2683 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 2403 PACKET sigalgs; local 2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { 2412 * with pre-TLS 1.3 and use the regular sigalgs field. 2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
|