Lines Matching refs:sigalg
1004 /* Default sigalg schemes */
1223 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg)
1232 if (lu->sigalg == sigalg) {
1356 /* Set peer sigalg based key type */
1473 if (lu->sigalg == TLSEXT_SIGALG_ed25519)
1475 else if (lu->sigalg == TLSEXT_SIGALG_ed448)
1522 /* Check the sigalg is consistent with the key OID */
1554 /* Check sigalg matches a permissible Suite B value */
1586 * reasons we have to pass the sigalg as a two byte char array.
1598 /* Store the sigalg the peer uses */
1613 if (s->s3.tmp.sigalg == NULL)
1615 *pnid = s->s3.tmp.sigalg->sig;
1725 if (lu->sigalg == sent_sigs[j]) {
2136 sigalgstr[0] = (lu->sigalg >> 8) & 0xff;
2137 sigalgstr[1] = lu->sigalg & 0xff;
2404 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff);
2406 *rhash = (unsigned char)((shsigalgs->sigalg >> 8) & 0xff);
2467 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2485 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2562 *sptr++ = curr->sigalg;
2592 const SIGALG_LOOKUP *sigalg;
2612 sigalg = use_pc_sigalgs
2615 if (sigalg != NULL && sig_nid == sigalg->sigandhash)
3085 * the peer (if any) as well as whether the hash from the sigalg is usable with
3111 * on the sigalg with which the certificate was signed (by its issuer).
3246 s->s3.tmp.sigalg = NULL;
3332 * If we have no sigalg use defaults
3348 if (lu->sigalg == *sent_sigs
3374 s->s3.tmp.sigalg = lu;