Searched refs:sigalgs (Results 1 - 5 of 5) sorted by relevance
/freebsd-current/crypto/openssl/ssl/ |
H A D | t1_lib.c | 1143 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 1373 * If Suite B mode use Suite B sigalgs only, ignore any other 1511 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type 2148 const uint16_t *sigalgs; local 2155 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); 2156 for (i = 0; i < sigalgslen; i++, sigalgs++) { 2157 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); 2204 /* Given preference and allowed sigalgs set shared sigalgs */ 2409 /* Maximum possible number of unique entries in sigalgs arra 2415 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member in struct:__anon120 2520 uint16_t *sigalgs; local 2543 uint16_t *sigalgs, *sptr; local [all...] |
/freebsd-current/crypto/openssh/ |
H A D | sshkey.c | 296 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) argument 300 if (sigalgs == NULL || *sigalgs == '\0' || 304 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || 305 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || 306 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; 309 sigalgs, 0) == 1 || 311 sigalgs, 0) == 1 || 313 sigalgs, 0) == 1; 315 return match_pattern_list(keyname, sigalgs, [all...] |
H A D | kex.c | 511 char *alg, *oalgs, *algs, *sigalgs; local 521 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL) 530 if (!has_any_alg(sigalg, sigalgs)) 539 free(sigalgs);
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 3101 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; local 3103 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, 3106 "OpenSSL: Failed to set Suite B sigalgs"); 3113 "OpenSSL: Failed to set Suite B sigalgs"); 3132 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; local 3141 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, 3144 "OpenSSL: Failed to set Suite B sigalgs");
|
/freebsd-current/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2403 PACKET sigalgs; local 2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { 2412 * with pre-TLS 1.3 and use the regular sigalgs field. 2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) {
|
Completed in 95 milliseconds