Lines Matching refs:sigalg
983 /* Default sigalg schemes */
1202 static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL *s, uint16_t sigalg)
1211 if (lu->sigalg == sigalg) {
1335 /* Set peer sigalg based key type */
1452 if (lu->sigalg == TLSEXT_SIGALG_ed25519)
1454 else if (lu->sigalg == TLSEXT_SIGALG_ed448)
1501 /* Check the sigalg is consistent with the key OID */
1533 /* Check sigalg matches a permissible Suite B value */
1565 * reasons we have to pass the sigalg as a two byte char array.
1577 /* Store the sigalg the peer uses */
1592 if (s->s3.tmp.sigalg == NULL)
1594 *pnid = s->s3.tmp.sigalg->sig;
1704 if (lu->sigalg == sent_sigs[j]) {
2115 sigalgstr[0] = (lu->sigalg >> 8) & 0xff;
2116 sigalgstr[1] = lu->sigalg & 0xff;
2383 *rsig = (unsigned char)(shsigalgs->sigalg & 0xff);
2385 *rhash = (unsigned char)((shsigalgs->sigalg >> 8) & 0xff);
2446 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2464 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2541 *sptr++ = curr->sigalg;
2571 const SIGALG_LOOKUP *sigalg;
2591 sigalg = use_pc_sigalgs
2594 if (sigalg != NULL && sig_nid == sigalg->sigandhash)
3064 * the peer (if any) as well as whether the hash from the sigalg is usable with
3090 * on the sigalg with which the certificate was signed (by its issuer).
3225 s->s3.tmp.sigalg = NULL;
3311 * If we have no sigalg use defaults
3327 if (lu->sigalg == *sent_sigs
3353 s->s3.tmp.sigalg = lu;