Lines Matching refs:sigalgs
1123 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
1353 * If Suite B mode use Suite B sigalgs only, ignore any other
1491 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type
2128 const uint16_t *sigalgs;
2135 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs);
2136 for (i = 0; i < sigalgslen; i++, sigalgs++) {
2137 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs);
2184 /* Given preference and allowed sigalgs set shared sigalgs */
2389 /* Maximum possible number of unique entries in sigalgs array */
2395 uint16_t sigalgs[TLS_MAX_SIGALGCNT];
2446 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2464 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
2474 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) {
2494 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client);
2500 uint16_t *sigalgs;
2502 if ((sigalgs = OPENSSL_malloc(salglen * sizeof(*sigalgs))) == NULL) {
2506 memcpy(sigalgs, psigs, salglen * sizeof(*sigalgs));
2510 c->client_sigalgs = sigalgs;
2514 c->conf_sigalgs = sigalgs;
2523 uint16_t *sigalgs, *sptr;
2528 if ((sigalgs = OPENSSL_malloc((salglen / 2) * sizeof(*sigalgs))) == NULL) {
2532 for (i = 0, sptr = sigalgs; i < salglen; i += 2) {
2552 c->client_sigalgs = sigalgs;
2556 c->conf_sigalgs = sigalgs;
2563 OPENSSL_free(sigalgs);
2583 * otherwise we default to normal sigalgs.
2694 /* If no sigalgs extension use defaults from RFC5246 */
3169 /* Look for a shared sigalgs matching possible certificates */