Searched refs:sig_algs (Results 1 - 6 of 6) sorted by relevance
/third_party/mbedtls/library/ |
H A D | ssl_misc.h | 769 const uint16_t *sig_algs; member 2341 * In future, invocations can be changed to ssl->conf->sig_algs when 2344 * ssl->handshake->sig_algs is either a translation of sig_hashes to IANA TLS 2346 * used, or a pointer to ssl->conf->sig_algs when mbedtls_ssl_conf_sig_algs() has 2358 ssl->MBEDTLS_PRIVATE(handshake)->sig_algs != NULL) { in mbedtls_ssl_get_sig_algs() 2359 return ssl->MBEDTLS_PRIVATE(handshake)->sig_algs; in mbedtls_ssl_get_sig_algs() 2362 return ssl->MBEDTLS_PRIVATE(conf)->MBEDTLS_PRIVATE(sig_algs); in mbedtls_ssl_get_sig_algs()
|
H A D | ssl_tls.c | 1236 ssl->handshake->sig_algs = mbedtls_calloc(1, sig_algs_len + in ssl_handshake_init() 1238 if (ssl->handshake->sig_algs == NULL) { in ssl_handshake_init() 1242 p = (uint16_t *) ssl->handshake->sig_algs; in ssl_handshake_init() 2732 const uint16_t *sig_algs) in mbedtls_ssl_conf_sig_algs() 2737 conf->sig_algs = sig_algs; in mbedtls_ssl_conf_sig_algs() 4770 mbedtls_free((void *) handshake->sig_algs); in mbedtls_ssl_handshake_free() 4772 handshake->sig_algs = NULL; in mbedtls_ssl_handshake_free() 5804 static int ssl_check_no_sig_alg_duplication(const uint16_t *sig_algs) in ssl_check_no_sig_alg_duplication() argument 5809 for (i = 0; sig_algs[ in ssl_check_no_sig_alg_duplication() 2731 mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs) mbedtls_ssl_conf_sig_algs() argument [all...] |
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_client2.c | 270 " sig_algs=a,b,c,d default: \"default\" (library default)\n" \ 519 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member 968 opt.sig_algs = DFL_SIG_ALGS; in main() 1239 else if (strcmp(p, "sig_algs") == 0) { in main() 1240 opt.sig_algs = q; in main() 1571 if (opt.sig_algs != NULL) { in main() 1572 p = (char *) opt.sig_algs; in main() 1980 if (opt.sig_algs != NULL) { in main()
|
H A D | ssl_server2.c | 459 " sig_algs=a,b,c,d default: \"default\" (library default)\n" \ 672 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member 1755 opt.sig_algs = DFL_SIG_ALGS; in main() 1982 else if (strcmp(p, "sig_algs") == 0) { in main() 1983 opt.sig_algs = q; in main() 2465 if (opt.sig_algs != NULL) { in main() 2466 p = (char *) opt.sig_algs; in main() 3172 if (opt.sig_algs != NULL) { in main()
|
/third_party/mbedtls/tests/scripts/ |
H A D | generate_tls13_compat_tests.py | 348 ret += ['sig_algs={sig_algs}'.format( 349 sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))]
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 1570 const uint16_t *MBEDTLS_PRIVATE(sig_algs); /*!< allowed signature algorithms */ 3940 * \param sig_algs List of allowed IANA values for TLS 1.3 signature algorithms, 3949 const uint16_t *sig_algs);
|
Completed in 43 milliseconds