/third_party/node/lib/internal/tls/ |
H A D | secure-context.js | 143 sigalgs, 204 if (sigalgs !== undefined && sigalgs !== null) { 205 validateString(sigalgs, `${name}.sigalgs`); 207 if (sigalgs === '') 208 throw new ERR_INVALID_ARG_VALUE(`${name}.sigalgs`, sigalgs); 210 context.setSigalgs(sigalgs);
|
/third_party/node/test/parallel/ |
H A D | test-tls-set-sigalgs.js | 6 // Test sigalgs: option for TLS. 27 sigalgs: csigalgs 37 sigalgs: ssigalgs 63 // Have shared sigalgs 69 // Do not have shared sigalgs.
|
H A D | test-https-agent-getname.js | 44 sigalgs: 'sigalgs', 53 '"sigalgs":privateKeyIdentifier:privateKeyEngine'
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 1143 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 1373 * If Suite B mode use Suite B sigalgs only, ignore any other in tls12_get_psigalgs() 1511 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type in tls12_check_peer_sigalg() 2148 const uint16_t *sigalgs; in ssl_set_sig_mask() local 2155 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask() 2156 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask() 2157 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask() 2204 /* Given preference and allowed sigalgs set shared sigalgs */ 2409 /* Maximum possible number of unique entries in sigalgs arra 2415 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; global() member 2520 uint16_t *sigalgs; tls1_set_raw_sigalgs() local 2543 uint16_t *sigalgs, *sptr; tls1_set_sigalgs() local [all...] |
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 1123 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */ 1353 * If Suite B mode use Suite B sigalgs only, ignore any other in tls12_get_psigalgs() 1491 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type in tls12_check_peer_sigalg() 2128 const uint16_t *sigalgs; in ssl_set_sig_mask() local 2135 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask() 2136 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask() 2137 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask() 2184 /* Given preference and allowed sigalgs set shared sigalgs */ 2389 /* Maximum possible number of unique entries in sigalgs arra 2395 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; global() member 2500 uint16_t *sigalgs; tls1_set_raw_sigalgs() local 2523 uint16_t *sigalgs, *sptr; tls1_set_sigalgs() local [all...] |
/third_party/node/lib/ |
H A D | _tls_wrap.js | 1427 this.sigalgs = options.sigalgs; 1479 sigalgs: this.sigalgs, 1561 if (options.sigalgs) this.sigalgs = options.sigalgs;
|
H A D | https.js | 293 if (options.sigalgs) 294 name += JSONStringify(options.sigalgs);
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | mod.rs | 1681 pub fn set_sigalgs_list(&mut self, sigalgs: &str) -> Result<(), ErrorStack> { in set_sigalgs_list() 1682 let sigalgs = CString::new(sigalgs).unwrap(); in set_sigalgs_list() 1684 cvt(ffi::SSL_CTX_set1_sigalgs_list(self.as_ptr(), sigalgs.as_ptr()) as c_int) in set_sigalgs_list()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2411 PACKET sigalgs; in tls_process_certificate_request() local 2413 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request() 2420 * with pre-TLS 1.3 and use the regular sigalgs field. in tls_process_certificate_request() 2422 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2403 PACKET sigalgs; in tls_process_certificate_request() local 2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request() 2412 * with pre-TLS 1.3 and use the regular sigalgs field. in tls_process_certificate_request() 2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 3033 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3035 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3038 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags() 3045 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags() 3064 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3073 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3076 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
|
/third_party/node/src/crypto/ |
H A D | crypto_context.cc | 637 const Utf8Value sigalgs(env->isolate(), args[0]); in SetSigalgs() 639 if (!SSL_CTX_set1_sigalgs_list(sc->ctx_.get(), *sigalgs)) in SetSigalgs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl.c | 3133 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3135 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3138 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags() 3145 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags() 3164 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3173 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3176 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
|