Home
last modified time | relevance | path

Searched refs:sigalgs (Results 1 - 13 of 13) sorted by relevance

/third_party/node/lib/internal/tls/
H A Dsecure-context.js143 sigalgs,
204 if (sigalgs !== undefined && sigalgs !== null) {
205 validateString(sigalgs, `${name}.sigalgs`);
207 if (sigalgs === '')
208 throw new ERR_INVALID_ARG_VALUE(`${name}.sigalgs`, sigalgs);
210 context.setSigalgs(sigalgs);
/third_party/node/test/parallel/
H A Dtest-tls-set-sigalgs.js6 // Test sigalgs: option for TLS.
27 sigalgs: csigalgs
37 sigalgs: ssigalgs
63 // Have shared sigalgs
69 // Do not have shared sigalgs.
H A Dtest-https-agent-getname.js44 sigalgs: 'sigalgs',
53 '"sigalgs":privateKeyIdentifier:privateKeyEngine'
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c1143 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
1373 * If Suite B mode use Suite B sigalgs only, ignore any other in tls12_get_psigalgs()
1511 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type in tls12_check_peer_sigalg()
2148 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2155 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2156 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2157 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2204 /* Given preference and allowed sigalgs set shared sigalgs */
2409 /* Maximum possible number of unique entries in sigalgs arra
2415 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; global() member
2520 uint16_t *sigalgs; tls1_set_raw_sigalgs() local
2543 uint16_t *sigalgs, *sptr; tls1_set_sigalgs() local
[all...]
/third_party/openssl/ssl/
H A Dt1_lib.c1123 /* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
1353 * If Suite B mode use Suite B sigalgs only, ignore any other in tls12_get_psigalgs()
1491 * Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type in tls12_check_peer_sigalg()
2128 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2135 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2136 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2137 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2184 /* Given preference and allowed sigalgs set shared sigalgs */
2389 /* Maximum possible number of unique entries in sigalgs arra
2395 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; global() member
2500 uint16_t *sigalgs; tls1_set_raw_sigalgs() local
2523 uint16_t *sigalgs, *sptr; tls1_set_sigalgs() local
[all...]
/third_party/node/lib/
H A D_tls_wrap.js1427 this.sigalgs = options.sigalgs;
1479 sigalgs: this.sigalgs,
1561 if (options.sigalgs) this.sigalgs = options.sigalgs;
H A Dhttps.js293 if (options.sigalgs)
294 name += JSONStringify(options.sigalgs);
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
H A Dmod.rs1681 pub fn set_sigalgs_list(&mut self, sigalgs: &str) -> Result<(), ErrorStack> { in set_sigalgs_list()
1682 let sigalgs = CString::new(sigalgs).unwrap(); in set_sigalgs_list()
1684 cvt(ffi::SSL_CTX_set1_sigalgs_list(self.as_ptr(), sigalgs.as_ptr()) as c_int) in set_sigalgs_list()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_clnt.c2411 PACKET sigalgs; in tls_process_certificate_request() local
2413 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2420 * with pre-TLS 1.3 and use the regular sigalgs field. in tls_process_certificate_request()
2422 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/third_party/openssl/ssl/statem/
H A Dstatem_clnt.c2403 PACKET sigalgs; in tls_process_certificate_request() local
2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2412 * with pre-TLS 1.3 and use the regular sigalgs field. in tls_process_certificate_request()
2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl.c3033 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3035 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3038 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
3045 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
3064 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3073 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3076 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
/third_party/node/src/crypto/
H A Dcrypto_context.cc637 const Utf8Value sigalgs(env->isolate(), args[0]); in SetSigalgs()
639 if (!SSL_CTX_set1_sigalgs_list(sc->ctx_.get(), *sigalgs)) in SetSigalgs()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl.c3133 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3135 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3138 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
3145 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()
3164 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3173 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3176 "OpenSSL: Failed to set Suite B sigalgs"); in tls_set_conn_flags()

Completed in 36 milliseconds