Searched refs:sigalgs (Results 1 – 10 of 10) sorted by relevance
| /freebsd/crypto/openssl/ssl/ |
| H A D | t1_lib.c | 3419 const uint16_t *sigalgs; in ssl_set_sig_mask() local 3426 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask() 3427 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask() 3428 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(SSL_CONNECTION_GET_CTX(s), *sigalgs); in ssl_set_sig_mask() 3693 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member 3760 sarg->sigalgs[sarg->sigalgcnt++] = sarg->ctx->sigalg_lookup_cache[i].sigalg; in sig_cb() 3772 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 3792 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 3800 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 3813 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | sshkey.c | 287 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) in sshkey_match_keyname_to_sigalgs() argument 291 if (sigalgs == NULL || *sigalgs == '\0' || in sshkey_match_keyname_to_sigalgs() 295 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 296 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 297 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 300 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 302 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 304 sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 307 sigalgs, 0) == 1 || match_pattern_list( in sshkey_match_keyname_to_sigalgs() 309 sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() [all …]
|
| H A D | kex.c | 259 char *alg, *oalgs, *algs, *sigalgs; in kex_set_server_sig_algs() local 269 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL) in kex_set_server_sig_algs() 278 if (!kex_has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs() 287 free(sigalgs); in kex_set_server_sig_algs()
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | fetching-composite-algorithms.md | 64 known as "sigalgs", but this is really broader than just signature algorithms.
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | tls_openssl.c | 3266 uint16_t sigalgs[3] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3271 sigalgs[num++] = SSL_SIGN_ECDSA_SECP384R1_SHA384; in tls_set_conn_flags() 3274 sigalgs[num++] = SSL_SIGN_RSA_PSS_RSAE_SHA384; in tls_set_conn_flags() 3278 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3304 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3313 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CONF_cmd.pod | 112 =item B<-sigalgs> I<algs> 149 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the 150 value set for B<-sigalgs> will be used instead.
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_clnt.c | 2672 PACKET sigalgs; in tls_process_certificate_request() local 2674 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request() 2683 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
|
| /freebsd/crypto/openssl/crypto/err/ |
| H A D | openssl.txt | 1515 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
|
| /freebsd/crypto/openssl/ |
| H A D | NEWS.md | 1131 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
|
| H A D | CHANGES.md | 8150 * ClientHello sigalgs DoS fix
|