Searched refs:sigalgs (Results 1 – 11 of 11) sorted by relevance
/freebsd/crypto/openssl/ssl/ |
H A D | t1_lib.c | 2149 const uint16_t *sigalgs; in ssl_set_sig_mask() local 2156 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask() 2157 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask() 2158 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask() 2416 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member 2467 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 2485 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 2495 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb() 2515 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list() 2521 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local [all …]
|
/freebsd/crypto/openssh/ |
H A D | sshkey.c | 311 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) in sshkey_match_keyname_to_sigalgs() argument 315 if (sigalgs == NULL || *sigalgs == '\0' || in sshkey_match_keyname_to_sigalgs() 319 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 320 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 321 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 324 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 326 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 328 sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 330 return match_pattern_list(keyname, sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs()
|
H A D | kex.c | 263 char *alg, *oalgs, *algs, *sigalgs; in kex_set_server_sig_algs() local 273 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL) in kex_set_server_sig_algs() 282 if (!kex_has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs() 291 free(sigalgs); in kex_set_server_sig_algs()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 3266 uint16_t sigalgs[3] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3271 sigalgs[num++] = SSL_SIGN_ECDSA_SECP384R1_SHA384; in tls_set_conn_flags() 3274 sigalgs[num++] = SSL_SIGN_RSA_PSS_RSAE_SHA384; in tls_set_conn_flags() 3278 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3304 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3313 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CONF_cmd.pod | 103 =item B<-sigalgs> I<algs> 135 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the 136 value set for B<-sigalgs> will be used instead.
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2403 PACKET sigalgs; in tls_process_certificate_request() local 2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request() 2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 90 [B<-sigalgs> I<sigalglist>] 621 =item B<-sigalgs> I<sigalglist>
|
H A D | openssl-s_server.pod.in | 104 [B<-sigalgs> I<val>]
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.txt | 1396 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
|
/freebsd/crypto/openssl/ |
H A D | NEWS.md | 621 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
|
H A D | CHANGES.md | 6352 * ClientHello sigalgs DoS fix
|