Home
last modified time | relevance | path

Searched refs:sigalgs (Results 1 – 11 of 11) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dt1_lib.c2149 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2156 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2157 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2158 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2416 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member
2467 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2485 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2495 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb()
2515 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list()
2521 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local
[all …]
/freebsd/crypto/openssh/
H A Dsshkey.c311 sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) in sshkey_match_keyname_to_sigalgs() argument
315 if (sigalgs == NULL || *sigalgs == '\0' || in sshkey_match_keyname_to_sigalgs()
319 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs()
320 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs()
321 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs()
324 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs()
326 sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs()
328 sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs()
330 return match_pattern_list(keyname, sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs()
H A Dkex.c263 char *alg, *oalgs, *algs, *sigalgs; in kex_set_server_sig_algs() local
273 if ((sigalgs = sshkey_alg_list(0, 1, 1, ',')) == NULL) in kex_set_server_sig_algs()
282 if (!kex_has_any_alg(sigalg, sigalgs)) in kex_set_server_sig_algs()
291 free(sigalgs); in kex_set_server_sig_algs()
/freebsd/contrib/wpa/src/crypto/
H A Dtls_openssl.c3266 uint16_t sigalgs[3] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3271 sigalgs[num++] = SSL_SIGN_ECDSA_SECP384R1_SHA384; in tls_set_conn_flags()
3274 sigalgs[num++] = SSL_SIGN_RSA_PSS_RSAE_SHA384; in tls_set_conn_flags()
3278 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3304 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3313 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CONF_cmd.pod103 =item B<-sigalgs> I<algs>
135 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the
136 value set for B<-sigalgs> will be used instead.
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c2403 PACKET sigalgs; in tls_process_certificate_request() local
2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-s_client.pod.in90 [B<-sigalgs> I<sigalglist>]
621 =item B<-sigalgs> I<sigalglist>
H A Dopenssl-s_server.pod.in104 [B<-sigalgs> I<val>]
/freebsd/crypto/openssl/crypto/err/
H A Dopenssl.txt1396 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
/freebsd/crypto/openssl/
H A DNEWS.md621 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
H A DCHANGES.md6352 * ClientHello sigalgs DoS fix