/third_party/node/lib/ |
D | _tls_common.js | 154 const sigalgs = options.sigalgs; 155 if (sigalgs !== undefined) { 156 if (typeof sigalgs !== 'string') { 157 throw new ERR_INVALID_ARG_TYPE('options.sigalgs', 'string', sigalgs); 160 if (sigalgs === '') { 161 throw new ERR_INVALID_OPT_VALUE('sigalgs', sigalgs); 164 c.context.setSigalgs(sigalgs);
|
D | _tls_wrap.js | 1287 this.sigalgs = options.sigalgs; 1339 sigalgs: this.sigalgs, property 1421 if (options.sigalgs) this.sigalgs = options.sigalgs;
|
D | https.js | 279 if (options.sigalgs) 280 name += JSONStringify(options.sigalgs);
|
/third_party/openssl/ssl/ |
D | t1_lib.c | 2126 const uint16_t *sigalgs; in ssl_set_sig_mask() local 2133 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask() 2134 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask() 2135 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask() 2393 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member 2444 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 2462 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb() 2472 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb() 2492 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list() 2498 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-set-sigalgs.js | 27 sigalgs: csigalgs property 37 sigalgs: ssigalgs property
|
D | test-https-agent-getname.js | 38 sigalgs: 'sigalgs', property
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | mod.rs | 1670 pub fn set_sigalgs_list(&mut self, sigalgs: &str) -> Result<(), ErrorStack> { in set_sigalgs_list() 1671 let sigalgs = CString::new(sigalgs).unwrap(); in set_sigalgs_list() localVariable 1673 cvt(ffi::SSL_CTX_set1_sigalgs_list(self.as_ptr(), sigalgs.as_ptr()) as c_int) in set_sigalgs_list()
|
/third_party/openssl/doc/man3/ |
D | SSL_CONF_cmd.pod | 103 =item B<-sigalgs> I<algs> 135 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the 136 value set for B<-sigalgs> will be used instead.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_openssl.c | 3033 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3035 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3064 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3073 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
|
/third_party/openssl/ssl/statem/ |
D | statem_clnt.c | 2402 PACKET sigalgs; in tls_process_certificate_request() local 2404 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request() 2413 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_openssl.c | 3106 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 3108 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3137 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3146 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
|
/third_party/openssl/doc/man1/ |
D | openssl-s_client.pod.in | 90 [B<-sigalgs> I<sigalglist>] 610 =item B<-sigalgs> I<sigalglist>
|
D | openssl-s_server.pod.in | 104 [B<-sigalgs> I<val>]
|
/third_party/node/doc/api/ |
D | tls.md | 1583 description: Added `sigalgs` option to override supported signature 1647 * `sigalgs` {string} Colon-separated list of supported signature algorithms.
|
/third_party/node/src/ |
D | node_crypto.cc | 775 const node::Utf8Value sigalgs(env->isolate(), args[0]); in SetSigalgs() local 777 int rv = SSL_CTX_set1_sigalgs_list(sc->ctx_.get(), *sigalgs); in SetSigalgs()
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 1382 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
|
/third_party/openssl/ |
D | NEWS.md | 541 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
|
D | CHANGES.md | 5952 * ClientHello sigalgs DoS fix
|