Home
last modified time | relevance | path

Searched refs:sigalgs (Results 1 – 18 of 18) sorted by relevance

/third_party/node/lib/
D_tls_common.js154 const sigalgs = options.sigalgs;
155 if (sigalgs !== undefined) {
156 if (typeof sigalgs !== 'string') {
157 throw new ERR_INVALID_ARG_TYPE('options.sigalgs', 'string', sigalgs);
160 if (sigalgs === '') {
161 throw new ERR_INVALID_OPT_VALUE('sigalgs', sigalgs);
164 c.context.setSigalgs(sigalgs);
D_tls_wrap.js1287 this.sigalgs = options.sigalgs;
1339 sigalgs: this.sigalgs, property
1421 if (options.sigalgs) this.sigalgs = options.sigalgs;
Dhttps.js279 if (options.sigalgs)
280 name += JSONStringify(options.sigalgs);
/third_party/openssl/ssl/
Dt1_lib.c2126 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2133 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2134 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2135 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2393 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member
2444 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2462 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2472 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb()
2492 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list()
2498 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local
[all …]
/third_party/node/test/parallel/
Dtest-tls-set-sigalgs.js27 sigalgs: csigalgs property
37 sigalgs: ssigalgs property
Dtest-https-agent-getname.js38 sigalgs: 'sigalgs', property
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Dmod.rs1670 pub fn set_sigalgs_list(&mut self, sigalgs: &str) -> Result<(), ErrorStack> { in set_sigalgs_list()
1671 let sigalgs = CString::new(sigalgs).unwrap(); in set_sigalgs_list() localVariable
1673 cvt(ffi::SSL_CTX_set1_sigalgs_list(self.as_ptr(), sigalgs.as_ptr()) as c_int) in set_sigalgs_list()
/third_party/openssl/doc/man3/
DSSL_CONF_cmd.pod103 =item B<-sigalgs> I<algs>
135 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the
136 value set for B<-sigalgs> will be used instead.
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dtls_openssl.c3033 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3035 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3064 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3073 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
/third_party/openssl/ssl/statem/
Dstatem_clnt.c2402 PACKET sigalgs; in tls_process_certificate_request() local
2404 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2413 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dtls_openssl.c3106 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3108 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3137 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3146 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
/third_party/openssl/doc/man1/
Dopenssl-s_client.pod.in90 [B<-sigalgs> I<sigalglist>]
610 =item B<-sigalgs> I<sigalglist>
Dopenssl-s_server.pod.in104 [B<-sigalgs> I<val>]
/third_party/node/doc/api/
Dtls.md1583 description: Added `sigalgs` option to override supported signature
1647 * `sigalgs` {string} Colon-separated list of supported signature algorithms.
/third_party/node/src/
Dnode_crypto.cc775 const node::Utf8Value sigalgs(env->isolate(), args[0]); in SetSigalgs() local
777 int rv = SSL_CTX_set1_sigalgs_list(sc->ctx_.get(), *sigalgs); in SetSigalgs()
/third_party/openssl/crypto/err/
Dopenssl.txt1382 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
/third_party/openssl/
DNEWS.md541 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
DCHANGES.md5952 * ClientHello sigalgs DoS fix