Home
last modified time | relevance | path

Searched refs:sigalgs (Results 1 – 24 of 24) sorted by relevance

/third_party/node/lib/internal/tls/
Dsecure-context.js143 sigalgs,
179 if (sigalgs !== undefined && sigalgs !== null) {
180 validateString(sigalgs, `${name}.sigalgs`);
182 if (sigalgs === '')
183 throw new ERR_INVALID_ARG_VALUE(`${name}.sigalgs`, sigalgs);
185 context.setSigalgs(sigalgs);
/third_party/node/test/parallel/
Dtest-tls-set-sigalgs.js27 sigalgs: csigalgs property
37 sigalgs: ssigalgs property
Dtest-https-agent-getname.js44 sigalgs: 'sigalgs', property
Dtest-tls-connect-secure-context.js42 sigalgs: null, property
/third_party/openssl/ssl/
Dt1_lib.c2127 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2134 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2135 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2136 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2394 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member
2445 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2463 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2473 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb()
2493 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list()
2499 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local
[all …]
/third_party/node/deps/openssl/openssl/ssl/
Dt1_lib.c2148 const uint16_t *sigalgs; in ssl_set_sig_mask() local
2155 sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); in ssl_set_sig_mask()
2156 for (i = 0; i < sigalgslen; i++, sigalgs++) { in ssl_set_sig_mask()
2157 const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); in ssl_set_sig_mask()
2415 uint16_t sigalgs[TLS_MAX_SIGALGCNT]; member
2466 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2484 sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; in sig_cb()
2494 if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { in sig_cb()
2514 return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); in tls1_set_sigalgs_list()
2520 uint16_t *sigalgs; in tls1_set_raw_sigalgs() local
[all …]
/third_party/node/lib/
D_tls_wrap.js1368 this.sigalgs = options.sigalgs;
1420 sigalgs: this.sigalgs, property
1502 if (options.sigalgs) this.sigalgs = options.sigalgs;
Dhttps.js285 if (options.sigalgs)
286 name += JSONStringify(options.sigalgs);
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Dmod.rs1681 pub fn set_sigalgs_list(&mut self, sigalgs: &str) -> Result<(), ErrorStack> { in set_sigalgs_list()
1682 let sigalgs = CString::new(sigalgs).unwrap(); in set_sigalgs_list() localVariable
1684 cvt(ffi::SSL_CTX_set1_sigalgs_list(self.as_ptr(), sigalgs.as_ptr()) as c_int) in set_sigalgs_list()
/third_party/node/src/crypto/
Dcrypto_context.cc637 const Utf8Value sigalgs(env->isolate(), args[0]); in SetSigalgs() local
639 if (!SSL_CTX_set1_sigalgs_list(sc->ctx_.get(), *sigalgs)) in SetSigalgs()
/third_party/openssl/doc/man3/
DSSL_CONF_cmd.pod103 =item B<-sigalgs> I<algs>
135 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the
136 value set for B<-sigalgs> will be used instead.
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dtls_openssl.c3033 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3035 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3064 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3073 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
/third_party/openssl/ssl/statem/
Dstatem_clnt.c2403 PACKET sigalgs; in tls_process_certificate_request() local
2405 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2414 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/third_party/node/deps/openssl/openssl/ssl/statem/
Dstatem_clnt.c2411 PACKET sigalgs; in tls_process_certificate_request() local
2413 if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { in tls_process_certificate_request()
2422 if (!tls1_save_sigalgs(s, &sigalgs, 0)) { in tls_process_certificate_request()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dtls_openssl.c3106 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local
3108 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
3137 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local
3146 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
/third_party/openssl/doc/man1/
Dopenssl-s_client.pod.in90 [B<-sigalgs> I<sigalglist>]
610 =item B<-sigalgs> I<sigalglist>
Dopenssl-s_server.pod.in104 [B<-sigalgs> I<val>]
/third_party/node/doc/api/
Dtls.md1804 description: Added `sigalgs` option to override supported signature
1868 * `sigalgs` {string} Colon-separated list of supported signature algorithms.
/third_party/node/deps/openssl/openssl/crypto/err/
Dopenssl.txt1393 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
/third_party/openssl/crypto/err/
Dopenssl.txt1392 SSL_R_MISSING_SIGALGS_EXTENSION:112:missing sigalgs extension
/third_party/node/deps/openssl/openssl/
DNEWS.md560 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
DCHANGES.md6113 * ClientHello sigalgs DoS fix
/third_party/openssl/
DNEWS.md554 * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
DCHANGES.md6051 * ClientHello sigalgs DoS fix