Searched refs:sigalgs (Results 1 – 10 of 10) sorted by relevance
/external/boringssl/src/ssl/ |
D | ssl_privkey.cc | 490 return ctx->cert->sigalgs.CopyFrom(MakeConstSpan(prefs, num_prefs)); in SSL_CTX_set_signing_algorithm_prefs() 498 return ssl->config->cert->sigalgs.CopyFrom(MakeConstSpan(prefs, num_prefs)); in SSL_set_signing_algorithm_prefs() 571 Array<uint16_t> sigalgs; in sigalgs_unique() local 572 if (!sigalgs.CopyFrom(in_sigalgs)) { in sigalgs_unique() 576 qsort(sigalgs.data(), sigalgs.size(), sizeof(uint16_t), compare_uint16_t); in sigalgs_unique() 578 for (size_t i = 1; i < sigalgs.size(); i++) { in sigalgs_unique() 579 if (sigalgs[i - 1] == sigalgs[i]) { in sigalgs_unique() 589 Array<uint16_t> sigalgs; in SSL_CTX_set1_sigalgs() local 590 if (!parse_sigalg_pairs(&sigalgs, values, num_values) || in SSL_CTX_set1_sigalgs() 591 !sigalgs_unique(sigalgs)) { in SSL_CTX_set1_sigalgs() [all …]
|
D | tls13_client.cc | 489 CBS sigalgs, ca; in do_read_certificate_request() local 491 {TLSEXT_TYPE_signature_algorithms, &have_sigalgs, &sigalgs}, in do_read_certificate_request() 507 !CBS_get_u16_length_prefixed(&sigalgs, in do_read_certificate_request()
|
D | ssl_cert.cc | 168 if (!ret->sigalgs.CopyFrom(cert->sigalgs)) { in ssl_cert_dup()
|
D | t1_lib.cc | 3669 Span<const uint16_t> sigalgs = kSignSignatureAlgorithms; in tls1_choose_signature_algorithm() local 3671 sigalgs = MakeConstSpan(&dc->expected_cert_verify_algorithm, 1); in tls1_choose_signature_algorithm() 3672 } else if (!cert->sigalgs.empty()) { in tls1_choose_signature_algorithm() 3673 sigalgs = cert->sigalgs; in tls1_choose_signature_algorithm() 3678 for (uint16_t sigalg : sigalgs) { in tls1_choose_signature_algorithm()
|
D | handshake_server.cc | 442 Span<const uint8_t> sigalgs, sigalgs_cert; in is_probably_jdk11_with_tls13() local 464 sigalgs = body; in is_probably_jdk11_with_tls13() 495 sigalgs != sigalgs_cert || in is_probably_jdk11_with_tls13()
|
D | ssl_lib.cc | 2317 Span<const uint16_t> sigalgs; in SSL_get0_peer_verify_algorithms() local 2319 sigalgs = ssl->s3->hs->peer_sigalgs; in SSL_get0_peer_verify_algorithms() 2321 *out_sigalgs = sigalgs.data(); in SSL_get0_peer_verify_algorithms() 2322 return sigalgs.size(); in SSL_get0_peer_verify_algorithms()
|
D | internal.h | 1825 bool tls1_parse_peer_sigalgs(SSL_HANDSHAKE *hs, const CBS *sigalgs); 1914 Array<uint16_t> sigalgs;
|
D | ssl_test.cc | 4143 static std::string SigAlgsToString(Span<const uint16_t> sigalgs) { in SigAlgsToString() argument 4146 for (uint16_t v : sigalgs) { in SigAlgsToString() 4220 ExpectSigAlgsEqual(test.expected, ctx->cert->sigalgs); in TEST() 4277 ExpectSigAlgsEqual(test.expected, ctx->cert->sigalgs); in TEST()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 2972 uint16_t sigalgs[1] = { SSL_SIGN_RSA_PKCS1_SHA384 }; in tls_set_conn_flags() local 2974 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags() 3003 uint16_t sigalgs[1] = { SSL_SIGN_ECDSA_SECP384R1_SHA384 }; in tls_set_conn_flags() local 3012 if (SSL_CTX_set_verify_algorithm_prefs(conn->ssl_ctx, sigalgs, in tls_set_conn_flags()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 6193 const uint16_t* sigalgs = nullptr; in cert_cb() local 6194 size_t sigalgs_num = SSL_get0_peer_verify_algorithms(ssl, &sigalgs); in cert_cb() 6206 JNI_TRACE("ssl=%p clientCertificateRequested sigAlgs[%zu]=%d", ssl, i, sigalgs[i]); in cert_cb() 6226 sigAlgsRW[i] = sigalgs[i]; in cert_cb()
|