Searched refs:sig_algs (Results 1 – 6 of 6) sorted by relevance
748 const uint16_t *sig_algs; member2252 ssl->handshake->sig_algs != NULL) { in mbedtls_ssl_get_sig_algs()2253 return ssl->handshake->sig_algs; in mbedtls_ssl_get_sig_algs()2256 return ssl->conf->sig_algs; in mbedtls_ssl_get_sig_algs()
1226 ssl->handshake->sig_algs = mbedtls_calloc(1, sig_algs_len + in ssl_handshake_init()1228 if (ssl->handshake->sig_algs == NULL) { in ssl_handshake_init()1232 p = (uint16_t *) ssl->handshake->sig_algs; in ssl_handshake_init()2923 const uint16_t *sig_algs) in mbedtls_ssl_conf_sig_algs() argument2928 conf->sig_algs = sig_algs; in mbedtls_ssl_conf_sig_algs()4103 mbedtls_free((void *) handshake->sig_algs); in mbedtls_ssl_handshake_free()4105 handshake->sig_algs = NULL; in mbedtls_ssl_handshake_free()5159 static int ssl_check_no_sig_alg_duplication(uint16_t *sig_algs) in ssl_check_no_sig_alg_duplication() argument5164 for (i = 0; sig_algs[i] != MBEDTLS_TLS_SIG_NONE; i++) { in ssl_check_no_sig_alg_duplication()5166 if (sig_algs[i] != sig_algs[j]) { in ssl_check_no_sig_alg_duplication()[all …]
530 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member953 opt.sig_algs = DFL_SIG_ALGS; in main()1180 opt.sig_algs = q; in main()1549 if (opt.sig_algs != NULL) { in main()1550 p = (char *) opt.sig_algs; in main()1957 if (opt.sig_algs != NULL) { in main()
677 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member1742 opt.sig_algs = DFL_SIG_ALGS; in main()1925 opt.sig_algs = q; in main()2442 if (opt.sig_algs != NULL) { in main()2443 p = (char *) opt.sig_algs; in main()3149 if (opt.sig_algs != NULL) { in main()
1488 const uint16_t *MBEDTLS_PRIVATE(sig_algs); /*!< allowed signature algorithms */3757 const uint16_t *sig_algs);
350 sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))]