Searched refs:sig_algs (Results 1 – 6 of 6) sorted by relevance
769 const uint16_t *sig_algs; member2412 ssl->handshake->sig_algs != NULL) { in mbedtls_ssl_get_sig_algs()2413 return ssl->handshake->sig_algs; in mbedtls_ssl_get_sig_algs()2416 return ssl->conf->sig_algs; in mbedtls_ssl_get_sig_algs()
1236 ssl->handshake->sig_algs = mbedtls_calloc(1, sig_algs_len + in ssl_handshake_init()1238 if (ssl->handshake->sig_algs == NULL) { in ssl_handshake_init()1242 p = (uint16_t *) ssl->handshake->sig_algs; in ssl_handshake_init()2719 const uint16_t *sig_algs) in mbedtls_ssl_conf_sig_algs() argument2724 conf->sig_algs = sig_algs; in mbedtls_ssl_conf_sig_algs()4770 mbedtls_free((void *) handshake->sig_algs); in mbedtls_ssl_handshake_free()4772 handshake->sig_algs = NULL; in mbedtls_ssl_handshake_free()5804 static int ssl_check_no_sig_alg_duplication(const uint16_t *sig_algs) in ssl_check_no_sig_alg_duplication() argument5809 for (i = 0; sig_algs[i] != MBEDTLS_TLS_SIG_NONE; i++) { in ssl_check_no_sig_alg_duplication()5811 if (sig_algs[i] != sig_algs[j]) { in ssl_check_no_sig_alg_duplication()[all …]
522 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member978 opt.sig_algs = DFL_SIG_ALGS; in main()1255 opt.sig_algs = q; in main()1586 if (opt.sig_algs != NULL) { in main()1587 p = (char *) opt.sig_algs; in main()1999 if (opt.sig_algs != NULL) { in main()
672 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member1764 opt.sig_algs = DFL_SIG_ALGS; in main()1992 opt.sig_algs = q; in main()2474 if (opt.sig_algs != NULL) { in main()2475 p = (char *) opt.sig_algs; in main()3181 if (opt.sig_algs != NULL) { in main()
1576 const uint16_t *MBEDTLS_PRIVATE(sig_algs); /*!< allowed signature algorithms */3964 const uint16_t *sig_algs);
349 sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))]