Searched refs:sig_algs (Results 1 – 6 of 6) sorted by relevance
769 const uint16_t *sig_algs; member2357 ssl->handshake->sig_algs != NULL) { in mbedtls_ssl_get_sig_algs()2358 return ssl->handshake->sig_algs; in mbedtls_ssl_get_sig_algs()2361 return ssl->conf->sig_algs; in mbedtls_ssl_get_sig_algs()
1236 ssl->handshake->sig_algs = mbedtls_calloc(1, sig_algs_len + in ssl_handshake_init()1238 if (ssl->handshake->sig_algs == NULL) { in ssl_handshake_init()1242 p = (uint16_t *) ssl->handshake->sig_algs; in ssl_handshake_init()2732 const uint16_t *sig_algs) in mbedtls_ssl_conf_sig_algs() argument2737 conf->sig_algs = sig_algs; in mbedtls_ssl_conf_sig_algs()4770 mbedtls_free((void *) handshake->sig_algs); in mbedtls_ssl_handshake_free()4772 handshake->sig_algs = NULL; in mbedtls_ssl_handshake_free()5804 static int ssl_check_no_sig_alg_duplication(const uint16_t *sig_algs) in ssl_check_no_sig_alg_duplication() argument5809 for (i = 0; sig_algs[i] != MBEDTLS_TLS_SIG_NONE; i++) { in ssl_check_no_sig_alg_duplication()5811 if (sig_algs[i] != sig_algs[j]) { in ssl_check_no_sig_alg_duplication()[all …]
519 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member968 opt.sig_algs = DFL_SIG_ALGS; in main()1240 opt.sig_algs = q; in main()1571 if (opt.sig_algs != NULL) { in main()1572 p = (char *) opt.sig_algs; in main()1980 if (opt.sig_algs != NULL) { in main()
672 const char *sig_algs; /* supported TLS 1.3 signature algorithms */ member1755 opt.sig_algs = DFL_SIG_ALGS; in main()1983 opt.sig_algs = q; in main()2465 if (opt.sig_algs != NULL) { in main()2466 p = (char *) opt.sig_algs; in main()3172 if (opt.sig_algs != NULL) { in main()
1570 const uint16_t *MBEDTLS_PRIVATE(sig_algs); /*!< allowed signature algorithms */3949 const uint16_t *sig_algs);
349 sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))]