Searched refs:aead_id (Results 1 – 4 of 4) sorted by relevance
/ssl/ |
A D | encrypted_client_hello.cc | 47 static const EVP_HPKE_AEAD *get_ech_aead(uint16_t aead_id) { in get_ech_aead() argument 50 if (aead_id == EVP_HPKE_AEAD_id(aead)) { in get_ech_aead() 519 uint16_t kdf_id, aead_id; in Init() local 521 !CBS_get_u16(&cipher_suites, &aead_id)) { in Init() 556 uint16_t aead_id, in SetupContext() argument 567 if (kdf_id == supported_kdf_id && aead_id == supported_aead_id) { in SetupContext() 587 assert(get_ech_aead(aead_id) != NULL); in SetupContext() 619 uint16_t kdf_id, aead_id; in select_ech_cipher_suite() local 621 !CBS_get_u16(&cbs, &aead_id)) { in select_ech_cipher_suite() 626 const EVP_HPKE_AEAD *candidate = get_ech_aead(aead_id); in select_ech_cipher_suite() [all …]
|
A D | tls13_server.cc | 803 uint16_t kdf_id, aead_id; in do_read_second_client_hello() local 809 !CBS_get_u16(&ech_body, &aead_id) || in do_read_second_client_hello() 820 aead_id != in do_read_second_client_hello()
|
A D | handshake_server.cc | 413 uint16_t kdf_id, aead_id; in decrypt_ech() local 416 !CBS_get_u16(&body, &aead_id) || // in decrypt_ech() 439 !config->SetupContext(hs->ech_hpke_ctx.get(), kdf_id, aead_id, enc)) { in decrypt_ech()
|
A D | internal.h | 1293 bool SetupContext(EVP_HPKE_CTX *ctx, uint16_t kdf_id, uint16_t aead_id,
|
Completed in 24 milliseconds