Home
last modified time | relevance | path

Searched refs:candidate (Results 1 – 9 of 9) sorted by relevance

/ssl/
A Dssl_privkey.cc486 for (const auto &candidate : kSignatureAlgorithmNames) { in SSL_get_signature_algorithm_name() local
487 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name()
488 return candidate.name; in SSL_get_signature_algorithm_name()
650 for (const auto &candidate : kSignatureAlgorithmsMapping) { in parse_sigalg_pairs() local
651 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs()
652 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs()
784 if (strcmp(candidate.name, buf) == 0) { in parse_sigalgs_list()
786 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list()
814 if (candidate.pkey_type == pkey_type && in parse_sigalgs_list()
815 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
[all …]
A Ds3_both.cc659 const SSL_CIPHER *candidate = SSL_get_cipher_by_value(cipher_suite); in ssl_choose_tls13_cipher() local
660 if (candidate == nullptr || in ssl_choose_tls13_cipher()
661 SSL_CIPHER_get_min_version(candidate) > version || in ssl_choose_tls13_cipher()
662 SSL_CIPHER_get_max_version(candidate) < version) { in ssl_choose_tls13_cipher()
666 if (!ssl_tls13_cipher_meets_policy(SSL_CIPHER_get_protocol_id(candidate), in ssl_choose_tls13_cipher()
671 const CipherScorer::Score candidate_score = scorer->Evaluate(candidate); in ssl_choose_tls13_cipher()
675 best = candidate; in ssl_choose_tls13_cipher()
A Dssl_credential.cc86 CBS cbs = CBS(*hs->peer_requested_trust_anchors), candidate; in ssl_credential_matches_requested_issuers() local
88 if (!CBS_get_u8_length_prefixed(&cbs, &candidate) || in ssl_credential_matches_requested_issuers()
89 CBS_len(&candidate) == 0) { in ssl_credential_matches_requested_issuers()
93 if (candidate == Span(cred->trust_anchor_id)) { in ssl_credential_matches_requested_issuers()
A Dtls13_both.cc523 for (const auto &candidate : ssl->ctx->cert_compression_algs) { in tls13_add_certificate() local
524 if (candidate.alg_id == hs->cert_compression_alg_id) { in tls13_add_certificate()
525 alg = &candidate; in tls13_add_certificate()
A Dencrypted_client_hello.cc626 const EVP_HPKE_AEAD *candidate = get_ech_aead(aead_id); in select_ech_cipher_suite() local
627 if (kdf_id != EVP_HPKE_HKDF_SHA256 || candidate == nullptr) { in select_ech_cipher_suite()
632 aead = candidate; in select_ech_cipher_suite()
A Dextensions.cc1457 CBS cbs = list, candidate; in ssl_alpn_list_contains_protocol() local
1459 if (!CBS_get_u8_length_prefixed(&cbs, &candidate)) { in ssl_alpn_list_contains_protocol()
1463 if (candidate == protocol) { in ssl_alpn_list_contains_protocol()
/ssl/test/runner/
A Dhandshake_server.go206 for _, candidate := range config.ServerECHConfigs {
207 if candidate.ECHConfig.ConfigID != echOuter.configID {
211 for _, suite := range candidate.ECHConfig.CipherSuites {
221 info = append(info, candidate.ECHConfig.Raw...)
2400 candidate := mutualCipherSuite(supportedCipherSuites, id)
2401 if candidate == nil {
2411 return candidate
2413 if (candidate.flags&suiteECDHE != 0) && !ellipticOk {
2416 if (candidate.flags&suiteECDSA != 0) != ecdsaOk {
2419 if version < VersionTLS12 && candidate.flags&suiteTLS12 != 0 {
[all …]
A Dkey_agreement.go733 for _, candidate := range preferredCurves {
734 if isPqGroup(candidate) && version < VersionTLS13 {
739 if slices.Contains(clientHello.supportedCurves, candidate) {
740 curveID = candidate
A Drunner.go2102 func match(oneOfPatternIfAny []string, noneOfPattern []string, candidate string) (matched bool, err…
2107 didMatch, err = filepath.Match(pattern, candidate)
2116 didMatch, err = filepath.Match(pattern, candidate)

Completed in 61 milliseconds