Searched refs:candidate (Results 1 – 9 of 9) sorted by relevance
/ssl/ |
A D | ssl_privkey.cc | 486 for (const auto &candidate : kSignatureAlgorithmNames) { in SSL_get_signature_algorithm_name() local 487 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name() 488 return candidate.name; in SSL_get_signature_algorithm_name() 650 for (const auto &candidate : kSignatureAlgorithmsMapping) { in parse_sigalg_pairs() local 651 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 652 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs() 784 if (strcmp(candidate.name, buf) == 0) { in parse_sigalgs_list() 786 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list() 814 if (candidate.pkey_type == pkey_type && in parse_sigalgs_list() 815 candidate.hash_nid == hash_nid) { in parse_sigalgs_list() [all …]
|
A D | s3_both.cc | 659 const SSL_CIPHER *candidate = SSL_get_cipher_by_value(cipher_suite); in ssl_choose_tls13_cipher() local 660 if (candidate == nullptr || in ssl_choose_tls13_cipher() 661 SSL_CIPHER_get_min_version(candidate) > version || in ssl_choose_tls13_cipher() 662 SSL_CIPHER_get_max_version(candidate) < version) { in ssl_choose_tls13_cipher() 666 if (!ssl_tls13_cipher_meets_policy(SSL_CIPHER_get_protocol_id(candidate), in ssl_choose_tls13_cipher() 671 const CipherScorer::Score candidate_score = scorer->Evaluate(candidate); in ssl_choose_tls13_cipher() 675 best = candidate; in ssl_choose_tls13_cipher()
|
A D | ssl_credential.cc | 86 CBS cbs = CBS(*hs->peer_requested_trust_anchors), candidate; in ssl_credential_matches_requested_issuers() local 88 if (!CBS_get_u8_length_prefixed(&cbs, &candidate) || in ssl_credential_matches_requested_issuers() 89 CBS_len(&candidate) == 0) { in ssl_credential_matches_requested_issuers() 93 if (candidate == Span(cred->trust_anchor_id)) { in ssl_credential_matches_requested_issuers()
|
A D | tls13_both.cc | 523 for (const auto &candidate : ssl->ctx->cert_compression_algs) { in tls13_add_certificate() local 524 if (candidate.alg_id == hs->cert_compression_alg_id) { in tls13_add_certificate() 525 alg = &candidate; in tls13_add_certificate()
|
A D | encrypted_client_hello.cc | 626 const EVP_HPKE_AEAD *candidate = get_ech_aead(aead_id); in select_ech_cipher_suite() local 627 if (kdf_id != EVP_HPKE_HKDF_SHA256 || candidate == nullptr) { in select_ech_cipher_suite() 632 aead = candidate; in select_ech_cipher_suite()
|
A D | extensions.cc | 1457 CBS cbs = list, candidate; in ssl_alpn_list_contains_protocol() local 1459 if (!CBS_get_u8_length_prefixed(&cbs, &candidate)) { in ssl_alpn_list_contains_protocol() 1463 if (candidate == protocol) { in ssl_alpn_list_contains_protocol()
|
/ssl/test/runner/ |
A D | handshake_server.go | 206 for _, candidate := range config.ServerECHConfigs { 207 if candidate.ECHConfig.ConfigID != echOuter.configID { 211 for _, suite := range candidate.ECHConfig.CipherSuites { 221 info = append(info, candidate.ECHConfig.Raw...) 2400 candidate := mutualCipherSuite(supportedCipherSuites, id) 2401 if candidate == nil { 2411 return candidate 2413 if (candidate.flags&suiteECDHE != 0) && !ellipticOk { 2416 if (candidate.flags&suiteECDSA != 0) != ecdsaOk { 2419 if version < VersionTLS12 && candidate.flags&suiteTLS12 != 0 { [all …]
|
A D | key_agreement.go | 733 for _, candidate := range preferredCurves { 734 if isPqGroup(candidate) && version < VersionTLS13 { 739 if slices.Contains(clientHello.supportedCurves, candidate) { 740 curveID = candidate
|
A D | runner.go | 2102 func match(oneOfPatternIfAny []string, noneOfPattern []string, candidate string) (matched bool, err… 2107 didMatch, err = filepath.Match(pattern, candidate) 2116 didMatch, err = filepath.Match(pattern, candidate)
|
Completed in 35 milliseconds