/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | common-cert-key-exchange.h | 37 #define try_x509(name, client_prio, client_kx, server_sign_algo, client_sign_algo) \ argument 38 try_with_key(name, client_prio, client_kx, server_sign_algo, client_sign_algo, \ 41 #define try_rawpk(name, client_prio, client_kx, server_sign_algo, client_sign_algo) \ argument 42 try_with_key(name, client_prio, client_kx, server_sign_algo, client_sign_algo, \ 45 #define try_x509_ks(name, client_prio, client_kx, group) \ argument 50 try_with_key(name, client_prio, client_kx, server_sign_algo, client_sign_algo, \ 54 try_with_key(name, client_prio, client_kx, server_sign_algo, client_sign_algo, \ 90 return try_with_key_ks(name, client_prio, client_kx, server_sign_algo, client_sign_algo, in try_with_key() 101 #define dtls_try(name, client_prio, client_kx, server_sign_algo, client_sign_algo) \ argument 102 dtls_try_with_key(name, client_prio, client_kx, server_sign_algo, client_sign_algo, \ [all …]
|
H A D | tls12-anon-upgrade.c | 148 static void try(const char *client_prio, gnutls_kx_algorithm_t client_kx) in try() argument 237 if (gnutls_kx_get(client) != client_kx) { in try() 239 gnutls_kx_get_name(client_kx)); in try()
|
H A D | common-cert-key-exchange.c | 232 void try_with_key_ks(const char *name, const char *client_prio, gnutls_kx_algorithm_t client_kx, in try_with_key_ks() argument 368 if (gnutls_kx_get(client) != client_kx) { in try_with_key_ks() 370 gnutls_kx_get_name(client_kx)); in try_with_key_ks() 443 …d dtls_try_with_key_mtu(const char *name, const char *client_prio, gnutls_kx_algorithm_t client_kx, in dtls_try_with_key_mtu() argument 556 if (gnutls_kx_get(client) != client_kx) { in dtls_try_with_key_mtu() 558 gnutls_kx_get_name(client_kx)); in dtls_try_with_key_mtu()
|
H A D | tls-neg-ext-key.c | 135 gnutls_kx_algorithm_t client_kx, in try_with_key() argument 225 if (gnutls_kx_get(client) != client_kx) { in try_with_key() 227 gnutls_kx_get_name(client_kx)); in try_with_key()
|
H A D | tls-neg-ext4-key.c | 183 gnutls_kx_algorithm_t client_kx, in try_with_key() argument 271 if (gnutls_kx_get(client) != client_kx) { in try_with_key() 273 gnutls_kx_get_name(client_kx)); in try_with_key()
|
/dports/security/gnutls/gnutls-3.6.16/tests/pkcs11/ |
H A D | tls-neg-pkcs11-key.c | 130 gnutls_kx_algorithm_t client_kx, in try_with_key() argument 215 if (gnutls_kx_get(client) != client_kx) { in try_with_key() 217 gnutls_kx_get_name(client_kx)); in try_with_key()
|
/dports/net/routinator/routinator-0.10.2/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/www/ffsend/ffsend-ccd489ce2e75b91c0f17fbf13dbd91fe84f5ad98/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/net/krill/krill-0.9.4/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/dns/doh-proxy/doh-proxy-0.9.2/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/www/xh/xh-0.14.1/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/textproc/angle-grinder/angle-grinder-0.18.0/cargo-crates/rustls-0.18.1/src/server/ |
H A D | tls12.rs | 108 …let client_kx = require_handshake_msg!(m, HandshakeType::ClientKeyExchange, HandshakePayload::Clie… in handle() localVariable 114 if !kx.check_client_params(&client_kx.0) { in handle() 119 let kxd = kx.server_complete(&client_kx.0) in handle()
|
/dports/www/miniserve/miniserve-0.18.0/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/devel/py-maturin/maturin-0.11.3/cargo-crates/rustls-0.19.1/src/server/ |
H A D | tls12.rs | 128 let client_kx = require_handshake_msg!( in handle() localVariable 140 if !kx.check_client_params(&client_kx.0) { in handle() 147 .server_complete(&client_kx.0) in handle()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/rustls-0.17.0/src/server/ |
H A D | tls12.rs | 116 let client_kx = extract_handshake!(m, HandshakePayload::ClientKeyExchange).unwrap(); in handle() localVariable 122 if !kx.check_client_params(&client_kx.0) { in handle() 127 let kxd = kx.server_complete(&client_kx.0) in handle()
|
/dports/security/rustscan/RustScan-2.0.1/cargo-crates/rustls-0.17.0/src/server/ |
H A D | tls12.rs | 116 let client_kx = extract_handshake!(m, HandshakePayload::ClientKeyExchange).unwrap(); in handle() localVariable 122 if !kx.check_client_params(&client_kx.0) { in handle() 127 let kxd = kx.server_complete(&client_kx.0) in handle()
|
/dports/games/abstreet/abstreet-0.2.9-49-g74aca40c0/cargo-crates/rustls-0.17.0/src/server/ |
H A D | tls12.rs | 116 let client_kx = extract_handshake!(m, HandshakePayload::ClientKeyExchange).unwrap(); in handle() localVariable 122 if !kx.check_client_params(&client_kx.0) { in handle() 127 let kxd = kx.server_complete(&client_kx.0) in handle()
|
/dports/www/zola/zola-0.15.2/cargo-crates/rustls-0.20.2/src/server/ |
H A D | tls12.rs | 581 let client_kx = require_handshake_msg!( 591 tls12::decode_ecdh_params::<ClientECDHParams>(&mut cx.common, &client_kx.0)?;
|
/dports/audio/ncspot/ncspot-0.9.3/cargo-crates/rustls-0.20.2/src/server/ |
H A D | tls12.rs | 581 let client_kx = require_handshake_msg!( 591 tls12::decode_ecdh_params::<ClientECDHParams>(&mut cx.common, &client_kx.0)?;
|