/third_party/openssl/test/ |
H A D | servername_test.c | 36 static int maxversion = TLS1_2_VERSION; variable 38 static int maxversion = 0; variable 111 if (maxversion > 0 in client_setup_sni_before_state() 112 && !TEST_true(SSL_CTX_set_max_proto_version(ctx, maxversion))) in client_setup_sni_before_state() 163 if (maxversion > 0 in client_setup_sni_after_state() 164 && !TEST_true(SSL_CTX_set_max_proto_version(ctx, maxversion))) in client_setup_sni_after_state()
|
H A D | ssl_test.c | 449 int maxversion = TLS1_2_VERSION; in test_handshake() local 451 int maxversion = 0; in test_handshake() 455 if (!TEST_true(SSL_CTX_set_max_proto_version(server_ctx, maxversion)) in test_handshake() 468 maxversion))) in test_handshake() 472 if (!TEST_true(SSL_CTX_set_max_proto_version(client_ctx, maxversion))) in test_handshake() 479 maxversion)) in test_handshake() 486 maxversion))) in test_handshake()
|
/third_party/qrcodegen/rust-no-heap/src/ |
H A D | lib.rs | 145 /// About the slices, letting len = maxversion.buffer_len(): 165 minversion: Version, maxversion: Version, mask: Option<Mask>, boostecl: bool) -> Result<QrCode<'a>,DataTooLong> { in encode_text() 172 let (datacodewordslen, ecl, version) = QrCode::encode_segments_to_codewords(&[], outbuffer, ecl, minversion, maxversion, boostecl)?; 187 let (datacodewordslen, ecl, version) = QrCode::encode_segments_to_codewords(&[seg], outbuffer, ecl, minversion, maxversion, boostecl)?; 202 /// About the slices, letting len = maxversion.buffer_len(): 221 minversion: Version, maxversion: Version, mask: Option<Mask>, boostecl: bool) -> Result<QrCode<'a>,DataTooLong> { in encode_binary() 231 let (datacodewordslen, ecl, version) = QrCode::encode_segments_to_codewords(&[seg], outbuffer, ecl, minversion, maxversion, boostecl)?; 251 mut ecl: QrCodeEcc, minversion: Version, maxversion: Version, boostecl: bool) in encode_segments_to_codewords() 254 assert!(minversion <= maxversion, "Invalid value"); in encode_segments_to_codewords() 255 assert!(outbuffer.len() >= QrCode::get_num_data_codewords(maxversion, ec in encode_segments_to_codewords() [all...] |
/third_party/qrcodegen/python/ |
H A D | qrcodegen.py | 73 def encode_segments(segs: Sequence[QrSegment], ecl: QrCode.Ecc, minversion: int = 1, maxversion: int = 40, mask: int = -1, boostecl: bool = True) -> QrCode: 84 if not (QrCode.MIN_VERSION <= minversion <= maxversion <= QrCode.MAX_VERSION) or not (-1 <= mask <= 7): 88 for version in range(minversion, maxversion + 1): 93 if version >= maxversion: # All versions in the range could not fit the given data 902 - If the encode_segments() function was called with a maxversion argument, then increase
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_cust.c | 174 int maxversion) in custom_ext_add() 187 if (!should_add_extension(s, meth->context, context, maxversion)) in custom_ext_add() 173 custom_ext_add(SSL *s, int context, WPACKET *pkt, X509 *x, size_t chainidx, int maxversion) custom_ext_add() argument
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_cust.c | 174 int maxversion) in custom_ext_add() 187 if (!should_add_extension(s, meth->context, context, maxversion)) in custom_ext_add() 173 custom_ext_add(SSL *s, int context, WPACKET *pkt, X509 *x, size_t chainidx, int maxversion) custom_ext_add() argument
|
/third_party/qrcodegen/rust/src/ |
H A D | lib.rs | 212 minversion: Version, maxversion: Version, mask: Option<Mask>, boostecl: bool) in encode_segments_advanced() 215 assert!(minversion <= maxversion, "Invalid value"); in encode_segments_advanced() 224 } else if version >= maxversion { // All versions in the range could not fit the given data in encode_segments_advanced() 1227 /// - If the `encode_segments_advanced()` function was called, then increase the maxversion
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 525 int tls_valid_group(SSL *s, uint16_t group_id, int minversion, int maxversion, in tls_valid_group() argument 545 ret &= DTLS_VERSION_GE(maxversion, ginfo->mindtls); in tls_valid_group() 554 ret &= (maxversion >= ginfo->mintls); in tls_valid_group() 555 if (ret && okfortls13 != NULL && maxversion == TLS1_3_VERSION) in tls_valid_group()
|
H A D | ssl_local.h | 2719 int maxversion, int isec, int *okfortls13); 2860 size_t chainidx, int maxversion);
|
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 524 int tls_valid_group(SSL *s, uint16_t group_id, int minversion, int maxversion, in tls_valid_group() argument 544 ret &= DTLS_VERSION_GE(maxversion, ginfo->mindtls); in tls_valid_group() 553 ret &= (maxversion >= ginfo->mintls); in tls_valid_group() 554 if (ret && okfortls13 != NULL && maxversion == TLS1_3_VERSION) in tls_valid_group()
|
H A D | ssl_local.h | 2663 int maxversion, int isec, int *okfortls13); 2804 size_t chainidx, int maxversion);
|