protected boolean supportsClientECCCapabilities(int[] namedCurves, short[] ecPointFormats) { // NOTE: BC supports all the current set of point formats so we don't check them here if (namedCurves == null) { /* * RFC 4492 4. A client that proposes ECC cipher suites may choose not to include these * extensions. In this case, the server is free to choose any one of the elliptic curves * or point formats [...]. */ return TlsECCUtils.hasAnySupportedNamedCurves(); } for (int i = 0; i < namedCurves.length; ++i) { int namedCurve = namedCurves[i]; if (NamedCurve.isValid(namedCurve) && (!NamedCurve.refersToASpecificNamedCurve(namedCurve) || TlsECCUtils.isSupportedNamedCurve(namedCurve))) { return true; } } return false; }
protected boolean supportsClientECCCapabilities(int[] namedCurves, short[] ecPointFormats) { // NOTE: BC supports all the current set of point formats so we don't check them here if (namedCurves == null) { /* * RFC 4492 4. A client that proposes ECC cipher suites may choose not to include these * extensions. In this case, the server is free to choose any one of the elliptic curves * or point formats [...]. */ return TlsECCUtils.hasAnySupportedNamedCurves(); } for (int i = 0; i < namedCurves.length; ++i) { int namedCurve = namedCurves[i]; if (NamedCurve.isValid(namedCurve) && (!NamedCurve.refersToASpecificNamedCurve(namedCurve) || TlsECCUtils.isSupportedNamedCurve(namedCurve))) { return true; } } return false; }
if (NamedCurve.isValid(entry) && isSupportedNamedCurve(entry))
if (NamedCurve.isValid(entry) && isSupportedNamedCurve(entry))