auto hash = Hex::encode(Envoy::Common::Crypto::UtilitySingleton::get().getSha256Digest(buffer));
if (!tls_certificate.has_private_key_provider() && !tls_certificate.has_certificate_chain() &&
case envoy::extensions::transport_sockets::tls::v3::CommonTlsContext::ValidationContextTypeCase::
case envoy::extensions::transport_sockets::tls::v3::CommonTlsContext::ValidationContextTypeCase::
case envoy::extensions::transport_sockets::tls::v3::CommonTlsContext::ValidationContextTypeCase::
signature_algorithms_(RepeatedPtrUtil::join(config.tls_params().signature_algorithms(), ":")),
min_protocol_version_(tlsVersionFromProto(config.tls_params().tls_minimum_protocol_version(),
max_protocol_version_(tlsVersionFromProto(config.tls_params().tls_maximum_protocol_version(),
auto list_or_error = Network::Address::IpList::create(config.key_log().local_address_range());
enforce_rsa_key_usage_(PROTOBUF_GET_WRAPPED_OR_DEFAULT(config, enforce_rsa_key_usage, true)),
creation_status = absl::InvalidArgumentError("SNI names containing NULL-byte are not allowed");
void ClientContextConfigImpl::setSecretUpdateCallback(std::function<absl::Status()> callback) {