Searched refs:amask (Results 1 – 5 of 5) sorted by relevance
21 #define test_cert_table(nid, amask, idx) \ argument22 do_test_cert_table(nid, amask, idx, #idx)24 static int do_test_cert_table(int nid, uint32_t amask, size_t idx, in do_test_cert_table() argument29 if (clu->nid == nid && clu->amask == amask) in do_test_cert_table()37 if (clu->amask != amask) in do_test_cert_table()39 (unsigned int)amask, (unsigned int)clu->amask); in do_test_cert_table()
723 ctx->ssl_cert_info[i].amask = SSL_aANY; in ssl_load_sigalgs()1816 if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) { in tls1_get_legacy_sigalg()2740 if ((clu->amask & disabled_mask) != 0 in ssl_set_sig_mask()2742 disabled_mask &= ~clu->amask; in ssl_set_sig_mask()3725 || (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0 in tls12_get_cert_sigalg_idx()
2226 if (cl == NULL || (cl->amask & ctx->disabled_auth_mask) != 0) in ssl_cert_is_disabled()
777 uint32_t amask; /* authmask corresponding to key type */ member
1938 if ((clu->amask & sc->s3.tmp.new_cipher->algorithm_auth) == 0) { in tls_post_process_server_rpk()2124 if ((clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0) { in tls_post_process_server_certificate()3936 if (clu == NULL || (alg_a & clu->amask) == 0) { in ssl3_check_cert_and_algorithm()3956 if (clu->amask & SSL_aECDSA) { in ssl3_check_cert_and_algorithm()
Completed in 43 milliseconds