| /src/crypto/external/apache2/openssl/dist/test/ |
| ssl_cert_table_internal_test.c | 27 const SSL_CERT_LOOKUP *clu = &ssl_cert_info[idx]; local 29 if (clu->pkey_nid == nid && clu->amask == amask) 34 if (clu->pkey_nid != nid) 36 OBJ_nid2sn(clu->pkey_nid)); 37 if (clu->amask != amask) 39 (unsigned int)amask, (unsigned int)clu->amask);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| ssl_cert_table_internal_test.c | 27 const SSL_CERT_LOOKUP *clu = &ssl_cert_info[idx]; local 29 if (clu->nid == nid && clu->amask == amask) 34 if (clu->nid != nid) 36 OBJ_nid2sn(clu->nid)); 37 if (clu->amask != amask) 38 TEST_note("Expected auth mask 0x%x, got 0x%x\n", amask, clu->amask);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ssl_cert_table_internal_test.c | 37 const SSL_CERT_LOOKUP *clu = &ssl_cert_info[idx]; local 39 if (clu->nid == nid && clu->amask == amask) 44 if (clu->nid != nid) 46 OBJ_nid2sn(clu->nid)); 47 if (clu->amask != amask) 48 TEST_note("Expected auth mask 0x%x, got 0x%x\n", amask, clu->amask);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_lib.c | 867 const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(i); local 869 if (clu->amask & s->s3->tmp.new_cipher->algorithm_auth) { 1679 const SSL_CERT_LOOKUP *clu; local 1684 clu = ssl_cert_lookup_by_idx(lu->sig_idx); 1685 if (clu == NULL) 1689 if ((clu->amask & disabled_mask) != 0 1691 disabled_mask &= ~clu->amask; 2583 const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(sig_idx); local 2586 if (clu == NULL 2587 || (clu->amask & s->s3->tmp.new_cipher->algorithm_auth) == [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 1831 const SSL_CERT_LOOKUP *clu; local 1948 if ((clu = ssl_cert_lookup_by_pkey(pkey, &certidx)) == NULL) { 1961 if ((clu->amask & s->s3->tmp.new_cipher->algorithm_auth) == 0) { 3589 const SSL_CERT_LOOKUP *clu; local 3601 clu = ssl_cert_lookup_by_pkey(X509_get0_pubkey(s->session->peer), &idx); 3604 if (clu == NULL || (alg_a & clu->amask) == 0) { 3612 if (clu->amask & SSL_aECDSA) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_lib.c | 2444 const SSL_CERT_LOOKUP *clu local 2447 if (clu == NULL) 2449 if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) { 3413 const SSL_CERT_LOOKUP *clu; local 3418 clu = ssl_cert_lookup_by_idx(lu->sig_idx, 3420 if (clu == NULL) 3424 if ((clu->amask & disabled_mask) != 0 3426 disabled_mask &= ~clu->amask; 4443 const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(sig_idx, local 4447 if (clu == NUL [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_lib.c | 1296 const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(i); local 1298 if (clu == NULL) 1300 if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) { 2159 const SSL_CERT_LOOKUP *clu; local 2164 clu = ssl_cert_lookup_by_idx(lu->sig_idx); 2165 if (clu == NULL) 2169 if ((clu->amask & disabled_mask) != 0 2171 disabled_mask &= ~clu->amask; 3071 const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(sig_idx); local 3074 if (clu == NUL [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 1930 const SSL_CERT_LOOKUP *clu; local 1955 if ((clu = ssl_cert_lookup_by_pkey(sc->session->peer_rpk, &certidx, 1968 if ((clu->amask & sc->s3.tmp.new_cipher->algorithm_auth) == 0) { 2096 const SSL_CERT_LOOKUP *clu; local 2146 if ((clu = ssl_cert_lookup_by_pkey(pkey, &certidx, 2158 if ((clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0) { 3966 const SSL_CERT_LOOKUP *clu; local 3980 clu = ssl_cert_lookup_by_pkey(pkey, &idx, SSL_CONNECTION_GET_CTX(s)); 3983 if (clu == NULL || (alg_a & clu->amask) == 0) [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 1864 const SSL_CERT_LOOKUP *clu; local 1909 if ((clu = ssl_cert_lookup_by_pkey(pkey, &certidx)) == NULL) { 1919 if ((clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0) { 3540 const SSL_CERT_LOOKUP *clu; local 3552 clu = ssl_cert_lookup_by_pkey(X509_get0_pubkey(s->session->peer), &idx); 3555 if (clu == NULL || (alg_a & clu->amask) == 0) { 3560 if (clu->amask & SSL_aECDSA) {
|