Searched refs:valid_flags (Results 1 – 9 of 9) sorted by relevance
8 set(valid_flags) variable14 set(valid_flags "${valid_flags} ${flag}") variable17 set(${varname} "${valid_flags}" PARENT_SCOPE)21 set(valid_flags) variable27 set(valid_flags "${valid_flags} ${flag}") variable30 set(${varname} "${valid_flags}" PARENT_SCOPE)
1258 s->s3->tmp.valid_flags[i] = 0; in tls1_set_server_sigalgs()1277 s->s3->tmp.valid_flags[i] = CERT_PKEY_SIGN; in tls1_set_server_sigalgs()1853 uint32_t *pvalid = s->s3->tmp.valid_flags; in tls1_process_sigalgs()2186 pvalid = s->s3->tmp.valid_flags + idx; in tls1_check_chain()2203 pvalid = s->s3->tmp.valid_flags + idx; in tls1_check_chain()2585 return s->s3->tmp.valid_flags[sig_idx] & CERT_PKEY_VALID ? sig_idx : -1; in tls12_get_cert_sigalg_idx()
1635 uint32_t valid_flags[SSL_PKEY_NUM]; member
3310 uint32_t *pvalid = s->s3->tmp.valid_flags; in ssl_set_masks()
409 resp->valid_flags = EC_FLASH_PROTECT_ALL_NOW; in process_cmd()
1133 const unsigned int valid_flags = LIBEVDEV_READ_FLAG_NORMAL | in libevdev_next_event() local1146 if ((flags & valid_flags) == 0) { in libevdev_next_event()
1358 uint32_t valid_flags; member2852 uint8_t valid_flags; /* which flags are valid */ member
2444 s->s3->tmp.valid_flags[i] = 0; in tls_process_certificate_request()
3341 *) Add new "valid_flags" field to CERT_PKEY structure which determines what3342 the certificate can be used for (if anything). Set valid_flags field