SSL_aGOST12
SSL_aGOST12 | SSL_aGOST01,
SSL_aGOST12 | SSL_aGOST01,
SSL_aGOST12 | SSL_aGOST01,
SSL_aGOST12,
SSL_aGOST12,
{ NID_id_GostR3410_2012_256, SSL_aGOST12 }, /* SSL_PKEY_GOST12_256 */
{ NID_id_GostR3410_2012_512, SSL_aGOST12 }, /* SSL_PKEY_GOST12_512 */
{ SSL_aGOST12, NID_auth_gost12 },
case (SSL_aGOST12 | SSL_aGOST01):
{ 0, SSL_TXT_aGOST12, NULL, 0, 0, SSL_aGOST12 },
{ 0, SSL_TXT_aGOST, NULL, 0, 0, SSL_aGOST01 | SSL_aGOST12 },
ctx->disabled_auth_mask |= SSL_aGOST01 | SSL_aGOST12;
ctx->disabled_auth_mask |= SSL_aGOST12;
ctx->disabled_auth_mask |= SSL_aGOST12;
if ((ctx->disabled_auth_mask & (SSL_aGOST01 | SSL_aGOST12)) == (SSL_aGOST01 | SSL_aGOST12))
if ((ctx->disabled_auth_mask & SSL_aGOST12) == SSL_aGOST12)
mask_a |= SSL_aGOST12;
mask_a |= SSL_aGOST12;
(SSL_aRSA | SSL_aDSS | SSL_aECDSA | SSL_aGOST01 | SSL_aGOST12)
if ((s->s3.tmp.new_cipher->algorithm_auth & SSL_aGOST12) != 0)
if (alg_a & SSL_aGOST12) {
& (SSL_aGOST01 | SSL_aGOST12))
&& test_cert_table(NID_id_GostR3410_2012_256, SSL_aGOST12,
&& test_cert_table(NID_id_GostR3410_2012_512, SSL_aGOST12,