size_t i;
for (i = 0; i < OSSL_NELEM(ssl_cert_info); i++) {
- if (ssl_cert_info[i].nid == nid) {
+ if (ssl_cert_info[i].pkey_nid == nid) {
*pidx = i;
return 1;
}
}
for (i = 0; i < ctx->sigalg_list_len; i++) {
- if (ctx->ssl_cert_info[i].nid == nid) {
+ if (ctx->ssl_cert_info[i].pkey_nid == nid) {
*pidx = SSL_PKEY_NUM + i;
return 1;
}
for (i = 0; i < OSSL_NELEM(ssl_cert_info); i++) {
const SSL_CERT_LOOKUP *tmp_lu = &ssl_cert_info[i];
- if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->nid))
- || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->nid))) {
+ if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->pkey_nid))
+ || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->pkey_nid))) {
if (pidx != NULL)
*pidx = i;
return tmp_lu;
for (i = 0; i < ctx->sigalg_list_len; i++) {
SSL_CERT_LOOKUP *tmp_lu = &(ctx->ssl_cert_info[i]);
- if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->nid))
- || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->nid))) {
+ if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->pkey_nid))
+ || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->pkey_nid))) {
if (pidx != NULL)
*pidx = SSL_PKEY_NUM + i;
return &ctx->ssl_cert_info[i];
return 0;
for(i = 0; i < ctx->sigalg_list_len; i++) {
const char *keytype = inferred_keytype(&ctx->sigalg_list[i]);
- ctx->ssl_cert_info[i].nid = OBJ_txt2nid(keytype);
+ ctx->ssl_cert_info[i].pkey_nid = OBJ_txt2nid(keytype);
ctx->ssl_cert_info[i].amask = SSL_aANY;
}
}
/* If not recognised or not supported by cipher mask it is not suitable */
if (clu == NULL
|| (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0
- || (clu->nid == EVP_PKEY_RSA_PSS
+ || (clu->pkey_nid == EVP_PKEY_RSA_PSS
&& (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0))
return -1;
{
const SSL_CERT_LOOKUP *clu = &ssl_cert_info[idx];
- if (clu->nid == nid && clu->amask == amask)
+ if (clu->pkey_nid == nid && clu->amask == amask)
return 1;
TEST_error("Invalid table entry for certificate type %s, index %zu",
idxname, idx);
- if (clu->nid != nid)
+ if (clu->pkey_nid != nid)
TEST_note("Expected %s, got %s\n", OBJ_nid2sn(nid),
- OBJ_nid2sn(clu->nid));
+ OBJ_nid2sn(clu->pkey_nid));
if (clu->amask != amask)
TEST_note("Expected auth mask 0x%x, got 0x%x\n",
(unsigned int)amask, (unsigned int)clu->amask);