SSL_aECDSA
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
SSL_aECDSA,
if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
&& !(alg_a & SSL_aECDSA)
{ EVP_PKEY_EC, SSL_aECDSA }, /* SSL_PKEY_ECC */
{ EVP_PKEY_ED25519, SSL_aECDSA }, /* SSL_PKEY_ED25519 */
{ EVP_PKEY_ED448, SSL_aECDSA } /* SSL_PKEY_ED448 */
ssl_cipher_apply_rule(0, SSL_kECDHE, SSL_aECDSA, 0, 0, 0, 0, CIPHER_ADD,
case SSL_aECDSA:
{ 0, SSL_TXT_aECDSA, NULL, 0, 0, SSL_aECDSA },
{ 0, SSL_TXT_ECDSA, NULL, 0, 0, SSL_aECDSA },
ctx->disabled_auth_mask |= SSL_aECDSA;
{ SSL_aECDSA, NID_auth_ecdsa },
mask_a |= SSL_aECDSA;
mask_a |= SSL_aECDSA;
mask_a |= SSL_aECDSA;
if (!(mask_a & SSL_aECDSA) && ssl_has_cert(s, SSL_PKEY_ED25519)
mask_a |= SSL_aECDSA;
if (!(mask_a & SSL_aECDSA) && ssl_has_cert(s, SSL_PKEY_ED448)
mask_a |= SSL_aECDSA;
if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aECDSA) {
(SSL_aRSA | SSL_aDSS | SSL_aECDSA | SSL_aGOST01 | SSL_aGOST12)
&& ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) {
|| (alg_a & SSL_aECDSA)
int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aECDSA)
if (clu->amask & SSL_aECDSA) {
uint32_t disabled_mask = SSL_aRSA | SSL_aDSS | SSL_aECDSA;
&& test_cert_table(EVP_PKEY_EC, SSL_aECDSA, SSL_PKEY_ECC)
&& test_cert_table(EVP_PKEY_ED25519, SSL_aECDSA, SSL_PKEY_ED25519)
&& test_cert_table(EVP_PKEY_ED448, SSL_aECDSA, SSL_PKEY_ED448);