SSL_aRSA
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
SSL_aRSA,
{ EVP_PKEY_RSA, SSL_aRSA }, /* SSL_PKEY_RSA */
{ EVP_PKEY_RSA_PSS, SSL_aRSA }, /* SSL_PKEY_RSA_PSS_SIGN */
case SSL_aRSA:
{ 0, SSL_TXT_aRSA, NULL, 0, 0, SSL_aRSA },
{ 0, SSL_TXT_RSA, NULL, 0, SSL_kRSA, SSL_aRSA },
SSL_kDHE, SSL_aRSA, SSL_3DES, SSL_SHA1, 0, 0, 0, 0, SSL_HIGH | SSL_FIPS },
{ SSL_aRSA, NID_auth_rsa },
mask_a |= SSL_aRSA;
mask_a |= SSL_aRSA;
mask_a |= SSL_aRSA;
(SSL_aRSA | SSL_aDSS | SSL_aECDSA | SSL_aGOST01 | SSL_aGOST12)
if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS))
if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS))
else if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aRSA)
uint32_t disabled_mask = SSL_aRSA | SSL_aDSS | SSL_aECDSA;
&& test_cert_table(EVP_PKEY_RSA, SSL_aRSA, SSL_PKEY_RSA)