Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 25 of 72) sorted by relevance

123

/openssl-master/doc/man3/
A DOSSL_trace_enabled.pod41 /* check whether a trace category is enabled */
52 If tracing is enabled (see L</NOTES> below), these functions are used to
55 The tracing output is divided into types which are enabled
62 Tracing for a specific category is enabled if a so called
89 I<category> is enabled.
173 only if a specific trace category is enabled.
192 executed only if the trace category is enabled.
274 operational and enabled, otherwise 0.
276 OSSL_trace_begin() returns a B<BIO> pointer if the given I<type> is enabled,
A DSSL_CTX_set_ct_validation_callback.pod87 Clients that require SCTs are expected to not have enabled any aNULL ciphers
92 enabled via the built-in or the custom callbacks, by setting a NULL callback.
96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0
101 When SCT processing is enabled, OCSP stapling will be enabled. This is because
109 Certificate Transparency validation cannot be enabled and so a callback cannot
A DSSL_get_ciphers.pod36 SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for
39 versions, the security level, and the enabled signature algorithms.
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
73 by both the client and the server it does not mean that it is enabled (see the
75 available shared ciphersuites whether or not they are enabled. This is a server
A DSSL_COMP_add_compression_method.pod52 will unconditionally send the list of all compression methods enabled with
62 If enabled during compilation, the OpenSSL library will have the
A DSSL_CONF_cmd.pod254 once, TLSv1.3 has been negotiated, and early data is enabled on the server. A
429 All protocol versions are enabled by default.
445 If you do use B<Protocol>, make sure that the resulting range of enabled
446 protocols has no "holes", e.g. if TLS 1.0 and TLS 1.2 are both enabled, make
447 sure to also leave TLS 1.1 enabled.
456 Each option is listed below. Where an operation is enabled by default
459 B<SessionTicket>: session ticket support, enabled by default. Inverse of
463 B<Compression>: SSL/TLS compression support, enabled by default. Inverse
501 B<EncryptThenMac>: use encrypt-then-mac extension, enabled by
524 B<ExtendedMasterSecret>: use extended master secret extension, enabled by
[all …]
A DSSL_CTX_flush_sessions.pod20 If enabled, the internal session cache will collect all sessions established
A DSSL_CTX_dane_enable.pod65 (The connection must be associated with a DANE-enabled SSL context).
89 If no TLSA records are added successfully, DANE authentication is not enabled,
96 The return value is negative if DANE verification failed (or was not enabled),
154 Thus, despite the text of RFC7671, name checks are by default enabled for
175 negative value when DANE authentication failed or was not enabled, a
A DCMS_verify.pod45 are used as untrusted CAs. If CRL checking is enabled in B<store> any internal
61 If B<CMS_NOCRL> is set and CRL checking is enabled in B<store> then any
A DSMIME_write_CMS.pod19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be
A DSMIME_write_PKCS7.pod19 structure. If streaming is enabled then the content must be supplied in the
A DSMIME_write_ASN1.pod27 structure (either CMS_ContentInfo or PKCS7). If streaming is enabled then the
A DOSSL_trace_set_channel.pod29 enabled individually.
30 Every category can be enabled individually by attaching a so called
A DSSL_CTX_set1_sigalgs.pod63 in a certificate request message if client authentication is enabled,
A DX509_STORE_CTX_get_error.pod278 occurs if policy processing is enabled.
323 happen if extended CRL checking is enabled.
390 DANE TLSA authentication is enabled, but no TLSA records matched the
A DSSL_set1_host.pod62 enabled.
/openssl-master/providers/implementations/encode_decode/
A Dbuild.info14 # encode_key2blob.c is only being included when EC is enabled, because we
/openssl-master/include/crypto/
A Ddso_conf.h.in18 # has support compiled in for them. Currently each method is enabled
/openssl-master/doc/man7/
A Dct.pod17 By default, these checks are disabled. They can be enabled using
A DOSSL_PROVIDER-legacy.pod57 Not all of these symmetric cipher algorithms are enabled by default.
A Dssl.pod20 TLS/SSL enabled connections (see L<SSL_CTX_new(3)>).
/openssl-master/test/ssl-tests/
A D28-seclevel.cnf.in37 # The Ed448 signature algorithm will not be enabled.
/openssl-master/doc/man1/
A Dopenssl-ciphers.pod.in51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
177 The ciphers included in B<ALL>, but not enabled by default. Currently
185 All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled
191 The cipher suites not enabled by B<ALL>, currently B<eNULL>.
212 encryption at all and are a security risk they are not enabled via either the
794 The B<-stdname> is only available if OpenSSL is built with tracing enabled
/openssl-master/
A DREADME-FIPS.md18 If the FIPS provider is enabled, it gets installed automatically during the
/openssl-master/test/
A DREADME-external.md51 OpenSSL must be built with external tests enabled:
/openssl-master/doc/internal/man3/
A Dossl_cmp_print_log.pod49 If the trace API if enabled the function uses it, prepending the function name,

Completed in 34 milliseconds

123