Home
last modified time | relevance | path

Searched refs:protection (Results 26 – 34 of 34) sorted by relevance

12

/openssl/doc/man1/
H A Dopenssl-verification-options.pod627 protection" OID. The Netscape certificate type must be absent or should have the
645 protection" OID. The Netscape certificate type must be absent or must have the
H A Dopenssl-s_server.pod.in812 Switches replay protection on or off, respectively. Replay protection is on by
H A Dopenssl-cms.pod.in681 The B<-debug_decrypt> option can be used to disable the MMA attack protection
/openssl/doc/man3/
H A DSSL_CONF_cmd.pod252 Switches replay protection, on or off respectively. With replay protection on,
H A DOSSL_HTTP_transfer.pod153 to connect with TLS protection ultimately to I<server> and I<port>.
H A DPEM_read_bio_PrivateKey.pod411 protection on the encapsulated data. The line beginning I<DEK-Info>
/openssl/
H A DNEWS.md189 * Fixed a fork protection issue ([CVE-2019-1549])
462 * DTLS replay protection DoS ([CVE-2016-2181])
563 * DTLS replay protection DoS ([CVE-2016-2181])
H A DCHANGES.md39 * Add more SRTP protection profiles from RFC8723 and RFC8269.
2199 number generator (RNG). This was intended to include protection in the
2664 * TLSv1.3 replay protection for early data has been implemented. See the
3926 * CRIME protection: disable compression by default, even if OpenSSL is
5295 * DTLS replay protection DoS
6496 * DTLS replay protection DoS
8586 * Add protection against ECDSA timing attacks as mentioned in the paper
9035 protection in servers so again support should be possible
9608 protection is active. ([CVE-2010-0740])
10178 protection in servers so again support should be possible
[all …]
/openssl/include/openssl/
H A Dssl.h.in243 /* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/
394 * Switches off automatic TLSv1.3 anti-replay protection for early data.

Completed in 67 milliseconds

12