Searched refs:allow (Results 1 – 25 of 143) sorted by relevance
123456
7 test-2 = 2-verify-custom-allow11 test-6 = 6-noverify-accept-custom-allow68 [2-verify-custom-allow]69 ssl_conf = 2-verify-custom-allow-ssl71 [2-verify-custom-allow-ssl]72 server = 2-verify-custom-allow-server73 client = 2-verify-custom-allow-client75 [2-verify-custom-allow-server]80 [2-verify-custom-allow-client]89 [2-verify-custom-allow-client-extra][all …]
21 test-16 = 16-allow-client-renegotiation499 [16-allow-client-renegotiation]500 ssl_conf = 16-allow-client-renegotiation-ssl502 [16-allow-client-renegotiation-ssl]503 server = 16-allow-client-renegotiation-server504 client = 16-allow-client-renegotiation-client506 [16-allow-client-renegotiation-server]512 [16-allow-client-renegotiation-client]
42 name => "verify-custom-allow",100 name => "noverify-accept-custom-allow",
5 SSL_clear - reset SSL object to allow another connection15 Reset B<ssl> to allow another connection. All settings (method, ciphers,42 SSL_clear() resets the SSL object to allow for another connection. The
21 The OSSL_QUIC_client_thread_method() uses threads to allow for a blocking
22 The primary use case for SSL_handle_events() is to allow an application which uses57 periodically to allow timeout events to be handled. An application can find out
27 currently being compiled, as far as language and compiler versions allow.
52 selection routine or to allow a user interaction to choose the certificate to85 the concept of the callback function (to allow the choice from several
49 multiple utf8Pairs in one regInfo structure, it does not allow multiple certReq.
20 is called whenever TLS key material is generated or received, in order to allow
20 This function can be used for debugging purposes or to allow datagrams to be fed
44 Functions ending in _ex() allow for a library context I<ctx> and property query
20 the buffers have been drained. These functions allow applications to manually
19 L<OSSL_PARAM(3)>. The following utility functions allow the parameters to be
24 for specific data types or other usage, but is exposed to allow greater flexibility
45 Functions ending in _ex() allow for a library context I<ctx> and property query
43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
30 # Minimal CA entry to allow generation of CRLs.
215 Configure the module to not allow short MAC outputs.220 Configure the module to not allow small keys sizes when using HMAC.225 Configure the module to not allow small keys sizes when using KMAC.230 Configure the module to not allow truncated digests to be used with Hash and276 Configure the module to not allow DSA signing (DSA signature verification is281 Configure the module to not allow Triple-DES encryption.287 Configure the module to not allow PKCS#1 version 1.5 padding to be used with299 Configure the module to not allow X9.31 padding to be used when signing with
86 * The objective is to have APIs that allow applications to support any of our104 * We will end up with interfaces that allow other QUIC implementations164 * The internal architecture should allow for the fact that we may want to169 "single" copy allowed is to allow for the implicit copy in an encrypt or decrypt
266 void (*set_plain_alerts)(OSSL_RECORD_LAYER *rl, int allow);
279 …X448 is not approved currently. keygen and keyexchange would also need an indicator if we allow it?310 ECDSA and RSA-PSS Signatures allow use of SHAKE.313 Do we need to check which algorithms allow SHA1 also?315 Test that Deterministic ECDSA does not allow SHAKE (IG C.K Additional Comments 6)323 We should only allow AES. We currently just check the mode.
79 # Minimal CA entry to allow generation of CRLs.
82 * These strings are defined separately to allow them to be parsable.
10 User defined macros allow the programmer to control certain aspects of
Completed in 36 milliseconds