Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 25 of 108) sorted by relevance

12345

/openssl/crypto/bio/
H A Dbio_sock2.c115 int enabled = 0; in BIO_connect() local
116 size_t enabledlen = sizeof(enabled); in BIO_connect()
124 if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { in BIO_connect()
129 int enabled = 0; in BIO_connect()
130 size_t enabledlen = sizeof(enabled); in BIO_connect()
138 if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { in BIO_connect()
367 int enabled = 0; in BIO_listen() local
368 size_t enabledlen = sizeof(enabled); in BIO_listen()
376 if (!(enabled & OSSL_TFO_SERVER_FLAG)) { in BIO_listen()
381 int enabled = 0; in BIO_listen() local
[all …]
/openssl/ssl/quic/
H A Dqlog.c38 size_t enabled[NUM_ENABLED_W]; member
245 int enabled) in ossl_qlog_set_event_type_enabled() argument
250 bit_set(qlog->enabled, event_type, enabled); in ossl_qlog_set_event_type_enabled()
259 return bit_get(qlog->enabled, event_type) != 0; in ossl_qlog_enabled()
636 static void filter_apply(size_t *enabled, int add, in filter_apply() argument
644 bit_set(enabled, QLOG_EVENT_TYPE_##e_cat##_##e_name, add); in filter_apply()
685 size_t cat_l, event_l, enabled[NUM_ENABLED_W]; in ossl_qlog_set_filter() local
688 memcpy(enabled, qlog->enabled, sizeof(enabled)); in ossl_qlog_set_filter()
710 filter_apply(enabled, add, NULL, 0, NULL, 0); in ossl_qlog_set_filter()
723 filter_apply(enabled, add, cat, cat_l, event, event_l); in ossl_qlog_set_filter()
[all …]
/openssl/doc/man3/
H A DOSSL_trace_enabled.pod48 /* check whether a trace category is enabled */
59 If the tracing facility is enabled (see L</Configure Tracing> below),
62 The tracing output is divided into types which are enabled
69 Tracing for a specific category is enabled at run-time if a so-called
96 I<category> is enabled, i.e., if the tracing facility has been statically
97 enabled (see L</Configure Tracing> below) and a trace channel has been
103 The pointer returned is NULL if the category is invalid or not enabled.
190 if tracing for the given I<category> is enabled.
198 only if a specific trace category is enabled.
220 executed only if the trace category is enabled.
[all …]
H A DSSL_CTX_set_ct_validation_callback.pod87 Clients that require SCTs are expected to not have enabled any aNULL ciphers
92 enabled via the built-in or the custom callbacks, by setting a NULL callback.
96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0
101 When SCT processing is enabled, OCSP stapling will be enabled. This is because
109 Certificate Transparency validation cannot be enabled and so a callback cannot
H A DSSL_get_ciphers.pod36 SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for
39 versions, the security level, and the enabled signature algorithms.
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
73 by both the client and the server it does not mean that it is enabled (see the
75 available shared ciphersuites whether or not they are enabled. This is a server
H A DSSL_CTX_set1_cert_comp_preference.pod44 those algorithms enabled in the library will be accepted in B<algs>, unknown
88 saved). As the default list includes all the enabled algorithms, not specifying
89 a preference will allow any enabled algorithm by the peer. The filtered peer's
117 =item * If the specified algorithm B<alg> is not enabled.
119 =item * If B<alg> is 0 and no compression algorithms are enabled.
H A DBIO_sendmmsg.pod74 must be explicitly enabled on a B<BIO> before it can be used; see
76 support for I<local> has not been enabled, processing of that B<BIO_MSG> fails.
82 If I<local> is specified and local address support is enabled, but the operating
89 before local address support was enabled for a receiving socket. These are
116 whether local address support is enabled. To enable local address support, call
159 available or not enabled on the BIO.
205 successfully enabled or disabled and 0 otherwise.
H A DSSL_get0_peer_rpk.pod59 When DANE is enabled via L<SSL_dane_enable(3)>, the configured TLSA records
61 If DANE is not enabled, then no validation will occur.
H A DSSL_set_blocking_mode.pod18 connection SSL object. By default, blocking is enabled, unless the SSL object is
53 SSL_get_blocking_mode() returns 1 if blocking is currently enabled. It returns
H A DSSL_COMP_add_compression_method.pod52 will unconditionally send the list of all compression methods enabled with
62 If enabled during compilation, the OpenSSL library will have the
H A DSSL_CONF_cmd.pod293 once, TLSv1.3 has been negotiated, and early data is enabled on the server. A
477 All protocol versions are enabled by default.
493 If you do use B<Protocol>, make sure that the resulting range of enabled
494 protocols has no "holes", e.g. if TLS 1.0 and TLS 1.2 are both enabled, make
495 sure to also leave TLS 1.1 enabled.
504 Each option is listed below. Where an operation is enabled by default
507 B<SessionTicket>: session ticket support, enabled by default. Inverse of
548 B<EncryptThenMac>: use encrypt-then-mac extension, enabled by
576 B<ExtendedMasterSecret>: use extended master secret extension, enabled by
580 B<CANames>: use CA names extension, enabled by
[all …]
H A DOSSL_QUIC_client_method.pod6 - Provide SSL_METHOD objects for QUIC enabled functions
H A DBIO_s_dgram_pair.pod92 is enabled, BIO_read() will fail if the buffer provided is inadequate to hold
177 enabled, the operation fails; see L<BIO_dgram_set_local_addr_enable(3)>.
200 BIO_dgram_get_no_trunc() returns 1 if no-truncate mode is enabled on a BIO, or 0
201 if no-truncate mode is not enabled or not supported on a given BIO.
H A DSSL_CTX_dane_enable.pod65 (The connection must be associated with a DANE-enabled SSL context).
89 If no TLSA records are added successfully, DANE authentication is not enabled,
96 The return value is negative if DANE verification failed (or was not enabled),
154 Thus, despite the text of RFC7671, name checks are by default enabled for
175 negative value when DANE authentication failed or was not enabled, a
H A DSSL_CTX_flush_sessions.pod29 If enabled, the internal session cache will collect all sessions established
H A DCOMP_CTX_new.pod116 Compression support and compression algorithms must be enabled and built into
127 It is disabled by default, and may be enabled by clearing the
H A DOSSL_trace_set_channel.pod29 enabled individually.
30 Every category can be enabled individually by attaching a so-called
42 enabled for the given category.
H A DSMIME_write_CMS.pod19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be
/openssl/doc/designs/quic-design/
H A Dqlog.md62 qlog must currently be enabled at build time using `enable-unstable-qlog`. If
63 not enabled, `OPENSSL_NO_QLOG` is defined.
67 enabled, each connection causes a file `{ODCID}_{ROLE}.sqlog` to be created in
121 earlier items. In the example above, for example, all event types are enabled,
123 disabled, then the `quic:packet_sent` event is re-enabled.
H A Ddemuxer.md44 - this is optional - enabled only if 0RTT support is enabled by the
/openssl/providers/fips/
H A Dfipsprov.c84 unsigned char enabled; member
98 static void init_fips_option(FIPS_OPTION *opt, int enabled) in init_fips_option() argument
100 opt->enabled = enabled; in init_fips_option()
101 opt->option = enabled ? "1" : "0"; in init_fips_option()
201 if (p != NULL && !OSSL_PARAM_set_int(p, fgbl->fips_##structname.enabled)) \ in fips_get_params()
802 fgbl->fips_##structname.enabled = 1; \ in OSSL_provider_init_int()
804 fgbl->fips_##structname.enabled = 0; \ in OSSL_provider_init_int()
1010 return fgbl->fips_##structname.enabled; \
/openssl/providers/implementations/encode_decode/
H A Dbuild.info14 # encode_key2blob.c is only being included when EC is enabled, because we
/openssl/include/crypto/
H A Ddso_conf.h.in18 # has support compiled in for them. Currently each method is enabled
H A Driscv_arch.def25 * the value is set to 0 and the corresponding capability would not be enabled.
/openssl/doc/man7/
H A Dct.pod17 By default, these checks are disabled. They can be enabled using

Completed in 44 milliseconds

12345