Lines Matching refs:context

63    implementation did not have a context getter previously, so the "size" will
77 FIPS configuration OR in code using an algorithm context setter.
81 the approved status can be queried using an algorithm context getter.
468 * Accept longer context for TLS 1.2 exporters
470 While RFC 5705 implies that the maximum length of a context for exporters is
704 the provider context as a parameter.
1026 on the RSA decryption context.
2068 * Added enhanced PKCS#12 APIs which accept a library context.
2450 * Added a library context `OSSL_LIB_CTX` that applications as well as
2451 other libraries can use to form a separate context within which
2836 * Added functionality to create an EVP_PKEY context based on data
2839 that any operation that uses this context will use those strings
8588 * Ensure that the session ID context of an SSL is updated when its
8591 The session ID context is typically set from the parent SSL_CTX,
9014 inability to disable specifically TLS 1.1 and in client context,
10124 context. The operation can be customised via the ctrl mechanism in
10731 the array representation useful in a more general context.
10971 stored in that context to allow for session resumption, even after the
11544 time a new context for that algorithm attempts to select an
11678 stored in that context to allow for session resumption, even after the
11782 context matching (which matters if an application uses a single
11784 out-of-context reuse was forbidden only if SSL_VERIFY_PEER was
11788 restrictions for a given session ID context by starting a session
11789 in a different context.
12233 cipher context. The EVP_CIPHER can provide its own random key generation
13699 * Protect against overlong session ID context length in an encoded
14213 * Make EVP_MD routines take a context pointer instead of just the
18744 the context it uses. This means that if EOF is reached an attempt
18745 is made to pass two EOFs through the context and this causes the
19872 context thus bypassing client cert protection! All software that uses
20116 per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis
20121 temporary keys were not overtaken from the context and the API provided
20542 * rsa_eay.c would attempt to free a NULL context.
20593 * Make Montgomery context stuff explicit in RSA data structure.
20853 ex_data index of the SSL context in the X509_STORE_CTX ex_data.