Lines Matching refs:enabled

173    is enabled (e.g via setting glibc macro _TIME_BITS=64).
714 supported and enabled.
762 be enabled.
887 * Added and enabled by default implicit rejection in RSA PKCS#1 v1.5
1135 * AES-GCM enabled with AVX512 vAES and vPCLMULQDQ.
1219 When CRL checking is enabled (i.e. the application sets the
1329 policy processing is enabled, then a write lock will be taken twice
1332 processing being enabled on a publicly facing server is not considered
1719 The AES constant time code can be enabled, for no assembly
2090 algorithms. This is enabled by including the no-cached-fetch option
2846 The old behaviour can be re-enabled in the CMS code by setting the
3038 This test isn't enabled by default. It can be enabled with the option
3363 A server is only vulnerable if it has TLSv1.2 and renegotiation enabled
3476 It will be enabled by default in 3.0.
3596 The old behaviour can be re-enabled in the CMS code by setting the
3659 This test isn't enabled by default. It can be enabled with the option
3916 * SSL_MODE_AUTO_RETRY is enabled by default. Applications that use blocking
4079 - Keep all global DRBG instances on the secure heap if it is enabled.
4366 The old behaviour can be re-enabled in the CMS code by setting the
5028 enabled with '--debug' builds.
5135 disabled by default. They can be re-enabled using the
5179 Building dynamic engines is enabled by default; to disable, use
5279 compiled with zlib enabled. Applications can still enable compression
5481 always enabled now. If you want to disable the support you should
5693 Access to deprecated functions can be re-enabled by running config with
6163 The old behaviour can be re-enabled in the CMS code by setting the
6778 methods are enabled and ssl2 is disabled the methods return NULL.
7067 client authentication enabled.
7085 authentication enabled may be affected if they use custom verification
7656 * Support for automatic EC temporary key parameter selection. If enabled
7980 methods are enabled and ssl2 is disabled the methods return NULL.
8238 client authentication enabled.
8256 authentication enabled may be affected if they use custom verification
8890 protocols *below* X still enabled. In more practical terms it means
9311 client authentication enabled.
9329 authentication enabled may be affected if they use custom verification
9823 old behaviour can be re-enabled in the CMS code by setting the
9950 * Fix bug in string printing code: if *any* escaping is enabled we must
10194 certificate is validated separately in this case. Only enabled if
10318 enabled when building OpenSSL by providing the extension number
10437 that most recently went from enabled to disabled not only stay
10440 enabled again.
10964 * Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
11018 Until RI is more widely deployed this option is enabled by default.
11161 renegotiation. Renegotiation can be re-enabled by setting
11428 CMS support is disabled by default and must be explicitly enabled
11818 necessarily true if compression is enabled and can result in false
12005 (IDEA remains enabled despite being patented. This is because IDEA
12175 enabled when BN_DEBUG is defined. This makes stricter enforcements on what
13534 * New OPENSSL_assert() macro (similar to assert(), but enabled
13578 supply an oversized master key in Kerberos-enabled versions.
14822 not enabled by default and were not part of the "ALL" ciphersuite
14988 extended allocation function is enabled.
14990 a conventional allocation function is enabled.
15773 processing was enabled when in fact s->s3->in_read_app_data was
15980 the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
16689 (Note: The buggy variant was not enabled in OpenSSL 0.9.5a,
16978 (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the
16980 SSL 2.0 is the only protocol enabled in the server.
17672 the support is automatically enabled. The resulting binaries will
17867 ciphers. Before when the 56bit ciphers were enabled the sorting was
18481 BMPStrings or UTF8Strings yet, they can be enabled using the config file
19775 enable NULL ciphers. They need to be specifically enabled e.g. with