/openssl/doc/internal/man3/ |
H A D | ossl_cmp_hdr_init.pod | 77 This may be useful to allow end entities to correct/check their local time for
|
H A D | OSSL_METHOD_STORE.pod | 67 I<ctx> to allow access to the required underlying property data.
|
H A D | ossl_rcu_lock_new.pod | 39 Read-Copy-Update (RCU) locks, which allow for always nonblocking read paths.
|
/openssl/doc/designs/ |
H A D | handling-some-max-defines.md | 47 EVP_DigestFinal_ex() - this is actually documented to allow larger output
|
/openssl/doc/man3/ |
H A D | EVP_SignInit.pod | 78 provider does not allow to duplicate contexts EVP_SignFinal() will
|
H A D | OSSL_ALGORITHM.pod | 43 Multiple names / identities allow a specific algorithm implementation to be
|
H A D | SSL_CTX_set_info_callback.pod | 105 handshake is paused to allow the exchange of early data.
|
H A D | EVP_PKEY_verify.pod | 133 Other algorithms allow the signature to be specified late. 134 To allow either way (which may depend on the application's flow of input), the
|
H A D | SSL_CTX_sess_set_get_cb.pod | 52 In order to allow external session caching, synchronization with the internal
|
H A D | SSL_CTX_set1_cert_comp_preference.pod | 89 a preference will allow any enabled algorithm by the peer. The filtered peer's
|
H A D | SSL_CTX_set_mode.pod | 116 enables this behaviour to allow interoperability with such broken
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 68 sufficient to allow the connection to continue.
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 110 all circumstances because this will allow verification to succeed no matter
|
H A D | SSL_CTX_set_client_hello_cb.pod | 91 allow the server to examine the server name indication extension provided
|
/openssl/doc/designs/quic-design/ |
H A D | dgram-api.md | 5 eventual BIO_dgram_mem) to support APIs which allow multiple datagrams to be 307 One option would be to allow the user to set a callback on BIO_dgram it can use 328 extra call to allow a buffer to be pushed back into the BIO_dgram's internal 374 destination, for example, and by separating these we allow the possibility of
|
H A D | stream-receive-buffers.md | 48 to allow storing `length` bytes of quic stream data before it is read by
|
/openssl/ssl/ |
H A D | t1_lib.c | 2718 const uint16_t *allow, size_t allowlen) in tls12_shared_sigalgs() argument 2729 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) { in tls12_shared_sigalgs() 2744 const uint16_t *pref, *allow, *conf; in tls1_set_shared_sigalgs() local 2766 allow = s->s3.tmp.peer_sigalgs; in tls1_set_shared_sigalgs() 2769 allow = conf; in tls1_set_shared_sigalgs() 2774 nmatch = tls12_shared_sigalgs(s, NULL, pref, preflen, allow, allowlen); in tls1_set_shared_sigalgs() 2778 nmatch = tls12_shared_sigalgs(s, salgs, pref, preflen, allow, allowlen); in tls1_set_shared_sigalgs()
|
/openssl/doc/man1/ |
H A D | openssl-pkcs12.pod.in | 321 "export grade" software will only allow 512 bit RSA keys to be used for 330 These options allow the algorithm used to encrypt the private key and 425 The B<-keypbe> and B<-certpbe> algorithms allow the precise encryption
|
H A D | openssl-enc.pod.in | 49 The symmetric cipher commands allow data to be encrypted or decrypted 308 exposing AEAD modes is too great to allow. These key/iv/nonce 322 The '*-wrap-pad' ciphers allow any input length.
|
/openssl/include/openssl/ |
H A D | err.h.in | 178 * A system error packs like this (we follow POSIX and only allow positive 225 * As expressed above, RFLAGS and REASON overlap by one bit to allow
|
/openssl/ |
H A D | NEWS.md | 148 * Added APIs to allow configuring the negotiated idle timeout for QUIC 149 connections, and to allow determining the number of additional streams 152 * Added APIs to allow disabling implicit QUIC event processing for QUIC SSL 155 * Added APIs to allow querying the size and utilisation of a QUIC stream's 173 * The EVP_PKEY_fromdata function has been augmented to allow for the 1253 * Only allow one SGC handshake restart for SSL/TLS ([CVE-2011-4619]) 1599 * SSL/TLS: allow optional cipher choice according to server's preference. 1600 * SSL/TLS: allow server to explicitly set new session ids. 1603 * SSL/TLS: allow more precise control of renegotiations and sessions. 1742 * Options to allow passwords to be obtained from various sources [all …]
|
H A D | CHANGES.md | 4055 now allow empty (zero character) pass phrases. 4656 now allow empty (zero character) pass phrases. 6441 now allow empty (zero character) pass phrases. 10140 to verify utility to allow additional CRLs to be included. 16176 to handle SGC did not allow these large messages. 16216 to allow the necessary settings. 17120 to allow the various flags to be set. 19167 for example allow memory BIOs to contain config info. 19869 allow session reuse! A fuller solution is in the works. 19912 * Be less restrictive and allow also `perl util/perlpath.pl [all …]
|
/openssl/ssl/record/methods/ |
H A D | recmethod_local.h | 465 void tls_set_plain_alerts(OSSL_RECORD_LAYER *rl, int allow);
|
/openssl/.github/workflows/ |
H A D | cross-compiles.yml | 31 # the "make test" command to allow selective disabling of
|
/openssl/providers/ |
H A D | build.info | 96 # necessary information even if we don't build the module. This will allow
|