Home
last modified time | relevance | path

Searched refs:supported (Results 1 – 25 of 285) sorted by relevance

12345678910>>...12

/openssl/doc/man3/
H A DSSL_CTX_set1_curves.pod10 - EC supported curve functions
45 SSL_CTX_set1_groups() sets the supported groups for B<ctx> to B<glistlen>
47 Currently supported groups for B<TLSv1.3> are B<NID_X9_62_prime256v1>,
77 SSL_CTX_set1_groups_list() sets the supported groups for B<ctx> to
80 SSL_CTX_set1_groups(), described above. Currently supported groups for
91 supported groups for the SSL structure B<ssl>.
93 SSL_get1_groups() returns the set of supported groups sent by a client
94 in the supported groups extension. It returns the total number of
95 supported groups. The B<groups> parameter can be B<NULL> to simply
132 only the concept of supported curves. In TLS1.3 this was renamed to supported
[all …]
H A DSSL_CTX_set_min_proto_version.pod9 and maximum supported protocol version
27 The functions get or set the minimum and maximum supported protocol versions
36 supported by the library, respectively.
39 automatically use the lowest or highest version supported by the library.
41 Currently supported versions are B<SSL3_VERSION>, B<TLS1_VERSION>,
45 In the current version of OpenSSL only QUICv1 is supported in conjunction with
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature
31 SSL_CTX_set1_sigalgs_list() and SSL_set1_sigalgs_list() set the supported
56 The signature algorithms set by a client are used directly in the supported
59 The supported signature algorithms set by a server are not sent to the
76 NID_sha512 digest NIDs are supported and the public key algorithm NIDs
94 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA
101 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA
H A DCRYPTO_THREAD_run_once.pod52 supported by OpenSSL.
95 operations are supported on the specific platform. Because of this, if a
98 supported and I<lock> is NULL, then the function will fail.
104 operations are supported on the specific platform. Because of this, if a
107 supported and I<lock> is NULL, then the function will fail.
113 I<*ret>. I<lock> will be locked, unless atomic operations are supported on the
117 supported and I<lock> is NULL, then the function will fail.
127 supported and I<lock> is NULL, then the function will fail.
135 the variable is read. If atomic operations are not supported and I<lock> is
181 if OpenSSL-managed thread pooling is not supported (for example, if it is not
[all …]
H A DSSL_CONF_cmd.pod26 Currently supported B<option> names for command lines (i.e. when the
219 Sets the minimum and maximum supported protocol.
340 context. This option is only supported if certificate operations
423 This sets the supported groups. For clients, the groups are
446 This sets the minimum supported SSL, TLS or DTLS version.
458 This sets the maximum supported SSL, TLS or DTLS version.
485 The special value B<ALL> refers to all supported versions.
643 supported if certificate operations are permitted.
741 Set supported signature algorithms:
745 There are various ways to select the supported protocols.
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index
29 information about all signature algorithms supported by B<s> in the order
52 These functions must be called after the peer has sent a list of supported
70 will be set to B<NID_undef>. This may be because the value is not supported,
H A DEVP_PKEY_CTX_get_algor.pod42 function is supported at all by the B<EVP_I<TYPE>> implementation.
50 function is supported at all by the B<EVP_I<TYPE>> implementation.
59 function is supported at all by the B<EVP_I<TYPE>> implementation.
64 occurs. In particular, -2 is returned when the function isn't supported by
H A DSSL_check_chain.pod38 acceptable (e.g. it is a supported curve).
71 The validity of a chain is determined by checking if it matches a supported
72 signature algorithm, supported curves and in the case of client authentication
75 Since the supported signature algorithms extension is only used in TLS 1.2,
H A DCMS_encrypt.pod26 Only certificates carrying RSA, Diffie-Hellman or EC keys are supported by this
35 the AES variants with GCM mode are the only supported AEAD algorithms.
67 practice and is not supported by SMIME_write_CMS().
80 structure. KEKRecipientInfo is also supported using the flag B<CMS_PARTIAL>
103 The B<CMS_STREAM> flag was first supported in OpenSSL 1.0.0.
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod34 The macro EVP_PKEY_CTX_set_rsa_padding() is supported but an error is
42 RSA_PSS_SALTLEN_AUTO) is not supported for verification if the key has
54 and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA-PSS:
86 In particular a return value of -2 indicates the operation is not supported by
H A DOSSL_CRMF_MSG_set0_validity.pod84 =item * OSSL_CRMF_POPO_SIGNATURE - RFC 4211, section 4.1, only case 3 supported
88 (subsequentMessage/enccert) supported,
89 challenge-response exchange (challengeResp) not yet supported.
91 =item * OSSL_CRMF_POPO_KEYAGREE - RFC 4211, section 4.3, not yet supported.
H A DSCT_new.pod93 Only SCT_VERSION_V1 is currently supported.
139 The SCT version (only SCT_VERSION_V1 is currently supported).
192 SCT_set_version() returns 1 if the specified version is supported, 0 otherwise.
194 SCT_set_log_entry_type() returns 1 if the specified log entry type is supported, 0 otherwise.
200 B<SCT_set_signature_nid> returns 1 if the specified NID is supported, 0 otherwise.
H A DEVP_PKEY_get_field_type.pod18 I<pkey>'s key type supports it. The types currently supported
28 Among the standard OpenSSL key types, this is only supported for EC and
H A DSSL_set1_server_cert_type.pod51 that are mutually supported.
53 are supported.
61 mutually supported.
63 are supported.
69 The two supported values in the B<val> array are:
H A DEVP_PKEY_CTX_set1_pbe_pass.pod41 supported by the algorithms that use them.
48 In particular a return value of -2 indicates the operation is not supported by
/openssl/doc/designs/
H A Dthread-api.md38 * thread pooling is not supported (for example, if it is not supported on the
67 /* Is thread pool functionality supported at all? */
71 * Is the default model supported? If THREAD_POOL is supported but DEFAULT_SPAWN
72 * is not supported, another model must be used. Note that there is currently
73 * only one supported model (the default model), but there may be more in the
92 default model is the only currently supported model, disabling the default model
/openssl/doc/man7/
H A Dopenssl-qlog.pod48 The following event types are currently supported:
70 By default, all supported event types are logged. The B<OSSL_QFILTER>
85 Enable all supported qlog event types.
103 supported event types in the B<connectivity> category.
159 Partial wildcard matches are not supported at this time.
190 expected to track what is supported by qvis. As such, future changes to the
192 as they occur, and reflect the versions of qlog currently supported by qvis.
216 Only the JSON-SEQ (B<.sqlog>) output format is supported.
220 Only the B<QLOGDIR> environment variable is supported for configuring the qlog
222 supported.
H A DEVP_SIGNATURE-ECDSA.pod23 The base signature algorithm, supported explicitly fetched with
49 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
66 These two are not supported with the ECDSA signature schemes that already
H A DEVP_PKEY-X25519.pod26 This is only supported by X25519 and X448.
30 This getter is only supported by X25519 and X448 for the FIPS provider.
49 This is only supported by X25519 and X448. The group name must be "x25519" or
H A DEVP_SIGNATURE-DSA.pod29 The base signature algorithm, supported explicitly fetched with
55 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
73 These two are not supported with the DSA signature schemes that already
/openssl/
H A DNOTES-ANSI.md9 There are cases of `asm()` calls in our C source, which isn't supported
14 The secure memory calls aren't supported with ANSI C.
/openssl/test/ssl-tests/
H A D08-npn.cnf26 test-21 = 21-npn-used-if-alpn-not-supported-resumption
838 [21-npn-used-if-alpn-not-supported-resumption]
839 ssl_conf = 21-npn-used-if-alpn-not-supported-resumption-ssl
841 [21-npn-used-if-alpn-not-supported-resumption-ssl]
842 server = 21-npn-used-if-alpn-not-supported-resumption-server
843 client = 21-npn-used-if-alpn-not-supported-resumption-client
847 [21-npn-used-if-alpn-not-supported-resumption-server]
852 [21-npn-used-if-alpn-not-supported-resumption-resume-server]
857 [21-npn-used-if-alpn-not-supported-resumption-client]
872 [21-npn-used-if-alpn-not-supported-resumption-server-extra]
[all …]
/openssl/crypto/x509/
H A Dv3_prn.c20 unsigned long flag, int indent, int supported);
180 unsigned long flag, int indent, int supported) in unknown_ext_print() argument
188 if (supported) in unknown_ext_print()
/openssl/crypto/err/
H A Dopenssl.txt276 sender generalname type not supported
784 operation not supported for this keytype
916 search only supported for directories
999 operation not supported on this type
1009 signing not supported for this key type
1127 PROV_R_NOT_SUPPORTED:136:not supported
1134 operation not supported for this keytype
1148 search only supported for directories
1204 prediction resistance not supported
1280 operation not supported for this keytype
[all …]
/openssl/doc/man1/
H A Dopenssl-dgst.pod.in49 A supported I<digest> name may also be used as the sub-command name.
50 To see the list of supported algorithms, use C<openssl list -digest-algorithms>
62 Specifies name of a supported digest to be used. See option B<-list> below :
66 Prints out a list of supported message digests.
90 This option is not supported for signing operations.
162 supported by the B<gost> engine. MAC keys and other options should be set
171 Following options are supported by both by B<HMAC> and B<gost-mac>:

Completed in 60 milliseconds

12345678910>>...12