/openssl/doc/man3/ |
H A D | SSL_CTX_set1_curves.pod | 10 - EC supported curve functions 45 SSL_CTX_set1_groups() sets the supported groups for B<ctx> to B<glistlen> 47 Currently supported groups for B<TLSv1.3> are B<NID_X9_62_prime256v1>, 77 SSL_CTX_set1_groups_list() sets the supported groups for B<ctx> to 80 SSL_CTX_set1_groups(), described above. Currently supported groups for 91 supported groups for the SSL structure B<ssl>. 93 SSL_get1_groups() returns the set of supported groups sent by a client 94 in the supported groups extension. It returns the total number of 95 supported groups. The B<groups> parameter can be B<NULL> to simply 132 only the concept of supported curves. In TLS1.3 this was renamed to supported [all …]
|
H A D | SSL_CTX_set_min_proto_version.pod | 9 and maximum supported protocol version 27 The functions get or set the minimum and maximum supported protocol versions 36 supported by the library, respectively. 39 automatically use the lowest or highest version supported by the library. 41 Currently supported versions are B<SSL3_VERSION>, B<TLS1_VERSION>, 45 In the current version of OpenSSL only QUICv1 is supported in conjunction with
|
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 26 SSL_CTX_set1_sigalgs() and SSL_set1_sigalgs() set the supported signature 31 SSL_CTX_set1_sigalgs_list() and SSL_set1_sigalgs_list() set the supported 56 The signature algorithms set by a client are used directly in the supported 59 The supported signature algorithms set by a server are not sent to the 76 NID_sha512 digest NIDs are supported and the public key algorithm NIDs 94 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA 101 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA
|
H A D | CRYPTO_THREAD_run_once.pod | 52 supported by OpenSSL. 95 operations are supported on the specific platform. Because of this, if a 98 supported and I<lock> is NULL, then the function will fail. 104 operations are supported on the specific platform. Because of this, if a 107 supported and I<lock> is NULL, then the function will fail. 113 I<*ret>. I<lock> will be locked, unless atomic operations are supported on the 117 supported and I<lock> is NULL, then the function will fail. 127 supported and I<lock> is NULL, then the function will fail. 135 the variable is read. If atomic operations are not supported and I<lock> is 181 if OpenSSL-managed thread pooling is not supported (for example, if it is not [all …]
|
H A D | SSL_CONF_cmd.pod | 26 Currently supported B<option> names for command lines (i.e. when the 219 Sets the minimum and maximum supported protocol. 340 context. This option is only supported if certificate operations 423 This sets the supported groups. For clients, the groups are 446 This sets the minimum supported SSL, TLS or DTLS version. 458 This sets the maximum supported SSL, TLS or DTLS version. 485 The special value B<ALL> refers to all supported versions. 643 supported if certificate operations are permitted. 741 Set supported signature algorithms: 745 There are various ways to select the supported protocols. [all …]
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 29 information about all signature algorithms supported by B<s> in the order 52 These functions must be called after the peer has sent a list of supported 70 will be set to B<NID_undef>. This may be because the value is not supported,
|
H A D | EVP_PKEY_CTX_get_algor.pod | 42 function is supported at all by the B<EVP_I<TYPE>> implementation. 50 function is supported at all by the B<EVP_I<TYPE>> implementation. 59 function is supported at all by the B<EVP_I<TYPE>> implementation. 64 occurs. In particular, -2 is returned when the function isn't supported by
|
H A D | SSL_check_chain.pod | 38 acceptable (e.g. it is a supported curve). 71 The validity of a chain is determined by checking if it matches a supported 72 signature algorithm, supported curves and in the case of client authentication 75 Since the supported signature algorithms extension is only used in TLS 1.2,
|
H A D | CMS_encrypt.pod | 26 Only certificates carrying RSA, Diffie-Hellman or EC keys are supported by this 35 the AES variants with GCM mode are the only supported AEAD algorithms. 67 practice and is not supported by SMIME_write_CMS(). 80 structure. KEKRecipientInfo is also supported using the flag B<CMS_PARTIAL> 103 The B<CMS_STREAM> flag was first supported in OpenSSL 1.0.0.
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 34 The macro EVP_PKEY_CTX_set_rsa_padding() is supported but an error is 42 RSA_PSS_SALTLEN_AUTO) is not supported for verification if the key has 54 and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA-PSS: 86 In particular a return value of -2 indicates the operation is not supported by
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 84 =item * OSSL_CRMF_POPO_SIGNATURE - RFC 4211, section 4.1, only case 3 supported 88 (subsequentMessage/enccert) supported, 89 challenge-response exchange (challengeResp) not yet supported. 91 =item * OSSL_CRMF_POPO_KEYAGREE - RFC 4211, section 4.3, not yet supported.
|
H A D | SCT_new.pod | 93 Only SCT_VERSION_V1 is currently supported. 139 The SCT version (only SCT_VERSION_V1 is currently supported). 192 SCT_set_version() returns 1 if the specified version is supported, 0 otherwise. 194 SCT_set_log_entry_type() returns 1 if the specified log entry type is supported, 0 otherwise. 200 B<SCT_set_signature_nid> returns 1 if the specified NID is supported, 0 otherwise.
|
H A D | EVP_PKEY_get_field_type.pod | 18 I<pkey>'s key type supports it. The types currently supported 28 Among the standard OpenSSL key types, this is only supported for EC and
|
H A D | SSL_set1_server_cert_type.pod | 51 that are mutually supported. 53 are supported. 61 mutually supported. 63 are supported. 69 The two supported values in the B<val> array are:
|
H A D | EVP_PKEY_CTX_set1_pbe_pass.pod | 41 supported by the algorithms that use them. 48 In particular a return value of -2 indicates the operation is not supported by
|
/openssl/doc/designs/ |
H A D | thread-api.md | 38 * thread pooling is not supported (for example, if it is not supported on the 67 /* Is thread pool functionality supported at all? */ 71 * Is the default model supported? If THREAD_POOL is supported but DEFAULT_SPAWN 72 * is not supported, another model must be used. Note that there is currently 73 * only one supported model (the default model), but there may be more in the 92 default model is the only currently supported model, disabling the default model
|
/openssl/doc/man7/ |
H A D | openssl-qlog.pod | 48 The following event types are currently supported: 70 By default, all supported event types are logged. The B<OSSL_QFILTER> 85 Enable all supported qlog event types. 103 supported event types in the B<connectivity> category. 159 Partial wildcard matches are not supported at this time. 190 expected to track what is supported by qvis. As such, future changes to the 192 as they occur, and reflect the versions of qlog currently supported by qvis. 216 Only the JSON-SEQ (B<.sqlog>) output format is supported. 220 Only the B<QLOGDIR> environment variable is supported for configuring the qlog 222 supported.
|
H A D | EVP_SIGNATURE-ECDSA.pod | 23 The base signature algorithm, supported explicitly fetched with 49 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and 66 These two are not supported with the ECDSA signature schemes that already
|
H A D | EVP_PKEY-X25519.pod | 26 This is only supported by X25519 and X448. 30 This getter is only supported by X25519 and X448 for the FIPS provider. 49 This is only supported by X25519 and X448. The group name must be "x25519" or
|
H A D | EVP_SIGNATURE-DSA.pod | 29 The base signature algorithm, supported explicitly fetched with 55 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and 73 These two are not supported with the DSA signature schemes that already
|
/openssl/ |
H A D | NOTES-ANSI.md | 9 There are cases of `asm()` calls in our C source, which isn't supported 14 The secure memory calls aren't supported with ANSI C.
|
/openssl/test/ssl-tests/ |
H A D | 08-npn.cnf | 26 test-21 = 21-npn-used-if-alpn-not-supported-resumption 838 [21-npn-used-if-alpn-not-supported-resumption] 839 ssl_conf = 21-npn-used-if-alpn-not-supported-resumption-ssl 841 [21-npn-used-if-alpn-not-supported-resumption-ssl] 842 server = 21-npn-used-if-alpn-not-supported-resumption-server 843 client = 21-npn-used-if-alpn-not-supported-resumption-client 847 [21-npn-used-if-alpn-not-supported-resumption-server] 852 [21-npn-used-if-alpn-not-supported-resumption-resume-server] 857 [21-npn-used-if-alpn-not-supported-resumption-client] 872 [21-npn-used-if-alpn-not-supported-resumption-server-extra] [all …]
|
/openssl/crypto/x509/ |
H A D | v3_prn.c | 20 unsigned long flag, int indent, int supported); 180 unsigned long flag, int indent, int supported) in unknown_ext_print() argument 188 if (supported) in unknown_ext_print()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 276 sender generalname type not supported 784 operation not supported for this keytype 916 search only supported for directories 999 operation not supported on this type 1009 signing not supported for this key type 1127 PROV_R_NOT_SUPPORTED:136:not supported 1134 operation not supported for this keytype 1148 search only supported for directories 1204 prediction resistance not supported 1280 operation not supported for this keytype [all …]
|
/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 49 A supported I<digest> name may also be used as the sub-command name. 50 To see the list of supported algorithms, use C<openssl list -digest-algorithms> 62 Specifies name of a supported digest to be used. See option B<-list> below : 66 Prints out a list of supported message digests. 90 This option is not supported for signing operations. 162 supported by the B<gost> engine. MAC keys and other options should be set 171 Following options are supported by both by B<HMAC> and B<gost-mac>:
|