/openssl/crypto/bio/ |
H A D | bio_sock2.c | 115 int enabled = 0; in BIO_connect() local 116 size_t enabledlen = sizeof(enabled); in BIO_connect() 124 if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { in BIO_connect() 129 int enabled = 0; in BIO_connect() 130 size_t enabledlen = sizeof(enabled); in BIO_connect() 138 if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { in BIO_connect() 367 int enabled = 0; in BIO_listen() local 368 size_t enabledlen = sizeof(enabled); in BIO_listen() 376 if (!(enabled & OSSL_TFO_SERVER_FLAG)) { in BIO_listen() 381 int enabled = 0; in BIO_listen() local [all …]
|
/openssl/ssl/quic/ |
H A D | qlog.c | 38 size_t enabled[NUM_ENABLED_W]; member 245 int enabled) in ossl_qlog_set_event_type_enabled() argument 250 bit_set(qlog->enabled, event_type, enabled); in ossl_qlog_set_event_type_enabled() 259 return bit_get(qlog->enabled, event_type) != 0; in ossl_qlog_enabled() 636 static void filter_apply(size_t *enabled, int add, in filter_apply() argument 644 bit_set(enabled, QLOG_EVENT_TYPE_##e_cat##_##e_name, add); in filter_apply() 685 size_t cat_l, event_l, enabled[NUM_ENABLED_W]; in ossl_qlog_set_filter() local 688 memcpy(enabled, qlog->enabled, sizeof(enabled)); in ossl_qlog_set_filter() 710 filter_apply(enabled, add, NULL, 0, NULL, 0); in ossl_qlog_set_filter() 723 filter_apply(enabled, add, cat, cat_l, event, event_l); in ossl_qlog_set_filter() [all …]
|
/openssl/doc/man3/ |
H A D | OSSL_trace_enabled.pod | 48 /* check whether a trace category is enabled */ 59 If the tracing facility is enabled (see L</Configure Tracing> below), 62 The tracing output is divided into types which are enabled 69 Tracing for a specific category is enabled at run-time if a so-called 96 I<category> is enabled, i.e., if the tracing facility has been statically 97 enabled (see L</Configure Tracing> below) and a trace channel has been 103 The pointer returned is NULL if the category is invalid or not enabled. 190 if tracing for the given I<category> is enabled. 198 only if a specific trace category is enabled. 220 executed only if the trace category is enabled. [all …]
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 87 Clients that require SCTs are expected to not have enabled any aNULL ciphers 92 enabled via the built-in or the custom callbacks, by setting a NULL callback. 96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0 101 When SCT processing is enabled, OCSP stapling will be enabled. This is because 109 Certificate Transparency validation cannot be enabled and so a callback cannot
|
H A D | SSL_get_ciphers.pod | 36 SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for 39 versions, the security level, and the enabled signature algorithms. 40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings 73 by both the client and the server it does not mean that it is enabled (see the 75 available shared ciphersuites whether or not they are enabled. This is a server
|
H A D | SSL_CTX_set1_cert_comp_preference.pod | 44 those algorithms enabled in the library will be accepted in B<algs>, unknown 88 saved). As the default list includes all the enabled algorithms, not specifying 89 a preference will allow any enabled algorithm by the peer. The filtered peer's 117 =item * If the specified algorithm B<alg> is not enabled. 119 =item * If B<alg> is 0 and no compression algorithms are enabled.
|
H A D | BIO_sendmmsg.pod | 74 must be explicitly enabled on a B<BIO> before it can be used; see 76 support for I<local> has not been enabled, processing of that B<BIO_MSG> fails. 82 If I<local> is specified and local address support is enabled, but the operating 89 before local address support was enabled for a receiving socket. These are 116 whether local address support is enabled. To enable local address support, call 159 available or not enabled on the BIO. 205 successfully enabled or disabled and 0 otherwise.
|
H A D | SSL_get0_peer_rpk.pod | 59 When DANE is enabled via L<SSL_dane_enable(3)>, the configured TLSA records 61 If DANE is not enabled, then no validation will occur.
|
H A D | SSL_set_blocking_mode.pod | 18 connection SSL object. By default, blocking is enabled, unless the SSL object is 53 SSL_get_blocking_mode() returns 1 if blocking is currently enabled. It returns
|
H A D | SSL_COMP_add_compression_method.pod | 52 will unconditionally send the list of all compression methods enabled with 62 If enabled during compilation, the OpenSSL library will have the
|
H A D | SSL_CONF_cmd.pod | 293 once, TLSv1.3 has been negotiated, and early data is enabled on the server. A 477 All protocol versions are enabled by default. 493 If you do use B<Protocol>, make sure that the resulting range of enabled 494 protocols has no "holes", e.g. if TLS 1.0 and TLS 1.2 are both enabled, make 495 sure to also leave TLS 1.1 enabled. 504 Each option is listed below. Where an operation is enabled by default 507 B<SessionTicket>: session ticket support, enabled by default. Inverse of 548 B<EncryptThenMac>: use encrypt-then-mac extension, enabled by 576 B<ExtendedMasterSecret>: use extended master secret extension, enabled by 580 B<CANames>: use CA names extension, enabled by [all …]
|
H A D | OSSL_QUIC_client_method.pod | 6 - Provide SSL_METHOD objects for QUIC enabled functions
|
H A D | BIO_s_dgram_pair.pod | 92 is enabled, BIO_read() will fail if the buffer provided is inadequate to hold 177 enabled, the operation fails; see L<BIO_dgram_set_local_addr_enable(3)>. 200 BIO_dgram_get_no_trunc() returns 1 if no-truncate mode is enabled on a BIO, or 0 201 if no-truncate mode is not enabled or not supported on a given BIO.
|
H A D | SSL_CTX_dane_enable.pod | 65 (The connection must be associated with a DANE-enabled SSL context). 89 If no TLSA records are added successfully, DANE authentication is not enabled, 96 The return value is negative if DANE verification failed (or was not enabled), 154 Thus, despite the text of RFC7671, name checks are by default enabled for 175 negative value when DANE authentication failed or was not enabled, a
|
H A D | SSL_CTX_flush_sessions.pod | 29 If enabled, the internal session cache will collect all sessions established
|
H A D | COMP_CTX_new.pod | 116 Compression support and compression algorithms must be enabled and built into 127 It is disabled by default, and may be enabled by clearing the
|
H A D | OSSL_trace_set_channel.pod | 29 enabled individually. 30 Every category can be enabled individually by attaching a so-called 42 enabled for the given category.
|
H A D | SMIME_write_CMS.pod | 19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be
|
/openssl/doc/designs/quic-design/ |
H A D | qlog.md | 62 qlog must currently be enabled at build time using `enable-unstable-qlog`. If 63 not enabled, `OPENSSL_NO_QLOG` is defined. 67 enabled, each connection causes a file `{ODCID}_{ROLE}.sqlog` to be created in 121 earlier items. In the example above, for example, all event types are enabled, 123 disabled, then the `quic:packet_sent` event is re-enabled.
|
H A D | demuxer.md | 44 - this is optional - enabled only if 0RTT support is enabled by the
|
/openssl/providers/fips/ |
H A D | fipsprov.c | 84 unsigned char enabled; member 98 static void init_fips_option(FIPS_OPTION *opt, int enabled) in init_fips_option() argument 100 opt->enabled = enabled; in init_fips_option() 101 opt->option = enabled ? "1" : "0"; in init_fips_option() 201 if (p != NULL && !OSSL_PARAM_set_int(p, fgbl->fips_##structname.enabled)) \ in fips_get_params() 802 fgbl->fips_##structname.enabled = 1; \ in OSSL_provider_init_int() 804 fgbl->fips_##structname.enabled = 0; \ in OSSL_provider_init_int() 1010 return fgbl->fips_##structname.enabled; \
|
/openssl/providers/implementations/encode_decode/ |
H A D | build.info | 14 # encode_key2blob.c is only being included when EC is enabled, because we
|
/openssl/include/crypto/ |
H A D | dso_conf.h.in | 18 # has support compiled in for them. Currently each method is enabled
|
H A D | riscv_arch.def | 25 * the value is set to 0 and the corresponding capability would not be enabled.
|
/openssl/doc/man7/ |
H A D | ct.pod | 17 By default, these checks are disabled. They can be enabled using
|