Lines Matching full:just

62    just after the buffer being decrypted is not mapped.
1521 are considered just feasible. However, for an attack the target would
1653 * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just
2042 necessary to configure just to create a source distribution.
2457 * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just
3133 than just the call where this user data is passed.
3353 necessary to configure just to create a source distribution.
3535 Attacks against DH1024 are considered just feasible, because most of the
3558 perform and are not believed likely. Attacks against DH are considered just
3643 perform and are not believed likely. Attacks against DH are considered just
3824 have been disabled by default and removed from DEFAULT, just like RC4.
4314 the build to just the latest API, rather than a fixed API
4326 of just the undeprecated features of either release.
4350 Note: the ecdsa.h and ecdh.h headers are now no longer needed and just
4675 Just like free(), fix most of the xxx_free routines to accept
4743 For non-compliant peers (i.e. just about everything) this should have no
4931 * Add ECDSA code to fips module. Add tiny fips_ecdsa_check to just
5286 Attacks against DH1024 are considered just feasible, because most of the
5309 perform and are not believed likely. Attacks against DH are considered just
5361 perform and are not believed likely. Attacks against DH are considered just
5890 perform and are not believed likely. Attacks against DH are considered just
6327 * Add -rev test option to s_server to just reverse order of characters
6572 hardcoded fixed parameters. Now a server just has to call:
7803 disable just protocol X, but all protocols above X *if* there are
8997 Now just gather all certificates together and the first private key
9266 PRF input just if possible, or 2 to enforce use of the opaque PRF
9371 (SSL_DEFAULT_CIPHER_LIST) now is just "ALL:!aNULL:!eNULL", but
9468 a function that just compares CRL issuer names. Cache several CRL
10031 by default (a flag can override this): it just wastes time without
10179 just about the algorithm choice for symmetric cryptography.)
10197 addressing just one layer of what turns out to have been
10421 Unfortunately just fixing these incompatibilities would "cut off"
10542 BN_FLG_EXP_CONSTTIME flag, since it now affects more than just
10550 constant-time implementations for more than just exponentiation.
10667 (not just a patchlevel) when we can change the SSL_CIPHER
10709 draft-ietf-tls-56-bit-ciphersuites-01.txt. These are just as
11851 draft-ietf-tls-56-bit-ciphersuites-01.txt. These are just as
12040 not just when there's an associated purpose to the check:
12248 own set of error texts inserted. The routines are there, just not
12797 additional bytes when new memory had to be allocated, not just
12838 definitions. Do not try to just include openssl/des_old.h, that
12996 * Make EVP_MD routines take a context pointer instead of just the
13037 pass the return value to a module it has just loaded, and that module
13140 1. Implemented real KerberosWrapper, instead of just using
13153 values for each of the key sizes rather than having just
13203 arbitrary arguments instead of just a string.
13290 CRLs with different times, extension based lookup (rather than just
13389 value. Passing a NULL ENGINE parameter is just plain stupid anyway
13436 that the point list has just one item (besides the optional
13511 They are now 58 .. 63 (i.e., just below ERR_R_FATAL).
13577 certificate is just checked for a generic purpose and OCSP request
13595 OID rather that just UNKNOWN.
13686 just prints out a warning. New function OCSP_add1_basic_nonce()
13754 response and returns the OCSP_SINGLERESP structure just added (to allow
13832 verify routines to perform initial checks (just CA validity) and
13875 is currently incomplete. Currently just finds the signer's
13889 well as the original possibility to just replace malloc(),
13931 (previously it was just the string "/dev/urandom"), so on typical
13984 standing problem: a verify on a PKCS7 structure just after signing
14004 New ASN1 macro: DECLARE_ASN1_ITEM() which just declares the relevant
14249 verification would just waste user's time since the resulting
14666 was just at the end of a processed block. The bug was discovered when
14707 a generator of the order-q subgroup is just as good, if not
14912 must be disabled for SSL_ST_OK in the case that we just sent a
14916 before just sending a HelloRequest.
14928 and the extra bytes are just ignored. However ssl/s2_pkt.c
15087 'md_local' value, not just the half used for PRNG output.
15218 If SEQUENCE is length is indefinite just set c->slen to the total
15458 so that 'make test' does not abort just because 'bc' is broken.
15500 the full version number and not just 0. This should mark the
15575 counterpart and unknown types were just rejected. Changed so that the
15579 case we have no idea what the actual type is so we just lump them all
15656 just makes things more complicated.)
15716 exact match, rather than just subject name.
15853 * Made it possible to reconfigure with just the configuration
15975 of the ASN1 functions that just operate on content octets
16210 double NULL a zero length password would end up as just the
16481 scope is the entire file, not just the current function. This
16527 is needed to use anonymous DH: it just needs to be included in the
16571 better than others it just uses the work 'NEW' in the certificate
16650 was that statically linked binaries could for example just call
16651 SSLeay_add_all_ciphers() to just add ciphers to the table and not
16695 for each positive witness in the Rabin-Miller test, not just
16890 automation. This will allow an application to just generate a template
16930 $PATH. Just exploiting of the BWX extension results in 20-30%
16987 * Simplify the trust setting structure and code. Now we just have
16992 The trust checking code now has a default behaviour: it will just
17150 magic header, so unsalted files fail gracefully instead of just decrypting
17237 without choking one or the other routine. Changed this to just read
17433 don't just chmod when it may be too late.
17780 additional void * argument, which is just handed through whenever
17792 just ignores this garbage); but there is no guarantee whatsoever that
17882 than just having a counter.
17925 up the length of negative integers. This has now been simplified to just
18075 Needed to change the PEM_STRING_EVP_PKEY value which was just "PRIVATE
18077 value was just used as a "magic string" and not used directly its
18168 are not present in STACK_OF. Now it just produces a warning. sk_set
19099 longer need them because of three reasons: either they are just temporary
19234 al: it's just almost always a UTCTime. Note this patch adds new error