Home
last modified time | relevance | path

Searched refs:limit (Results 1 – 25 of 31) sorted by relevance

12

/openssl-master/crypto/ec/curve448/
A Dword.h76 unsigned int limit = sizeof(c448_bool_t) / sizeof(mask_t); in bool_to_mask() local
78 if (limit < 1) in bool_to_mask()
79 limit = 1; in bool_to_mask()
80 for (i = 0; i < limit; i++) in bool_to_mask()
/openssl-master/doc/man3/
A DSSL_CTX_get_verify_mode.pod26 SSL_CTX_get_verify_depth() returns the verification depth limit currently set
27 in B<ctx>. If no limit has been explicitly set, -1 is returned and the
30 SSL_get_verify_depth() returns the verification depth limit currently set
31 in B<ssl>. If no limit has been explicitly set, -1 is returned and the
A DSSL_CTX_set_verify.pod141 SSL_CTX_set_verify_depth() and SSL_set_verify_depth() set a limit on the
151 The default depth limit is 100,
222 failure, if wished. The callback realizes a verification depth limit with
266 * Catch a too long certificate chain. The depth limit set using
267 * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
269 * have violated the limit and want to log this error condition.
A DSSL_set_fd.pod54 upper limit is INVALID_SOCKET-1 (2^64 - 2), in practice the current socket()
A DBN_mod_exp_mont.pod36 memory layout to limit data-dependency to a minimum to protect secret exponents.
A DX509_VERIFY_PARAM_set_flags.pod111 A maximal depth chain contains 2 more certificates than the limit, since
113 limit.
114 Thus a B<depth> limit of 0 only allows the end-entity certificate to be signed
115 directly by the trust anchor, while with a B<depth> limit of 1 there can be one
A DEVP_PKEY_get_size.pod61 the upper limit in advance.
A DSSL_get_error.pod81 There is no fixed upper limit for the number of iterations that
141 L<SSL_set_mode(3)> and a maximum limit has been set on the async job pool
A DSSL_CTX_set_record_padding_callback.pod46 of the B<block_size>. A B<block_size> of 0 or 1 disables block padding. The limit of
A DEVP_KDF.pod247 an upper limit on the amount of memory that may be consumed while performing
249 If this memory usage limit is exceeded because the load factors are chosen
A DASYNC_start_job.pod48 the pool. If I<max_size> is set to 0 then no upper limit is set. When an
54 with a I<max_size> of 0 (no upper limit) and an I<init_size> of 0 (no
A DSSL_CTX_set_generate_session_id.pod53 B<id> exceeding the given limit.
A DERR_put_error.pod57 (which is the limit given above)
A DOSSL_PARAM_int.pod243 The string is stored into I<*val> with a size limit of I<max_len>,
264 The OCTETs are either stored into I<*val> with a length limit of I<max_len> or,
A DX509_get_extension_flags.pod38 This extension is used to limit the length of a cert chain that may be
A DSSL_CTX_set_security_level.pod133 signature algorithms. This limit applies no matter what other custom
A DOCSP_resp_find_status.pod193 I<maxsec> parameter to OCSP_check_validity() can be used to limit the permitted
A DSSL_CTX_new.pod186 If you want to limit the supported protocols for the version flexible
A DOSSL_HTTP_transfer.pod162 response content length, where the value 0 indicates no limit.
/openssl-master/crypto/rand/
A Drand_pool.c209 const size_t limit = pool->max_len / 2; in rand_pool_grow() local
218 newlen = newlen < limit ? newlen * 2 : pool->max_len; in rand_pool_grow()
/openssl-master/test/recipes/30-test_evp_data/
A Devppbe_scrypt.txt41 # scrypt memory limit and return an error. To run this test without error
/openssl-master/
A DNOTES-PERL.md69 We do our best to limit ourselves to core Perl modules to keep the
/openssl-master/doc/man1/
A Dopenssl-ocsp.pod.in392 When running as a responder B<-timeout> option is recommended to limit the time
A Dopenssl.pod596 The options below can be used to limit which protocol versions are used,
/openssl-master/doc/man5/
A Dconfig.pod551 The limit that only one directory can be opened and read at a time

Completed in 25 milliseconds

12