Lines Matching full:implementations

29  * configures a list of cipher suites and algorithm implementations.
147 * Note that with current implementations, SHA-224 and SHA-256 in example_client_profile()
162 * configured (failure to provide needed implementations may in example_client_profile()
169 * Public-key algorithm implementations. in example_client_profile()
184 * Normally, you use the "default" implementations, obtained in example_client_profile()
186 * implementations that are deemed "best" for the current in example_client_profile()
188 * implementations". Selecting the default implementation is a in example_client_profile()
191 * Nevertheless, specific implementations may be selected in example_client_profile()
206 * There are no less than 10 elliptic curve implementations: in example_client_profile()
227 * implementations directly will result in smaller code, but in example_client_profile()
233 /* Alternate: set implementations explicitly. in example_client_profile()
262 * (actually two implementations, for encryption and decryption). in example_client_profile()
264 * (actually two implementations, for encryption and decryption). in example_client_profile()
268 * Two 3DES implementations are provided: in example_client_profile()
276 * Four AES implementations are provided: in example_client_profile()
305 * Whether having constant-time implementations is absolutely in example_client_profile()
313 * implementations only if duly measured performance issues make in example_client_profile()
353 * implementations are provided: in example_client_profile()
367 * These implementations are all constant-time as long as the in example_client_profile()
413 * Set suites and asymmetric crypto implementations. We use the in example_client_profile()
415 * implementation). These implementations are used for in example_client_profile()
514 * provide the two relevant implementations. in example_server_profile()