Lines Matching full:protection
204 additional considerations around replay attacks (see \*(L"\s-1REPLAY PROTECTION\*(R"\s0
334 early data setting for a server is nonzero then replay protection is
335 automatically enabled (see \*(L"\s-1REPLAY PROTECTION\*(R"\s0 below).
359 is accepted or not, for example to mitigate replay risks (see \*(L"\s-1REPLAY PROTECTION\*(R"\s0
368 protection feature will still be used even if a callback is present unless it
370 \&\*(L"\s-1REPLAY PROTECTION\*(R"\s0 below.
410 .SH "REPLAY PROTECTION"
411 .IX Header "REPLAY PROTECTION"
414 mitigation for this issue OpenSSL automatically enables replay protection if the
416 protection enabled sessions are forced to be single use only. If a client
422 The replay protection mechanism relies on the internal OpenSSL server session
423 cache (see \fBSSL_CTX_set_session_cache_mode\fR\|(3)). When replay protection is
445 The OpenSSL replay protection does not apply to external Pre Shared Keys (PSKs)
450 applications it is possible to turn off the built-in replay protection feature