Searched refs:TLSv1 (Results 1 – 25 of 125) sorted by relevance
12345
/third_party/openssl/test/ssl-tests/ |
D | 26-tls13_client_auth.cnf | 5 test-0 = 0-server-auth-TLSv1.3 6 test-1 = 1-client-auth-TLSv1.3-request 7 test-2 = 2-client-auth-TLSv1.3-require-fail 8 test-3 = 3-client-auth-TLSv1.3-require 9 test-4 = 4-client-auth-TLSv1.3-require-non-empty-names 10 test-5 = 5-client-auth-TLSv1.3-noroot 11 test-6 = 6-client-auth-TLSv1.3-request-post-handshake 12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake 13 test-8 = 8-client-auth-TLSv1.3-require-post-handshake 14 test-9 = 9-client-auth-TLSv1.3-require-non-empty-names-post-handshake [all …]
|
D | 26-tls13_client_auth.cnf.in | 10 ## Test TLSv1.3 certificate authentication 12 ## TLSv1.3 and post-handshake authentication 22 name => "server-auth-TLSv1.3", 24 "MinProtocol" => "TLSv1.3", 25 "MaxProtocol" => "TLSv1.3", 28 "MinProtocol" => "TLSv1.3", 29 "MaxProtocol" => "TLSv1.3", 36 name => "client-auth-TLSv1.3-request", 38 "MinProtocol" => "TLSv1.3", 39 "MaxProtocol" => "TLSv1.3", [all …]
|
D | 04-client_auth.cnf | 11 test-6 = 6-server-auth-TLSv1 12 test-7 = 7-client-auth-TLSv1-request 13 test-8 = 8-client-auth-TLSv1-require-fail 14 test-9 = 9-client-auth-TLSv1-require 15 test-10 = 10-client-auth-TLSv1-require-non-empty-names 16 test-11 = 11-client-auth-TLSv1-noroot 17 test-12 = 12-server-auth-TLSv1.1 18 test-13 = 13-client-auth-TLSv1.1-request 19 test-14 = 14-client-auth-TLSv1.1-require-fail 20 test-15 = 15-client-auth-TLSv1.1-require [all …]
|
D | 02-protocol-version.cnf | 720 MaxProtocol = TLSv1 745 MaxProtocol = TLSv1.1 770 MaxProtocol = TLSv1.2 795 MaxProtocol = TLSv1.3 870 MaxProtocol = TLSv1 896 MaxProtocol = TLSv1.1 922 MaxProtocol = TLSv1.2 948 MaxProtocol = TLSv1.3 999 MaxProtocol = TLSv1 1000 MinProtocol = TLSv1 [all …]
|
D | 10-resumption.cnf | 84 MaxProtocol = TLSv1 85 MinProtocol = TLSv1 92 MaxProtocol = TLSv1 102 ExpectedProtocol = TLSv1 121 MaxProtocol = TLSv1 122 MinProtocol = TLSv1 129 MaxProtocol = TLSv1 139 ExpectedProtocol = TLSv1 158 MaxProtocol = TLSv1 159 MinProtocol = TLSv1 [all …]
|
D | 14-curves.cnf | 98 MaxProtocol = TLSv1.3 104 MaxProtocol = TLSv1.3 109 ExpectedProtocol = TLSv1.3 127 MaxProtocol = TLSv1.3 133 MaxProtocol = TLSv1.3 138 ExpectedProtocol = TLSv1.3 156 MaxProtocol = TLSv1.3 162 MaxProtocol = TLSv1.3 167 ExpectedProtocol = TLSv1.3 185 MaxProtocol = TLSv1.3 [all …]
|
D | 08-npn.cnf.in | 10 ## Test NPN. Note that NPN is only supported up to TLSv1.2 29 "MaxProtocol" => "TLSv1.2" 46 "MaxProtocol" => "TLSv1.2" 63 "MaxProtocol" => "TLSv1.2" 80 "MaxProtocol" => "TLSv1.2" 93 "MaxProtocol" => "TLSv1.2" 107 "MaxProtocol" => "TLSv1.2" 131 "MaxProtocol" => "TLSv1.2" 156 "MaxProtocol" => "TLSv1.2" 180 "MaxProtocol" => "TLSv1.2" [all …]
|
D | 14-curves.cnf.in | 39 "MaxProtocol" => "TLSv1.3" 43 "MaxProtocol" => "TLSv1.3", 48 "ExpectedProtocol" => "TLSv1.3", 59 "MaxProtocol" => "TLSv1.3" 63 "MaxProtocol" => "TLSv1.2", 68 "ExpectedProtocol" => "TLSv1.2", 80 "MaxProtocol" => "TLSv1.3" 84 "MaxProtocol" => "TLSv1.3", 85 "MinProtocol" => "TLSv1.3", 89 #This curve is not allowed in a TLSv1.3 key_share. We should [all …]
|
D | 17-renegotiate.cnf.in | 23 "MaxProtocol" => "TLSv1.2" 36 "MaxProtocol" => "TLSv1.2" 50 "MaxProtocol" => "TLSv1.2" 63 "MaxProtocol" => "TLSv1.2" 77 "MaxProtocol" => "TLSv1.2", 96 "MaxProtocol" => "TLSv1.2", 116 "MaxProtocol" => "TLSv1.2" 137 "MaxProtocol" => "TLSv1.2", 156 "MaxProtocol" => "TLSv1.2", 175 "MaxProtocol" => "TLSv1.2", [all …]
|
D | 25-cipher.cnf.in | 24 "MaxProtocol" => "TLSv1.2", 28 "MaxProtocol" => "TLSv1.2", 38 "MaxProtocol" => "TLSv1.2", 42 "MaxProtocol" => "TLSv1.2", 52 "MaxProtocol" => "TLSv1.2", 56 "MaxProtocol" => "TLSv1.2", 66 "MaxProtocol" => "TLSv1.2", 71 "MaxProtocol" => "TLSv1.2", 81 "MaxProtocol" => "TLSv1.2", 86 "MaxProtocol" => "TLSv1.2", [all …]
|
D | 20-cert-select.cnf.in | 22 "MaxProtocol" => "TLSv1.2" 34 "MaxProtocol" => "TLSv1.2" 69 "MaxProtocol" => "TLSv1.2", 85 "MaxProtocol" => "TLSv1.2", 92 "MaxProtocol" => "TLSv1.2", 109 "MaxProtocol" => "TLSv1.2", 114 "MaxProtocol" => "TLSv1.2", 129 "MaxProtocol" => "TLSv1.2", 142 "MaxProtocol" => "TLSv1.2", 155 "MaxProtocol" => "TLSv1.2" [all …]
|
D | 19-mac-then-encrypt.cnf.in | 26 "MaxProtocol" => "TLSv1.2" 39 "MaxProtocol" => "TLSv1.2" 53 "MaxProtocol" => "TLSv1.2" 69 "MaxProtocol" => "TLSv1.2" 82 "MaxProtocol" => "TLSv1.2" 96 "MaxProtocol" => "TLSv1.2" 113 "MinProtocol" => "TLSv1", 114 "MaxProtocol" => "TLSv1" 128 "MinProtocol" => "TLSv1", 129 "MaxProtocol" => "TLSv1" [all …]
|
D | 23-srp.cnf.in | 14 # SRP is only supported up to TLSv1.2 21 "MaxProtocol" => "TLSv1.2", 29 "MaxProtocol" => "TLSv1.2", 43 "MaxProtocol" => "TLSv1.2", 51 "MaxProtocol" => "TLSv1.2", 66 "MaxProtocol" => "TLSv1.2", 74 "MaxProtocol" => "TLSv1.2", 88 "MaxProtocol" => "TLSv1.2", 96 "MaxProtocol" => "TLSv1.2",
|
D | 25-cipher.cnf | 26 MaxProtocol = TLSv1.2 31 MaxProtocol = TLSv1.2 51 MaxProtocol = TLSv1.2 56 MaxProtocol = TLSv1.2 76 MaxProtocol = TLSv1.2 81 MaxProtocol = TLSv1.2 101 MaxProtocol = TLSv1.2 107 MaxProtocol = TLSv1.2 127 MaxProtocol = TLSv1.2 133 MaxProtocol = TLSv1.2 [all …]
|
D | 30-extended-master-secret.cnf.in | 26 "MaxProtocol" => "TLSv1.2" 39 "MaxProtocol" => "TLSv1.2" 53 "MaxProtocol" => "TLSv1.2" 69 "MaxProtocol" => "TLSv1.2" 73 "MaxProtocol" => "TLSv1.2" 87 "MaxProtocol" => "TLSv1.2" 100 "MaxProtocol" => "TLSv1.2" 114 "MaxProtocol" => "TLSv1.2"
|
D | 23-srp.cnf | 21 MaxProtocol = TLSv1.2 26 MaxProtocol = TLSv1.2 56 MaxProtocol = TLSv1.2 61 MaxProtocol = TLSv1.2 91 MaxProtocol = TLSv1.2 96 MaxProtocol = TLSv1.2 126 MaxProtocol = TLSv1.2 131 MaxProtocol = TLSv1.2
|
D | 17-renegotiate.cnf | 35 MaxProtocol = TLSv1.2 63 MaxProtocol = TLSv1.2 90 MaxProtocol = TLSv1.2 118 MaxProtocol = TLSv1.2 145 MaxProtocol = TLSv1.2 177 MaxProtocol = TLSv1.2 209 MaxProtocol = TLSv1.2 242 MaxProtocol = TLSv1.2 274 MaxProtocol = TLSv1.2 306 MaxProtocol = TLSv1.2 [all …]
|
D | 24-padding.cnf | 18 MaxProtocol = TLSv1.3 19 MinProtocol = TLSv1.3 25 MaxProtocol = TLSv1.3 26 MinProtocol = TLSv1.3
|
D | 28-seclevel.cnf | 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 129 [5-SECLEVEL 3 with ED448 key, TLSv1.2] 130 ssl_conf = 5-SECLEVEL 3 with ED448 key, TLSv1.2-ssl 132 [5-SECLEVEL 3 with ED448 key, TLSv1.2-ssl] 133 server = 5-SECLEVEL 3 with ED448 key, TLSv1.2-server 134 client = 5-SECLEVEL 3 with ED448 key, TLSv1.2-client 136 [5-SECLEVEL 3 with ED448 key, TLSv1.2-server] 139 MaxProtocol = TLSv1.2 142 [5-SECLEVEL 3 with ED448 key, TLSv1.2-client]
|
D | 20-cert-select.cnf | 80 MaxProtocol = TLSv1.2 85 MaxProtocol = TLSv1.2 112 MaxProtocol = TLSv1.2 118 MaxProtocol = TLSv1.2 145 MaxProtocol = TLSv1.2 151 MaxProtocol = TLSv1.2 178 MaxProtocol = TLSv1.2 183 MaxProtocol = TLSv1.2 211 MaxProtocol = TLSv1.2 216 MaxProtocol = TLSv1.2 [all …]
|
D | 24-padding.cnf.in | 18 "MaxProtocol" => "TLSv1.3", 19 "MinProtocol" => "TLSv1.3" }, 21 "MaxProtocol" => "TLSv1.3", 22 "MinProtocol" => "TLSv1.3" },
|
D | 19-mac-then-encrypt.cnf | 31 MaxProtocol = TLSv1.2 55 MaxProtocol = TLSv1.2 81 MaxProtocol = TLSv1.2 107 MaxProtocol = TLSv1.2 131 MaxProtocol = TLSv1.2 157 MaxProtocol = TLSv1.2 183 MaxProtocol = TLSv1 184 MinProtocol = TLSv1 208 MaxProtocol = TLSv1 209 MinProtocol = TLSv1 [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_get_version.pod | 25 than TLSv1.2 even if TLSv1.3 is subsequently negotiated. SSL_get_version() 44 =item TLSv1 46 The connection uses the TLSv1.0 protocol. 48 =item TLSv1.1 50 The connection uses the TLSv1.1 protocol. 52 =item TLSv1.2 54 The connection uses the TLSv1.2 protocol. 56 =item TLSv1.3 58 The connection uses the TLSv1.3 protocol. 77 The connection uses the TLSv1.0 protocol. [all …]
|
D | SSL_CONF_cmd.pod | 74 Disables all attempts at renegotiation in TLSv1.2 and earlier, same as setting 95 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means 105 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3. 116 TLSv1.3, specified using the IETF name, e.g., B<ecdsa_secp256r1_sha256>, 124 identifiers) are ignored in TLSv1.3 and will not be negotiated. 129 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used 142 group to use. This setting affects groups used for signatures (in TLSv1.2 144 for the B<key_share> sent by a client in a TLSv1.3 B<ClientHello>. 152 Currently supported groups for B<TLSv1.3> are B<P-256>, B<P-384>, B<P-521>, 172 Sets the TLSv1.2 and below ciphersuite list to B<ciphers>. This list will be [all …]
|
D | SSL_CTX_use_psk_identity_hint.pod | 42 A server application wishing to use TLSv1.3 PSKs should set a callback 58 Identity hints are not relevant for TLSv1.3. A server application wishing to use 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 68 A server application wishing to use PSKs for TLSv1.2 and below must provide a 78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is 80 or SSL_set_psk_find_session_callback() for this purpose instead. If TLSv1.3 has 86 will default to SHA-256 for any returned PSK. TLSv1.3 early data exchanges are 90 A connection established via a TLSv1.3 PSK will appear as if session resumption 98 Return values from the TLSv1.2 and below server callback are interpreted as 128 There are no known security issues with sharing the same PSK between TLSv1.2 (or [all …]
|
12345