Home
last modified time | relevance | path

Searched refs:TLSv1 (Results 1 – 25 of 125) sorted by relevance

12345

/third_party/openssl/test/ssl-tests/
D26-tls13_client_auth.cnf5 test-0 = 0-server-auth-TLSv1.3
6 test-1 = 1-client-auth-TLSv1.3-request
7 test-2 = 2-client-auth-TLSv1.3-require-fail
8 test-3 = 3-client-auth-TLSv1.3-require
9 test-4 = 4-client-auth-TLSv1.3-require-non-empty-names
10 test-5 = 5-client-auth-TLSv1.3-noroot
11 test-6 = 6-client-auth-TLSv1.3-request-post-handshake
12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake
13 test-8 = 8-client-auth-TLSv1.3-require-post-handshake
14 test-9 = 9-client-auth-TLSv1.3-require-non-empty-names-post-handshake
[all …]
D26-tls13_client_auth.cnf.in10 ## Test TLSv1.3 certificate authentication
12 ## TLSv1.3 and post-handshake authentication
22 name => "server-auth-TLSv1.3",
24 "MinProtocol" => "TLSv1.3",
25 "MaxProtocol" => "TLSv1.3",
28 "MinProtocol" => "TLSv1.3",
29 "MaxProtocol" => "TLSv1.3",
36 name => "client-auth-TLSv1.3-request",
38 "MinProtocol" => "TLSv1.3",
39 "MaxProtocol" => "TLSv1.3",
[all …]
D04-client_auth.cnf11 test-6 = 6-server-auth-TLSv1
12 test-7 = 7-client-auth-TLSv1-request
13 test-8 = 8-client-auth-TLSv1-require-fail
14 test-9 = 9-client-auth-TLSv1-require
15 test-10 = 10-client-auth-TLSv1-require-non-empty-names
16 test-11 = 11-client-auth-TLSv1-noroot
17 test-12 = 12-server-auth-TLSv1.1
18 test-13 = 13-client-auth-TLSv1.1-request
19 test-14 = 14-client-auth-TLSv1.1-require-fail
20 test-15 = 15-client-auth-TLSv1.1-require
[all …]
D02-protocol-version.cnf720 MaxProtocol = TLSv1
745 MaxProtocol = TLSv1.1
770 MaxProtocol = TLSv1.2
795 MaxProtocol = TLSv1.3
870 MaxProtocol = TLSv1
896 MaxProtocol = TLSv1.1
922 MaxProtocol = TLSv1.2
948 MaxProtocol = TLSv1.3
999 MaxProtocol = TLSv1
1000 MinProtocol = TLSv1
[all …]
D10-resumption.cnf84 MaxProtocol = TLSv1
85 MinProtocol = TLSv1
92 MaxProtocol = TLSv1
102 ExpectedProtocol = TLSv1
121 MaxProtocol = TLSv1
122 MinProtocol = TLSv1
129 MaxProtocol = TLSv1
139 ExpectedProtocol = TLSv1
158 MaxProtocol = TLSv1
159 MinProtocol = TLSv1
[all …]
D14-curves.cnf98 MaxProtocol = TLSv1.3
104 MaxProtocol = TLSv1.3
109 ExpectedProtocol = TLSv1.3
127 MaxProtocol = TLSv1.3
133 MaxProtocol = TLSv1.3
138 ExpectedProtocol = TLSv1.3
156 MaxProtocol = TLSv1.3
162 MaxProtocol = TLSv1.3
167 ExpectedProtocol = TLSv1.3
185 MaxProtocol = TLSv1.3
[all …]
D08-npn.cnf.in10 ## Test NPN. Note that NPN is only supported up to TLSv1.2
29 "MaxProtocol" => "TLSv1.2"
46 "MaxProtocol" => "TLSv1.2"
63 "MaxProtocol" => "TLSv1.2"
80 "MaxProtocol" => "TLSv1.2"
93 "MaxProtocol" => "TLSv1.2"
107 "MaxProtocol" => "TLSv1.2"
131 "MaxProtocol" => "TLSv1.2"
156 "MaxProtocol" => "TLSv1.2"
180 "MaxProtocol" => "TLSv1.2"
[all …]
D14-curves.cnf.in39 "MaxProtocol" => "TLSv1.3"
43 "MaxProtocol" => "TLSv1.3",
48 "ExpectedProtocol" => "TLSv1.3",
59 "MaxProtocol" => "TLSv1.3"
63 "MaxProtocol" => "TLSv1.2",
68 "ExpectedProtocol" => "TLSv1.2",
80 "MaxProtocol" => "TLSv1.3"
84 "MaxProtocol" => "TLSv1.3",
85 "MinProtocol" => "TLSv1.3",
89 #This curve is not allowed in a TLSv1.3 key_share. We should
[all …]
D17-renegotiate.cnf.in23 "MaxProtocol" => "TLSv1.2"
36 "MaxProtocol" => "TLSv1.2"
50 "MaxProtocol" => "TLSv1.2"
63 "MaxProtocol" => "TLSv1.2"
77 "MaxProtocol" => "TLSv1.2",
96 "MaxProtocol" => "TLSv1.2",
116 "MaxProtocol" => "TLSv1.2"
137 "MaxProtocol" => "TLSv1.2",
156 "MaxProtocol" => "TLSv1.2",
175 "MaxProtocol" => "TLSv1.2",
[all …]
D25-cipher.cnf.in24 "MaxProtocol" => "TLSv1.2",
28 "MaxProtocol" => "TLSv1.2",
38 "MaxProtocol" => "TLSv1.2",
42 "MaxProtocol" => "TLSv1.2",
52 "MaxProtocol" => "TLSv1.2",
56 "MaxProtocol" => "TLSv1.2",
66 "MaxProtocol" => "TLSv1.2",
71 "MaxProtocol" => "TLSv1.2",
81 "MaxProtocol" => "TLSv1.2",
86 "MaxProtocol" => "TLSv1.2",
[all …]
D20-cert-select.cnf.in22 "MaxProtocol" => "TLSv1.2"
34 "MaxProtocol" => "TLSv1.2"
69 "MaxProtocol" => "TLSv1.2",
85 "MaxProtocol" => "TLSv1.2",
92 "MaxProtocol" => "TLSv1.2",
109 "MaxProtocol" => "TLSv1.2",
114 "MaxProtocol" => "TLSv1.2",
129 "MaxProtocol" => "TLSv1.2",
142 "MaxProtocol" => "TLSv1.2",
155 "MaxProtocol" => "TLSv1.2"
[all …]
D19-mac-then-encrypt.cnf.in26 "MaxProtocol" => "TLSv1.2"
39 "MaxProtocol" => "TLSv1.2"
53 "MaxProtocol" => "TLSv1.2"
69 "MaxProtocol" => "TLSv1.2"
82 "MaxProtocol" => "TLSv1.2"
96 "MaxProtocol" => "TLSv1.2"
113 "MinProtocol" => "TLSv1",
114 "MaxProtocol" => "TLSv1"
128 "MinProtocol" => "TLSv1",
129 "MaxProtocol" => "TLSv1"
[all …]
D23-srp.cnf.in14 # SRP is only supported up to TLSv1.2
21 "MaxProtocol" => "TLSv1.2",
29 "MaxProtocol" => "TLSv1.2",
43 "MaxProtocol" => "TLSv1.2",
51 "MaxProtocol" => "TLSv1.2",
66 "MaxProtocol" => "TLSv1.2",
74 "MaxProtocol" => "TLSv1.2",
88 "MaxProtocol" => "TLSv1.2",
96 "MaxProtocol" => "TLSv1.2",
D25-cipher.cnf26 MaxProtocol = TLSv1.2
31 MaxProtocol = TLSv1.2
51 MaxProtocol = TLSv1.2
56 MaxProtocol = TLSv1.2
76 MaxProtocol = TLSv1.2
81 MaxProtocol = TLSv1.2
101 MaxProtocol = TLSv1.2
107 MaxProtocol = TLSv1.2
127 MaxProtocol = TLSv1.2
133 MaxProtocol = TLSv1.2
[all …]
D30-extended-master-secret.cnf.in26 "MaxProtocol" => "TLSv1.2"
39 "MaxProtocol" => "TLSv1.2"
53 "MaxProtocol" => "TLSv1.2"
69 "MaxProtocol" => "TLSv1.2"
73 "MaxProtocol" => "TLSv1.2"
87 "MaxProtocol" => "TLSv1.2"
100 "MaxProtocol" => "TLSv1.2"
114 "MaxProtocol" => "TLSv1.2"
D23-srp.cnf21 MaxProtocol = TLSv1.2
26 MaxProtocol = TLSv1.2
56 MaxProtocol = TLSv1.2
61 MaxProtocol = TLSv1.2
91 MaxProtocol = TLSv1.2
96 MaxProtocol = TLSv1.2
126 MaxProtocol = TLSv1.2
131 MaxProtocol = TLSv1.2
D17-renegotiate.cnf35 MaxProtocol = TLSv1.2
63 MaxProtocol = TLSv1.2
90 MaxProtocol = TLSv1.2
118 MaxProtocol = TLSv1.2
145 MaxProtocol = TLSv1.2
177 MaxProtocol = TLSv1.2
209 MaxProtocol = TLSv1.2
242 MaxProtocol = TLSv1.2
274 MaxProtocol = TLSv1.2
306 MaxProtocol = TLSv1.2
[all …]
D24-padding.cnf18 MaxProtocol = TLSv1.3
19 MinProtocol = TLSv1.3
25 MaxProtocol = TLSv1.3
26 MinProtocol = TLSv1.3
D28-seclevel.cnf10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2
129 [5-SECLEVEL 3 with ED448 key, TLSv1.2]
130 ssl_conf = 5-SECLEVEL 3 with ED448 key, TLSv1.2-ssl
132 [5-SECLEVEL 3 with ED448 key, TLSv1.2-ssl]
133 server = 5-SECLEVEL 3 with ED448 key, TLSv1.2-server
134 client = 5-SECLEVEL 3 with ED448 key, TLSv1.2-client
136 [5-SECLEVEL 3 with ED448 key, TLSv1.2-server]
139 MaxProtocol = TLSv1.2
142 [5-SECLEVEL 3 with ED448 key, TLSv1.2-client]
D20-cert-select.cnf80 MaxProtocol = TLSv1.2
85 MaxProtocol = TLSv1.2
112 MaxProtocol = TLSv1.2
118 MaxProtocol = TLSv1.2
145 MaxProtocol = TLSv1.2
151 MaxProtocol = TLSv1.2
178 MaxProtocol = TLSv1.2
183 MaxProtocol = TLSv1.2
211 MaxProtocol = TLSv1.2
216 MaxProtocol = TLSv1.2
[all …]
D24-padding.cnf.in18 "MaxProtocol" => "TLSv1.3",
19 "MinProtocol" => "TLSv1.3" },
21 "MaxProtocol" => "TLSv1.3",
22 "MinProtocol" => "TLSv1.3" },
D19-mac-then-encrypt.cnf31 MaxProtocol = TLSv1.2
55 MaxProtocol = TLSv1.2
81 MaxProtocol = TLSv1.2
107 MaxProtocol = TLSv1.2
131 MaxProtocol = TLSv1.2
157 MaxProtocol = TLSv1.2
183 MaxProtocol = TLSv1
184 MinProtocol = TLSv1
208 MaxProtocol = TLSv1
209 MinProtocol = TLSv1
[all …]
/third_party/openssl/doc/man3/
DSSL_get_version.pod25 than TLSv1.2 even if TLSv1.3 is subsequently negotiated. SSL_get_version()
44 =item TLSv1
46 The connection uses the TLSv1.0 protocol.
48 =item TLSv1.1
50 The connection uses the TLSv1.1 protocol.
52 =item TLSv1.2
54 The connection uses the TLSv1.2 protocol.
56 =item TLSv1.3
58 The connection uses the TLSv1.3 protocol.
77 The connection uses the TLSv1.0 protocol.
[all …]
DSSL_CONF_cmd.pod74 Disables all attempts at renegotiation in TLSv1.2 and earlier, same as setting
95 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means
105 This sets the supported signature algorithms for TLSv1.2 and TLSv1.3.
116 TLSv1.3, specified using the IETF name, e.g., B<ecdsa_secp256r1_sha256>,
124 identifiers) are ignored in TLSv1.3 and will not be negotiated.
129 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used
142 group to use. This setting affects groups used for signatures (in TLSv1.2
144 for the B<key_share> sent by a client in a TLSv1.3 B<ClientHello>.
152 Currently supported groups for B<TLSv1.3> are B<P-256>, B<P-384>, B<P-521>,
172 Sets the TLSv1.2 and below ciphersuite list to B<ciphers>. This list will be
[all …]
DSSL_CTX_use_psk_identity_hint.pod42 A server application wishing to use TLSv1.3 PSKs should set a callback
58 Identity hints are not relevant for TLSv1.3. A server application wishing to use
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
68 A server application wishing to use PSKs for TLSv1.2 and below must provide a
78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is
80 or SSL_set_psk_find_session_callback() for this purpose instead. If TLSv1.3 has
86 will default to SHA-256 for any returned PSK. TLSv1.3 early data exchanges are
90 A connection established via a TLSv1.3 PSK will appear as if session resumption
98 Return values from the TLSv1.2 and below server callback are interpreted as
128 There are no known security issues with sharing the same PSK between TLSv1.2 (or
[all …]

12345