Home
last modified time | relevance | path

Searched refs:TLSv1 (Results 1 – 25 of 33) sorted by relevance

12

/external/curl/docs/cmdline-opts/
Dtls-max.d17 Use up to TLSv1.0.
19 Use up to TLSv1.1.
21 Use up to TLSv1.2.
23 Use up to TLSv1.3.
Dproxy-tlsv1.d2 Help: Use TLSv1 for HTTPS proxy
Dtlsv1.0.d2 Help: Use TLSv1.0 or greater
Dtlsv1.2.d2 Help: Use TLSv1.2 or greater
Dtlsv1.1.d2 Help: Use TLSv1.1 or greater
Dtlsv1.d9 Help: Use TLSv1.0 or greater
Dtlsv1.3.d2 Help: Use TLSv1.3 or greater
/external/conscrypt/
DCAPABILITIES.md13 * `TLSv1`
14 * `TLSv1.1`
15 * `TLSv1.2`
16 * `TLSv1.3`
28 * `TLSv1`
29 * `TLSv1.1`
30 * `TLSv1.2`
31 * `TLSv1.3`
37 The `Default`, `SSL`, `TLS`, and `TLSv1.3` values return a context where TLS
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/java/security/
DStandardNames.java134 provideSslContextEnabledProtocols("TLS", TLSVersion.TLSv1, TLSVersion.TLSv13);
135 provideSslContextEnabledProtocols("TLSv1", TLSVersion.TLSv1, TLSVersion.TLSv12);
136 provideSslContextEnabledProtocols("TLSv1.1", TLSVersion.TLSv1, TLSVersion.TLSv12);
137 provideSslContextEnabledProtocols("TLSv1.2", TLSVersion.TLSv1, TLSVersion.TLSv12);
138 provideSslContextEnabledProtocols("TLSv1.3", TLSVersion.TLSv1, TLSVersion.TLSv13);
139 provideSslContextEnabledProtocols("Default", TLSVersion.TLSv1, TLSVersion.TLSv13);
163 TLSv1("TLSv1"), enumConstant
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/
DStandardNames.java132 provideSslContextEnabledProtocols("TLS", TLSVersion.TLSv1, TLSVersion.TLSv13);
133 provideSslContextEnabledProtocols("TLSv1", TLSVersion.TLSv1, TLSVersion.TLSv12);
134 provideSslContextEnabledProtocols("TLSv1.1", TLSVersion.TLSv1, TLSVersion.TLSv12);
135 provideSslContextEnabledProtocols("TLSv1.2", TLSVersion.TLSv1, TLSVersion.TLSv12);
136 provideSslContextEnabledProtocols("TLSv1.3", TLSVersion.TLSv1, TLSVersion.TLSv13);
137 provideSslContextEnabledProtocols("Default", TLSVersion.TLSv1, TLSVersion.TLSv13);
161 TLSv1("TLSv1"), enumConstant
/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLContextImpl.java184 public static final class TLSv1 extends OpenSSLContextImpl { class in OpenSSLContextImpl
185 public TLSv1() { in TLSv1() method in OpenSSLContextImpl.TLSv1
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DOpenSSLContextImpl.java203 public static final class TLSv1 extends OpenSSLContextImpl { class in OpenSSLContextImpl
205 public TLSv1() { in TLSv1() method in OpenSSLContextImpl.TLSv1
/external/minijail/
Dget_googletest.sh5 wget -q -nc --secure-protocol=TLSv1 "https://github.com/google/googletest/archive/release-${PV}.tar…
/external/python/cpython3/Doc/library/
Dssl.rst28 cause variations in behavior. For example, TLSv1.1 and TLSv1.2 come with
774 Prevents a TLSv1 connection. This option is only applicable in
776 choosing TLSv1 as the protocol version.
787 Prevents a TLSv1.1 connection. This option is only applicable in conjunction
788 with :const:`PROTOCOL_TLS`. It prevents the peers from choosing TLSv1.1 as
798 Prevents a TLSv1.2 connection. This option is only applicable in conjunction
799 with :const:`PROTOCOL_TLS`. It prevents the peers from choosing TLSv1.2 as
809 Prevents a TLSv1.3 connection. This option is only applicable in conjunction
810 with :const:`PROTOCOL_TLS`. It prevents the peers from choosing TLSv1.3 as
823 Disable all renegotiation in TLSv1.2 and earlier. Do not send
[all …]
/external/python/cpython2/Doc/library/
Dssl.rst34 cause variations in behavior. For example, TLSv1.1 and TLSv1.2 come with
194 … *client* / **server** **SSLv2** **SSLv3** **SSLv23** **TLSv1** **TLSv1.1** **TLSv1.2**
199 *TLSv1* no no yes yes no no
200 *TLSv1.1* no no yes no yes no
201 *TLSv1.2* no no yes no no yes
695 Prevents a TLSv1 connection. This option is only applicable in
697 choosing TLSv1 as the protocol version.
703 Prevents a TLSv1.1 connection. This option is only applicable in conjunction
704 with :const:`PROTOCOL_SSLv23`. It prevents the peers from choosing TLSv1.1 as
711 Prevents a TLSv1.2 connection. This option is only applicable in conjunction
[all …]
/external/curl/docs/
DFEATURES75 - force usage of a specific SSL version (SSLv2 (*7), SSLv3 (*10) or TLSv1)
195 example, only supports SSLv3 and TLSv1
/external/grpc-grpc-java/buildscripts/
Dmake_dependencies.bat22 @rem GitHub requires TLSv1.2, and for whatever reason our powershell doesn't have it enabled
/external/conscrypt/srcgen/
Dintra-core-api.txt48 method:com.android.org.conscrypt.OpenSSLContextImpl$TLSv1#TLSv1()
156 type:com.android.org.conscrypt.OpenSSLContextImpl$TLSv1
/external/wpa_supplicant_8/hostapd/
Ddefconfig272 # internal = Internal TLSv1 implementation (experimental)
273 # linux = Linux kernel AF_ALG and internal TLSv1 implementation (experimental)
/external/python/cpython3/Lib/test/
Dtest_ssl.py1130 ssl.TLSVersion.TLSv1,
1148 ctx.maximum_version = ssl.TLSVersion.TLSv1
1153 ctx.maximum_version, ssl.TLSVersion.TLSv1
1164 {ssl.TLSVersion.TLSv1, ssl.TLSVersion.SSLv3}
1187 ctx.maximum_version = ssl.TLSVersion.TLSv1
3697 client_context.minimum_version = ssl.TLSVersion.TLSv1
3710 server_context.minimum_version = ssl.TLSVersion.TLSv1
3722 client_context.minimum_version = ssl.TLSVersion.TLSv1
3723 client_context.maximum_version = ssl.TLSVersion.TLSv1
/external/okhttp/
DCHANGELOG.md390 * **TLS configuration updated.** OkHttp now explicitly enables TLSv1.2,
391 TLSv1.1 and TLSv1.0 where they are supported. It will continue to perform
/external/wpa_supplicant_8/wpa_supplicant/
DREADME101 - TLSv1
108 TLSv1/X.509/ASN.1/RSA/bignum parts are about 25 kB on x86)
172 - internal TLSv1 implementation
307 TLSv1 implementation can be used for TLS functionality.
Ddefconfig310 # internal = Internal TLSv1 implementation (experimental)
311 # linux = Linux kernel AF_ALG and internal TLSv1 implementation (experimental)
/external/python/cpython3/Misc/NEWS.d/
D3.7.0b2.rst121 Add OP_ENABLE_MIDDLEBOX_COMPAT and test workaround for TLSv1.3 for future
/external/python/cpython3/Lib/
Dssl.py161 TLSv1 = _ssl.PROTO_TLSv1 variable in TLSVersion

12