Home
last modified time | relevance | path

Searched refs:TLSv1 (Results 1 – 16 of 16) sorted by relevance

/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLContextImpl.java172 public static final class TLSv1 extends OpenSSLContextImpl { class in OpenSSLContextImpl
173 public TLSv1() { in TLSv1() method in OpenSSLContextImpl.TLSv1
/external/conscrypt/libcore-stub/src/main/java/libcore/java/security/
DStandardNames.java581 provideSslContextEnabledProtocols("TLS", TLSVersion.TLSv1, TLSVersion.TLSv12);
582 provideSslContextEnabledProtocols("TLSv1", TLSVersion.TLSv1, TLSVersion.TLSv12);
583 provideSslContextEnabledProtocols("TLSv1.1", TLSVersion.TLSv1, TLSVersion.TLSv12);
584 provideSslContextEnabledProtocols("TLSv1.2", TLSVersion.TLSv1, TLSVersion.TLSv12);
585 provideSslContextEnabledProtocols("Default", TLSVersion.TLSv1, TLSVersion.TLSv12);
612 TLSv1("TLSv1"), enumConstant
/external/minijail/
Dget_googletest.sh5 wget -q -nc --secure-protocol=TLSv1 "https://github.com/google/googletest/archive/release-${PV}.tar…
/external/curl/docs/cmdline-opts/
Dtlsv1.d9 Help: Use TLSv1.0 or greater
/external/curl/docs/
DFEATURES75 - force usage of a specific SSL version (SSLv2 (*7), SSLv3 (*10) or TLSv1)
196 example, only supports SSLv3 and TLSv1
DMANUAL711 version to use (for SSLv3, SSLv2 or TLSv1 respectively):
/external/python/cpython2/Doc/library/
Dssl.rst31 cause variations in behavior. For example, TLSv1.1 and TLSv1.2 come with
191 … *client* / **server** **SSLv2** **SSLv3** **SSLv23** **TLSv1** **TLSv1.1** **TLSv1.2**
196 *TLSv1* no no yes yes no no
197 *TLSv1.1* no no yes no yes no
198 *TLSv1.2* no no yes no no yes
682 Prevents a TLSv1 connection. This option is only applicable in
684 choosing TLSv1 as the protocol version.
690 Prevents a TLSv1.1 connection. This option is only applicable in conjunction
691 with :const:`PROTOCOL_SSLv23`. It prevents the peers from choosing TLSv1.1 as
698 Prevents a TLSv1.2 connection. This option is only applicable in conjunction
[all …]
/external/okhttp/
DCHANGELOG.md390 * **TLS configuration updated.** OkHttp now explicitly enables TLSv1.2,
391 TLSv1.1 and TLSv1.0 where they are supported. It will continue to perform
/external/wpa_supplicant_8/wpa_supplicant/
DREADME101 - TLSv1
108 TLSv1/X.509/ASN.1/RSA/bignum parts are about 25 kB on x86)
172 - internal TLSv1 implementation
307 TLSv1 implementation can be used for TLS functionality.
Ddefconfig301 # internal = Internal TLSv1 implementation (experimental)
Dandroid.config289 # internal = Internal TLSv1 implementation (experimental)
DChangeLog201 * added option to disable TLSv1.0 with OpenSSL
1165 internal X.509/TLSv1 implementation
1330 * added experimental, integrated TLSv1 client implementation with the
1337 of it was already required; TLSv1/X.509/ASN.1/RSA added about 25 kB)
1432 * added an experimental TLSv1 client implementation
/external/wpa_supplicant_8/hostapd/
Ddefconfig267 # internal = Internal TLSv1 implementation (experimental)
DChangeLog631 internal X.509/TLSv1 implementation
634 * fixed internal TLSv1 implementation for abbreviated handshake (used
714 * added experimental, integrated TLSv1 server implementation with the
/external/libmtp/logs/
Dmtp-detect-xiaomi-hm-note.txt17 by sog-mx-2.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256)
/external/curl/
DCHANGES.013350 - John Lask added the -1/--TLSv1 options that forces SSL into using TLS