Home
last modified time | relevance | path

Searched refs:protocol (Results 1 – 25 of 116) sorted by relevance

12345

/openssl/test/ssl-tests/
H A D04-client_auth.cnf.in32 my $protocol = $protocols[$_];
33 my $protocol_name = $protocol || "flex";
63 "MinProtocol" => $protocol,
64 "MaxProtocol" => $protocol
68 "MinProtocol" => $protocol,
69 "MaxProtocol" => $protocol
84 "MinProtocol" => $protocol,
85 "MaxProtocol" => $protocol,
90 "MinProtocol" => $protocol,
91 "MaxProtocol" => $protocol
[all …]
/openssl/doc/man3/
H A DSSL_get_version.pod50 The connection uses the SSLv3 protocol.
54 The connection uses the TLSv1.0 protocol.
58 The connection uses the TLSv1.1 protocol.
62 The connection uses the TLSv1.2 protocol.
66 The connection uses the TLSv1.3 protocol.
74 The connection uses the DTLSv1 protocol
78 The connection uses the DTLSv1.2 protocol
82 The connection uses the QUICv1 protocol.
97 The connection uses the SSLv3 protocol.
122 The connection uses the DTLSv1 protocol
[all …]
H A DSSL_CTX_set_alpn_select_cb.pod8 - handle application layer protocol negotiation (ALPN)
64 vector in protocol-list format. The value of the B<out>, B<outlen> vector
65 should be set to the value of a single protocol selected from the B<in>,
78 least one valid (nonempty) protocol entry in the list.
89 client needs to select a protocol from the server's provided list, and a
93 The length of the protocol name must be written into B<outlen>. The
96 select a protocol (although it may be an empty, zero length protocol). It is
113 is set to 0 if no protocol has been selected. B<data> must not be freed.
116 client's requested protocol for this connection. If the client did not
119 the client can request any protocol it chooses. The value returned from
[all …]
H A DBIO_ADDRINFO.pod25 int family, int socktype, int protocol, BIO_ADDRINFO **res);
47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to
48 determine what protocol family, socket type and protocol should be used for
51 indicates that any type can be used. B<protocol> specifies a protocol such as
52 IPPROTO_TCP, IPPROTO_UDP or IPPORTO_SCTP. If set to 0 than any protocol can be
60 to select based on the protocol (any protocol may be returned).
70 BIO_ADDRINFO_protocol() returns the protocol id of the given
95 function. On Linux it is known that specifying 0 for the protocol will not
97 address is required then the B<protocol> parameter to BIO_lookup_ex() should be
H A DSSL_CTX_set_min_proto_version.pod9 and maximum supported protocol version
27 The functions get or set the minimum and maximum supported protocol versions
31 specific protocol versions.
32 Use these functions instead of disabling specific protocol versions.
34 Setting the minimum or maximum version to 0, will enable protocol
52 lowest or highest protocol, respectively.
H A DSSL_CTX_set_msg_callback.pod10 - install callback for observing protocol messages
35 protocol messages (such as handshake messages) that are received or
54 This flag is B<0> when a protocol message has been received and B<1>
55 when a protocol message has been sent.
59 The protocol version according to which the protocol message is
67 This is one of the content type values defined in the protocol specification
69 B<SSL3_RT_APPLICATION_DATA> because the callback will only be called for protocol
76 I<buf> points to a buffer containing the protocol message or other data (in the
104 If processing a received protocol message results in an error,
109 Due to automatic protocol version negotiation, I<version> is not
[all …]
H A DSSL_CTX_new.pod142 TLSv1.2 protocol. These methods are deprecated.
147 TLSv1.1 protocol. These methods are deprecated.
152 TLSv1 protocol. These methods are deprecated.
157 SSLv3 protocol.
158 The SSLv3 protocol is deprecated and should not be used.
183 All other methods only support one specific protocol version.
201 disable either all previous or all subsequent protocol versions.
202 In clients, when a protocol version is disabled without disabling I<all>
204 protocol versions.
206 The SSLv3 protocol is deprecated and should generally not be used.
[all …]
H A DSSL_SESSION_get_protocol_version.pod7 - get and set the session protocol version
18 SSL_SESSION_get_protocol_version() returns the protocol version number used
21 SSL_SESSION_set_protocol_version() sets the protocol version associated with the
28 SSL_SESSION_get_protocol_version() returns a number indicating the protocol
H A DBIO_ADDR.pod55 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of
58 for the B<AF_UNIX> protocol family, where B<port> is meaningless and
65 BIO_ADDR_family() returns the protocol family of the given
88 B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The
95 for B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The
101 protocol family AF_UNIX. The returned string has been allocated
110 depending on the protocol family the address is for.
H A DSSL_CIPHER_get_name.pod60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
125 =item <protocol version>
127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.
128 Note that this is not always the same as the protocol version in which the
130 with earlier protocol versions.
181 protocol-specific ID.
191 correct protocol string in OpenSSL 1.1.0.
H A DSSL_get_default_timeout.pod16 SSL_SESSION objects negotiated for the protocol valid for B<ssl>.
24 timeout for the protocol will be used.
H A DSSL_in_init.pod56 B<protocol>_ST_B<role>_B<message>
58 B<protocol> is one of TLS or DTLS. DTLS is used where a state is specific to the
59 DTLS protocol. Otherwise TLS is used.
H A DSSL_get_handshake_rtt.pod38 protocol-level messages and the TLS protocol is not designed to measure
H A DSSL_alert_type_string.pod175 =item "PV"/"protocol version"
177 The protocol version the client has attempted to negotiate is
178 recognized, but not supported. (For example, old protocol
192 protocol makes it impossible to continue (such as a memory
198 protocol failure. If the user cancels an operation after the
H A DSSL_SESSION_get0_hostname.pod38 SSL_SESSION_get0_alpn_selected() retrieves the selected ALPN protocol for this
42 SSL_SESSION_set1_alpn_selected() sets the ALPN protocol for this session to the
H A DSSL_CONF_cmd.pod109 Enables strict mode protocol handling. Equivalent to setting
216 Sets the minimum and maximum supported protocol.
217 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
445 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
457 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
468 TLS or DTLS protocol.
472 If a protocol is preceded by B<-> that version is disabled.
474 All protocol versions are enabled by default.
477 Only enabling some protocol versions does not disable the other protocol
512 SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. It
[all …]
/openssl/test/recipes/
H A D80-test_ssl_old.t528 foreach my $protocol (@protocols) {
534 $ciphersstatus{$protocol} = $ciphersstatus;
554 foreach my $protocol (@protocols) {
555 ok($ciphersstatus{$protocol}, "Getting ciphers for $protocol");
558 foreach my $protocol (sort keys %ciphersuites) {
559 note "Testing ciphersuites for $protocol";
562 my $flag = $protocol eq "-tls1_3" ? "" : $protocol;
567 note "*****SKIPPING $protocol $cipher";
573 if ($protocol eq "-tls1_3") {
586 next if $protocol eq "-tls1_3";
[all …]
/openssl/apps/lib/
H A Ds_socket.c77 int family, int type, int protocol, int tfo, int doconn, in init_client() argument
91 ret = BIO_lookup_ex(host, port, BIO_LOOKUP_CLIENT, family, type, protocol, in init_client()
100 family, type, protocol, &bindaddr); in init_client()
115 && (protocol == 0 in init_client()
116 || protocol == BIO_ADDRINFO_protocol(ai))); in init_client()
147 if (protocol == IPPROTO_SCTP) { in init_client()
288 int family, int type, int protocol, do_server_cb cb, in do_server() argument
317 && (protocol == 0 || protocol == BIO_ADDRINFO_protocol(res))); in do_server()
362 if (protocol == IPPROTO_SCTP) { in do_server()
415 i = (*cb)(sock, type, protocol, context); in do_server()
[all …]
/openssl/crypto/rand/
H A Drand_egd.c72 int protocol, in hpns_socket() argument
82 return socket(family, type, protocol); in hpns_socket()
87 return socket(family, type, protocol); in hpns_socket()
93 socket_rc = socket(family, type, protocol); in hpns_socket()
/openssl/doc/man7/
H A Dossl-guide-quic-introduction.pod18 QUIC is a general purpose protocol for enabling applications to securely
21 TLS protocol for connection establishment but independently protects packets.
34 application protocol to avoid problems where one packet of data is held up
69 update to be deployed. Future evolutions and enhancements to the QUIC protocol
83 OpenSSL is how time is handled. The QUIC protocol requires various actions to be
108 QUIC reuses parts of the TLS protocol in its implementation. Specifically the
110 QUIC protocol messages in order to send them to the peer. Once the TLS handshake
111 is complete all application data is sent entirely using QUIC protocol messages
148 TLS assumes "stream" type semantics for its underlying transport layer protocol
H A Dossl-guide-tls-introduction.pod37 TLS is a standardised protocol and there are numerous different implementations
41 the protocol has undergone various changes over the years. Consequently there
42 are different versions of the protocol available. TLS includes the ability to
43 perform version negotiation so that the highest protocol version that the client
46 TLS acts as a security layer over some lower level transport protocol. Typically
54 protocol moved to the IETF which released the first version of TLS (TLSv1.0) in
60 protocol. The IETF have formally deprecated TLSv1.1 and TLSv1.0, so anything
61 below TLSv1.2 should be avoided since the older protocol versions are
70 OpenSSL will always try to negotiate the highest protocol version that it has
283 level application protocol (for example HTTP). Not all information exchanged
[all …]
/openssl/apps/include/
H A Ds_apps.h25 int family, int type, int protocol, do_server_cb cb,
39 int family, int type, int protocol, int tfo, int doconn,
/openssl/doc/designs/quic-design/
H A Ddebugging.md4 When debugging the QUIC stack it is extremely useful to have protocol traces
14 QUIC protocol itself without storing bulk data. This includes both transmitted
74 protocol implementation, for the purposes of reducing the volume of logging
88 QUIC protocol decoding support.
95 **Keylogs.** Since QUIC is an encrypted protocol, Wireshark cannot provide much
/openssl/
H A DREADME-QUIC.md28 QUIC is a state-of-the-art secure transport protocol carried over UDP. It can
45 ### How can I use OpenSSL QUIC in my own application for a different protocol?
80 …/www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids
H A DREADME.md16 The protocol implementations are based on a full-strength general purpose
43 an implementation of all TLS protocol versions up to TLSv1.3 ([RFC 8446]),
44 DTLS protocol versions up to DTLSv1.2 ([RFC 6347]) and
45 the QUIC (currently client side only) version 1 protocol ([RFC 9000]).
140 * [Information about the OpenSSL QUIC protocol implementation](README-QUIC.md)

Completed in 44 milliseconds

12345