/openssl/test/ssl-tests/ |
H A D | protocol_version.pm | 46 my @protocols = @{$protref}; 50 foreach my $i (0..$#protocols) { 62 my @protocols = @{$protref}; 66 foreach my $i (0..$#protocols) { 68 && ($protocols[$i] ne "TLSv1.3" 121 my @protocols; 229 my @protocols; 344 $protocols) = @_; 345 my @prots = @$protocols; 362 || ($orig_c_max != scalar @$protocols [all …]
|
H A D | 04-client_auth.cnf.in | 16 my @protocols; 21 @protocols = (undef, "TLSv1.2", "DTLSv1.2"); 24 @protocols = (undef, "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2", "DTLSv1", "DTLSv1.2"); 31 foreach (0..$#protocols) { 32 my $protocol = $protocols[$_];
|
/openssl/test/recipes/ |
H A D | 80-test_ssl_old.t | 447 my @protocols = (); 449 push @protocols, "-tls1_3" unless $no_tls1_3; 450 push @protocols, "-tls1_2" unless $no_tls1_2; 451 push @protocols, "-tls1" unless $no_tls1 || $provider eq "fips"; 452 push @protocols, "-ssl3" unless $no_ssl3 || $provider eq "fips"; 460 foreach my $protocol (@protocols) { 481 my $testcount = scalar(@protocols) + $protocolciphersuitecount 486 foreach my $protocol (@protocols) {
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_alpn_select_cb.pod | 53 set the list of protocols available to be negotiated. The B<protos> must be in 69 SSL_select_next_proto() is a helper function used to select protocols. It 86 server's advertised protocols are provided in B<in> and B<inlen>. The 93 when a TLS server needs a list of supported protocols for Next Protocol 111 this function need not be a member of the list of supported protocols 171 ALPN protocol not selected, e.g., because no ALPN protocols are configured for
|
H A D | SSL_CTX_new.pod | 126 The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3. 163 Currently supported protocols are DTLS 1.0 and DTLS 1.2. 186 If you want to limit the supported protocols for the version flexible 192 allow newer protocols like TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3. 194 The list of protocols available can also be limited using the 200 protocols they support. When disabling a protocol, make sure that you also
|
H A D | SSL_get_default_timeout.pod | 27 for all currently supported protocols.
|
H A D | SSL_get_client_random.pod | 52 use in low-level protocols. You probably should not use them, unless 67 In current versions of the TLS protocols, the length of client_random
|
H A D | SSL_CTX_set_timeout.pod | 42 All currently supported protocols have the same default timeout value
|
H A D | DTLSv1_listen.pod | 27 Some transport protocols (such as UDP) can be susceptible to amplification 39 stream-based transport protocols (e.g. QUIC) may not validate the source
|
H A D | SSL_CONF_cmd.pod | 425 The B<value> argument is a comma separated list of supported protocols 439 This can't enable protocols that are disabled using B<MinProtocol> 440 or B<MaxProtocol>, but can disable protocols that are still allowed 446 protocols has no "holes", e.g. if TLS 1.0 and TLS 1.2 are both enabled, make 671 There are various ways to select the supported protocols. 674 This is the recommended way to disable protocols. 682 The following will first enable all protocols, and then disable
|
H A D | SSL_connect.pod | 44 typical for many protocols) then this data could be buffered until an ACK has
|
H A D | SSL_get_ciphers.pod | 45 a gap in the list of supported protocols, and some ciphers may not be
|
H A D | BF_encrypt.pod | 68 to decrypt. Some programs and protocols simplify this, like SSH, where
|
/openssl/doc/designs/quic-design/ |
H A D | quic-requirements.md | 24 interactions between TLS, DTLS, KTLS and the planned QUIC protocols. The pluggable 87 existing (or future) security protocols and to select between them with minimal 94 encompass that capability for all protocols will need to be added.
|
/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 108 [B<-alpn> I<protocols>] 109 [B<-nextprotoneg> I<protocols>] 670 This option is used to specify hostname information for various protocols 711 =item B<-alpn> I<protocols>, B<-nextprotoneg> I<protocols> 716 The I<protocols> list is a comma-separated list of protocol names that 718 desirable protocols first. Protocol names are printable ASCII strings, 720 An empty list of protocols is treated specially and will cause the 722 after receiving ServerHello with a list of server supported protocols.
|
H A D | openssl-s_time.pod.in | 171 L<openssl-s_client(1)> program to turn protocols on and off, you may not 172 be able to measure the performance of all protocols with all servers.
|
H A D | openssl.pod | 19 and Transport Layer Security (TLS) network protocols and related 575 Note that not all protocols and flags may be available, depending on how 582 These options require or disable the use of the specified SSL or TLS protocols.
|
H A D | openssl-dgst.pod.in | 247 with existing formats and protocols.
|
H A D | openssl-ciphers.pod.in | 84 Note that not all protocols and flags may be available, depending on how
|
/openssl/doc/man7/ |
H A D | ssl.pod | 15 Security protocols.
|
H A D | EVP_PKEY-DH.pod | 46 For protocols that only transfer I<p> and I<g> the value of I<q> can also be
|
H A D | crypto.pod | 17 and protocols.
|
/openssl/test/ |
H A D | README.ssltest.md | 189 protocols can be specified as a comma-separated list, and a callback with the 275 protocols: a build with `enable-ssl3` has different test expectations than a
|
H A D | README-dev.md | 38 80-89 "larger" protocols (CA, CMS, OCSP, SSL, TSA)
|
H A D | sslapitest.c | 6006 const int protocols[] = { in test_export_key_mat() local 6038 OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols)); in test_export_key_mat() 6039 SSL_CTX_set_max_proto_version(cctx, protocols[tst]); in test_export_key_mat() 6040 SSL_CTX_set_min_proto_version(cctx, protocols[tst]); in test_export_key_mat() 6041 if ((protocols[tst] < TLS1_2_VERSION) && in test_export_key_mat()
|