Home
last modified time | relevance | path

Searched refs:protocols (Results 1 – 25 of 28) sorted by relevance

12

/openssl/test/ssl-tests/
H A Dprotocol_version.pm46 my @protocols = @{$protref};
50 foreach my $i (0..$#protocols) {
62 my @protocols = @{$protref};
66 foreach my $i (0..$#protocols) {
68 && ($protocols[$i] ne "TLSv1.3"
121 my @protocols;
229 my @protocols;
344 $protocols) = @_;
345 my @prots = @$protocols;
362 || ($orig_c_max != scalar @$protocols
[all …]
H A D04-client_auth.cnf.in16 my @protocols;
21 @protocols = (undef, "TLSv1.2", "DTLSv1.2");
24 @protocols = (undef, "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2", "DTLSv1", "DTLSv1.2");
31 foreach (0..$#protocols) {
32 my $protocol = $protocols[$_];
/openssl/test/recipes/
H A D80-test_ssl_old.t447 my @protocols = ();
449 push @protocols, "-tls1_3" unless $no_tls1_3;
450 push @protocols, "-tls1_2" unless $no_tls1_2;
451 push @protocols, "-tls1" unless $no_tls1 || $provider eq "fips";
452 push @protocols, "-ssl3" unless $no_ssl3 || $provider eq "fips";
460 foreach my $protocol (@protocols) {
481 my $testcount = scalar(@protocols) + $protocolciphersuitecount
486 foreach my $protocol (@protocols) {
/openssl/doc/man3/
H A DSSL_CTX_set_alpn_select_cb.pod53 set the list of protocols available to be negotiated. The B<protos> must be in
69 SSL_select_next_proto() is a helper function used to select protocols. It
86 server's advertised protocols are provided in B<in> and B<inlen>. The
93 when a TLS server needs a list of supported protocols for Next Protocol
111 this function need not be a member of the list of supported protocols
171 ALPN protocol not selected, e.g., because no ALPN protocols are configured for
H A DSSL_CTX_new.pod126 The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3.
163 Currently supported protocols are DTLS 1.0 and DTLS 1.2.
186 If you want to limit the supported protocols for the version flexible
192 allow newer protocols like TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3.
194 The list of protocols available can also be limited using the
200 protocols they support. When disabling a protocol, make sure that you also
H A DSSL_get_default_timeout.pod27 for all currently supported protocols.
H A DSSL_get_client_random.pod52 use in low-level protocols. You probably should not use them, unless
67 In current versions of the TLS protocols, the length of client_random
H A DSSL_CTX_set_timeout.pod42 All currently supported protocols have the same default timeout value
H A DDTLSv1_listen.pod27 Some transport protocols (such as UDP) can be susceptible to amplification
39 stream-based transport protocols (e.g. QUIC) may not validate the source
H A DSSL_CONF_cmd.pod425 The B<value> argument is a comma separated list of supported protocols
439 This can't enable protocols that are disabled using B<MinProtocol>
440 or B<MaxProtocol>, but can disable protocols that are still allowed
446 protocols has no "holes", e.g. if TLS 1.0 and TLS 1.2 are both enabled, make
671 There are various ways to select the supported protocols.
674 This is the recommended way to disable protocols.
682 The following will first enable all protocols, and then disable
H A DSSL_connect.pod44 typical for many protocols) then this data could be buffered until an ACK has
H A DSSL_get_ciphers.pod45 a gap in the list of supported protocols, and some ciphers may not be
H A DBF_encrypt.pod68 to decrypt. Some programs and protocols simplify this, like SSH, where
/openssl/doc/designs/quic-design/
H A Dquic-requirements.md24 interactions between TLS, DTLS, KTLS and the planned QUIC protocols. The pluggable
87 existing (or future) security protocols and to select between them with minimal
94 encompass that capability for all protocols will need to be added.
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in108 [B<-alpn> I<protocols>]
109 [B<-nextprotoneg> I<protocols>]
670 This option is used to specify hostname information for various protocols
711 =item B<-alpn> I<protocols>, B<-nextprotoneg> I<protocols>
716 The I<protocols> list is a comma-separated list of protocol names that
718 desirable protocols first. Protocol names are printable ASCII strings,
720 An empty list of protocols is treated specially and will cause the
722 after receiving ServerHello with a list of server supported protocols.
H A Dopenssl-s_time.pod.in171 L<openssl-s_client(1)> program to turn protocols on and off, you may not
172 be able to measure the performance of all protocols with all servers.
H A Dopenssl.pod19 and Transport Layer Security (TLS) network protocols and related
575 Note that not all protocols and flags may be available, depending on how
582 These options require or disable the use of the specified SSL or TLS protocols.
H A Dopenssl-dgst.pod.in247 with existing formats and protocols.
H A Dopenssl-ciphers.pod.in84 Note that not all protocols and flags may be available, depending on how
/openssl/doc/man7/
H A Dssl.pod15 Security protocols.
H A DEVP_PKEY-DH.pod46 For protocols that only transfer I<p> and I<g> the value of I<q> can also be
H A Dcrypto.pod17 and protocols.
/openssl/test/
H A DREADME.ssltest.md189 protocols can be specified as a comma-separated list, and a callback with the
275 protocols: a build with `enable-ssl3` has different test expectations than a
H A DREADME-dev.md38 80-89 "larger" protocols (CA, CMS, OCSP, SSL, TSA)
H A Dsslapitest.c6006 const int protocols[] = { in test_export_key_mat() local
6038 OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols)); in test_export_key_mat()
6039 SSL_CTX_set_max_proto_version(cctx, protocols[tst]); in test_export_key_mat()
6040 SSL_CTX_set_min_proto_version(cctx, protocols[tst]); in test_export_key_mat()
6041 if ((protocols[tst] < TLS1_2_VERSION) && in test_export_key_mat()

Completed in 84 milliseconds

12