Searched refs:v1 (Results 1 – 13 of 13) sorted by relevance
38 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3.49 TLS v1.0 or later61 TLS v1.0 or later (Added in 7.34.0)65 TLS v1.1 or later (Added in 7.34.0)69 TLS v1.2 or later (Added in 7.34.0)73 TLS v1.3 or later (Added in 7.52.0)85 which was TLS v1.2 up to before 7.61.0 and is TLS v1.3 since then - assuming90 The flag defines maximum supported TLS version as TLS v1.0.95 The flag defines maximum supported TLS version as TLS v1.1.100 The flag defines maximum supported TLS version as TLS v1.2.[all …]
16 CURLOPT_HAPROXYPROTOCOL - send HAProxy PROXY protocol v1 header30 protocol v1 header at beginning of the connection. The default action is not to
31 library sends this address as client address in the HAProxy PROXY protocol v1
5 Help: Send HAProxy PROXY protocol v1 header18 Send a HAProxy PROXY protocol v1 header at the beginning of the connection.
19 Sets a client IP in HAProxy PROXY protocol v1 header at the beginning of the
56 Cookie: c1=v1
89 "<assembly xmlns=""urn:schemas-microsoft-com:asm.v1"" manifestVersion=""1.0"">"94 "<compatibility xmlns=""urn:schemas-microsoft-com:compatibility.v1"">"
531 const struct writeoutvar *v1 = m1; in matchvar() local534 return strcmp(v1->name, v2->name); in matchvar()
98 …uses: gaurav-nelson/github-action-markdown-link-check@5c5dfc0ac2e225883c0e5f03a85311ec2830d368 # v1
197 uses: vmactions/omnios-vm@16b5996777bc675acd3d537f13df536a526cd16d # v1
366 rem %4 - Build type (TRUE for legacy aka pre v1.1.0; otherwise FALSE)449 rem %3 - Build type (TRUE for legacy aka pre v1.1.0; otherwise FALSE)488 rem %3 - Build type (TRUE for legacy aka pre v1.1.0; otherwise FALSE)
390 Send an HAProxy PROXY protocol v1 header. See CURLOPT_HAPROXYPROTOCOL(3)394 Spoof the client IP in an HAProxy PROXY protocol v1 header. See
802 message(WARNING "zstd v1.0.0 or newer is required, disabling zstd support.")
Completed in 29 milliseconds