Home
last modified time | relevance | path

Searched refs:protocol (Results 1 – 25 of 82) sorted by relevance

1234

/openssl-master/test/ssl-tests/
A D04-client_auth.cnf.in32 my $protocol = $protocols[$_];
33 my $protocol_name = $protocol || "flex";
63 "MinProtocol" => $protocol,
64 "MaxProtocol" => $protocol
68 "MinProtocol" => $protocol,
69 "MaxProtocol" => $protocol
84 "MinProtocol" => $protocol,
85 "MaxProtocol" => $protocol,
90 "MinProtocol" => $protocol,
91 "MaxProtocol" => $protocol
[all …]
A Dprotocol_version.pm153 my ($result, $protocol) =
171 "ExpectedProtocol" => $protocol,
/openssl-master/doc/man3/
A DSSL_get_version.pod6 protocol information of a connection
42 The connection uses the SSLv3 protocol.
46 The connection uses the TLSv1.0 protocol.
50 The connection uses the TLSv1.1 protocol.
54 The connection uses the TLSv1.2 protocol.
58 The connection uses the TLSv1.3 protocol.
62 This indicates an unknown protocol version.
73 The connection uses the SSLv3 protocol.
77 The connection uses the TLSv1.0 protocol.
81 The connection uses the TLSv1.1 protocol.
[all …]
A DSSL_CTX_set_alpn_select_cb.pod8 - handle application layer protocol negotiation (ALPN)
63 vector in protocol-list format. The value of the B<out>, B<outlen> vector
64 should be set to the value of a single protocol selected from the B<in>,
81 client needs to select a protocol from the server's provided list, and a
85 The length of the protocol name must be written into B<outlen>. The
88 select a protocol. It is fatal to the connection if this callback returns
94 Negotiation. The returned list must be in protocol-list format, described
104 is set to 0 if no protocol has been selected. B<data> must not be freed.
107 client's requested protocol for this connection. If the client did not
110 the client can request any protocol it chooses. The value returned from
[all …]
A DBIO_ADDRINFO.pod25 int family, int socktype, int protocol, BIO_ADDRINFO **res);
47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to
48 determine what protocol family, socket type and protocol should be used for
51 indicates that any type can be used. B<protocol> specifies a protocol such as
52 IPPROTO_TCP, IPPROTO_UDP or IPPORTO_SCTP. If set to 0 than any protocol can be
60 to select based on the protocol (any protocol may be returned).
70 BIO_ADDRINFO_protocol() returns the protocol id of the given
95 function. On Linux it is known that specifying 0 for the protocol will not
97 address is required then the B<protocol> parameter to BIO_lookup_ex() should be
A DSSL_CTX_set_msg_callback.pod9 - install callback for observing protocol messages
31 protocol messages (such as handshake messages) that are received or
50 This flag is B<0> when a protocol message has been received and B<1>
51 when a protocol message has been sent.
55 The protocol version according to which the protocol message is
61 This is one of the content type values defined in the protocol specification
63 B<SSL3_RT_APPLICATION_DATA> because the callback will only be called for protocol
70 I<buf> points to a buffer containing the protocol message or other data (in the
91 If processing a received protocol message results in an error,
96 Due to automatic protocol version negotiation, I<version> is not
[all …]
A DSSL_CTX_set_min_proto_version.pod9 and maximum supported protocol version
27 The functions get or set the minimum and maximum supported protocol versions
31 specific protocol versions.
32 Use these functions instead of disabling specific protocol versions.
34 Setting the minimum or maximum version to 0, will enable protocol
49 lowest or highest protocol, respectively.
A DSSL_CTX_new.pod142 TLSv1.2 protocol. These methods are deprecated.
147 TLSv1.1 protocol. These methods are deprecated.
152 TLSv1 protocol. These methods are deprecated.
157 SSLv3 protocol.
158 The SSLv3 protocol is deprecated and should not be used.
183 All other methods only support one specific protocol version.
201 disable either all previous or all subsequent protocol versions.
202 In clients, when a protocol version is disabled without disabling I<all>
204 protocol versions.
206 The SSLv3 protocol is deprecated and should generally not be used.
[all …]
A DSSL_SESSION_get_protocol_version.pod7 - get and set the session protocol version
18 SSL_SESSION_get_protocol_version() returns the protocol version number used
21 SSL_SESSION_set_protocol_version() sets the protocol version associated with the
28 SSL_SESSION_get_protocol_version() returns a number indicating the protocol
A DBIO_ADDR.pod45 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of
48 for the B<AF_UNIX> protocol family, where B<port> is meaningless and
55 BIO_ADDR_family() returns the protocol family of the given
78 B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The
85 for B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The
91 protocol family AF_UNIX. The returned string has been allocated
100 depending on the protocol family the address is for.
A DSSL_CIPHER_get_name.pod60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
125 =item <protocol version>
127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.
128 Note that this is not always the same as the protocol version in which the
130 with earlier protocol versions.
181 protocol-specific ID.
191 correct protocol string in OpenSSL 1.1.0.
A DSSL_get_default_timeout.pod16 SSL_SESSION objects negotiated for the protocol valid for B<ssl>.
24 timeout for the protocol will be used.
A DSSL_in_init.pod54 B<protocol>_ST_B<role>_B<message>
56 B<protocol> is one of TLS or DTLS. DTLS is used where a state is specific to the
57 DTLS protocol. Otherwise TLS is used.
A DSSL_alert_type_string.pod175 =item "PV"/"protocol version"
177 The protocol version the client has attempted to negotiate is
178 recognized, but not supported. (For example, old protocol
192 protocol makes it impossible to continue (such as a memory
198 protocol failure. If the user cancels an operation after the
A DSSL_CONF_cmd.pod100 Enables strict mode protocol handling. Equivalent to setting
186 Sets the minimum and maximum supported protocol.
187 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
400 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
412 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
423 TLS or DTLS protocol.
427 If a protocol is preceded by B<-> that version is disabled.
429 All protocol versions are enabled by default.
432 Only enabling some protocol versions does not disable the other protocol
467 SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. It
[all …]
A DSSL_SESSION_get0_hostname.pod38 SSL_SESSION_get0_alpn_selected() retrieves the selected ALPN protocol for this
42 SSL_SESSION_set1_alpn_selected() sets the ALPN protocol for this session to the
A DSSL_do_handshake.pod48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
59 at the protocol level or a connection failure occurred. The shutdown was
A DSSL_accept.pod47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
58 at the protocol level or a connection failure occurred. The shutdown was
/openssl-master/test/recipes/
A D80-test_ssl_old.t450 foreach my $protocol (@protocols) {
456 $ciphersstatus{$protocol} = $ciphersstatus;
476 foreach my $protocol (@protocols) {
477 ok($ciphersstatus{$protocol}, "Getting ciphers for $protocol");
480 foreach my $protocol (sort keys %ciphersuites) {
481 note "Testing ciphersuites for $protocol";
484 my $flag = $protocol eq "-tls1_3" ? "" : $protocol;
488 note "*****SKIPPING $protocol $cipher";
491 if ($protocol eq "-tls1_3") {
504 next if $protocol eq "-tls1_3";
[all …]
/openssl-master/apps/lib/
A Ds_socket.c79 int family, int type, int protocol) in init_client() argument
100 family, type, protocol, &bindaddr); in init_client()
115 && (protocol == 0 in init_client()
116 || protocol == BIO_ADDRINFO_protocol(ai))); in init_client()
147 if (protocol == IPPROTO_SCTP) { in init_client()
165 protocol == IPPROTO_TCP ? BIO_SOCK_NODELAY : 0)) { in init_client()
267 int family, int type, int protocol, do_server_cb cb, in do_server() argument
295 && (protocol == 0 || protocol == BIO_ADDRINFO_protocol(res))); in do_server()
338 if (protocol == IPPROTO_SCTP) { in do_server()
391 i = (*cb)(sock, type, protocol, context); in do_server()
[all …]
/openssl-master/crypto/rand/
A Drand_egd.c74 int protocol, in hpns_socket() argument
84 return socket(family, type, protocol); in hpns_socket()
89 return socket(family, type, protocol); in hpns_socket()
95 socket_rc = socket(family, type, protocol); in hpns_socket()
/openssl-master/doc/man7/
A Dssl.pod47 methods/functions which implement the various protocol versions (SSLv3
53 are a core part of the SSL/TLS protocol. The available ciphers are configured
99 This is the sub header file dealing with the SSLv3 protocol only.
103 This is the sub header file dealing with the TLSv1 protocol only.
/openssl-master/apps/include/
A Ds_apps.h24 int family, int type, int protocol, do_server_cb cb,
38 int family, int type, int protocol);
/openssl-master/crypto/bio/
A Dbio_sock2.c41 int BIO_socket(int domain, int socktype, int protocol, int options) in BIO_socket() argument
48 sock = socket(domain, socktype, protocol); in BIO_socket()
/openssl-master/
A DREADME.md10 for the Transport Layer Security (TLS) protocol formerly known as the
11 Secure Sockets Layer (SSL) protocol. The protocol implementation is based
38 an implementation of all TLS protocol versions up to TLSv1.3 ([RFC 8446]).

Completed in 26 milliseconds

1234