/openssl-master/test/ssl-tests/ |
A D | 04-client_auth.cnf.in | 32 my $protocol = $protocols[$_]; 33 my $protocol_name = $protocol || "flex"; 63 "MinProtocol" => $protocol, 64 "MaxProtocol" => $protocol 68 "MinProtocol" => $protocol, 69 "MaxProtocol" => $protocol 84 "MinProtocol" => $protocol, 85 "MaxProtocol" => $protocol, 90 "MinProtocol" => $protocol, 91 "MaxProtocol" => $protocol [all …]
|
A D | protocol_version.pm | 153 my ($result, $protocol) = 171 "ExpectedProtocol" => $protocol,
|
/openssl-master/doc/man3/ |
A D | SSL_get_version.pod | 6 protocol information of a connection 42 The connection uses the SSLv3 protocol. 46 The connection uses the TLSv1.0 protocol. 50 The connection uses the TLSv1.1 protocol. 54 The connection uses the TLSv1.2 protocol. 58 The connection uses the TLSv1.3 protocol. 62 This indicates an unknown protocol version. 73 The connection uses the SSLv3 protocol. 77 The connection uses the TLSv1.0 protocol. 81 The connection uses the TLSv1.1 protocol. [all …]
|
A D | SSL_CTX_set_alpn_select_cb.pod | 8 - handle application layer protocol negotiation (ALPN) 63 vector in protocol-list format. The value of the B<out>, B<outlen> vector 64 should be set to the value of a single protocol selected from the B<in>, 81 client needs to select a protocol from the server's provided list, and a 85 The length of the protocol name must be written into B<outlen>. The 88 select a protocol. It is fatal to the connection if this callback returns 94 Negotiation. The returned list must be in protocol-list format, described 104 is set to 0 if no protocol has been selected. B<data> must not be freed. 107 client's requested protocol for this connection. If the client did not 110 the client can request any protocol it chooses. The value returned from [all …]
|
A D | BIO_ADDRINFO.pod | 25 int family, int socktype, int protocol, BIO_ADDRINFO **res); 47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to 48 determine what protocol family, socket type and protocol should be used for 51 indicates that any type can be used. B<protocol> specifies a protocol such as 52 IPPROTO_TCP, IPPROTO_UDP or IPPORTO_SCTP. If set to 0 than any protocol can be 60 to select based on the protocol (any protocol may be returned). 70 BIO_ADDRINFO_protocol() returns the protocol id of the given 95 function. On Linux it is known that specifying 0 for the protocol will not 97 address is required then the B<protocol> parameter to BIO_lookup_ex() should be
|
A D | SSL_CTX_set_msg_callback.pod | 9 - install callback for observing protocol messages 31 protocol messages (such as handshake messages) that are received or 50 This flag is B<0> when a protocol message has been received and B<1> 51 when a protocol message has been sent. 55 The protocol version according to which the protocol message is 61 This is one of the content type values defined in the protocol specification 63 B<SSL3_RT_APPLICATION_DATA> because the callback will only be called for protocol 70 I<buf> points to a buffer containing the protocol message or other data (in the 91 If processing a received protocol message results in an error, 96 Due to automatic protocol version negotiation, I<version> is not [all …]
|
A D | SSL_CTX_set_min_proto_version.pod | 9 and maximum supported protocol version 27 The functions get or set the minimum and maximum supported protocol versions 31 specific protocol versions. 32 Use these functions instead of disabling specific protocol versions. 34 Setting the minimum or maximum version to 0, will enable protocol 49 lowest or highest protocol, respectively.
|
A D | SSL_CTX_new.pod | 142 TLSv1.2 protocol. These methods are deprecated. 147 TLSv1.1 protocol. These methods are deprecated. 152 TLSv1 protocol. These methods are deprecated. 157 SSLv3 protocol. 158 The SSLv3 protocol is deprecated and should not be used. 183 All other methods only support one specific protocol version. 201 disable either all previous or all subsequent protocol versions. 202 In clients, when a protocol version is disabled without disabling I<all> 204 protocol versions. 206 The SSLv3 protocol is deprecated and should generally not be used. [all …]
|
A D | SSL_SESSION_get_protocol_version.pod | 7 - get and set the session protocol version 18 SSL_SESSION_get_protocol_version() returns the protocol version number used 21 SSL_SESSION_set_protocol_version() sets the protocol version associated with the 28 SSL_SESSION_get_protocol_version() returns a number indicating the protocol
|
A D | BIO_ADDR.pod | 45 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of 48 for the B<AF_UNIX> protocol family, where B<port> is meaningless and 55 BIO_ADDR_family() returns the protocol family of the given 78 B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The 85 for B<BIO_ADDR> of the protocol families AF_INET and AF_INET6. The 91 protocol family AF_UNIX. The returned string has been allocated 100 depending on the protocol family the address is for.
|
A D | SSL_CIPHER_get_name.pod | 60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given 125 =item <protocol version> 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 128 Note that this is not always the same as the protocol version in which the 130 with earlier protocol versions. 181 protocol-specific ID. 191 correct protocol string in OpenSSL 1.1.0.
|
A D | SSL_get_default_timeout.pod | 16 SSL_SESSION objects negotiated for the protocol valid for B<ssl>. 24 timeout for the protocol will be used.
|
A D | SSL_in_init.pod | 54 B<protocol>_ST_B<role>_B<message> 56 B<protocol> is one of TLS or DTLS. DTLS is used where a state is specific to the 57 DTLS protocol. Otherwise TLS is used.
|
A D | SSL_alert_type_string.pod | 175 =item "PV"/"protocol version" 177 The protocol version the client has attempted to negotiate is 178 recognized, but not supported. (For example, old protocol 192 protocol makes it impossible to continue (such as a memory 198 protocol failure. If the user cancels an operation after the
|
A D | SSL_CONF_cmd.pod | 100 Enables strict mode protocol handling. Equivalent to setting 186 Sets the minimum and maximum supported protocol. 187 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 400 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 412 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 423 TLS or DTLS protocol. 427 If a protocol is preceded by B<-> that version is disabled. 429 All protocol versions are enabled by default. 432 Only enabling some protocol versions does not disable the other protocol 467 SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. It [all …]
|
A D | SSL_SESSION_get0_hostname.pod | 38 SSL_SESSION_get0_alpn_selected() retrieves the selected ALPN protocol for this 42 SSL_SESSION_set1_alpn_selected() sets the ALPN protocol for this session to the
|
A D | SSL_do_handshake.pod | 48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 59 at the protocol level or a connection failure occurred. The shutdown was
|
A D | SSL_accept.pod | 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 58 at the protocol level or a connection failure occurred. The shutdown was
|
/openssl-master/test/recipes/ |
A D | 80-test_ssl_old.t | 450 foreach my $protocol (@protocols) { 456 $ciphersstatus{$protocol} = $ciphersstatus; 476 foreach my $protocol (@protocols) { 477 ok($ciphersstatus{$protocol}, "Getting ciphers for $protocol"); 480 foreach my $protocol (sort keys %ciphersuites) { 481 note "Testing ciphersuites for $protocol"; 484 my $flag = $protocol eq "-tls1_3" ? "" : $protocol; 488 note "*****SKIPPING $protocol $cipher"; 491 if ($protocol eq "-tls1_3") { 504 next if $protocol eq "-tls1_3"; [all …]
|
/openssl-master/apps/lib/ |
A D | s_socket.c | 79 int family, int type, int protocol) in init_client() argument 100 family, type, protocol, &bindaddr); in init_client() 115 && (protocol == 0 in init_client() 116 || protocol == BIO_ADDRINFO_protocol(ai))); in init_client() 147 if (protocol == IPPROTO_SCTP) { in init_client() 165 protocol == IPPROTO_TCP ? BIO_SOCK_NODELAY : 0)) { in init_client() 267 int family, int type, int protocol, do_server_cb cb, in do_server() argument 295 && (protocol == 0 || protocol == BIO_ADDRINFO_protocol(res))); in do_server() 338 if (protocol == IPPROTO_SCTP) { in do_server() 391 i = (*cb)(sock, type, protocol, context); in do_server() [all …]
|
/openssl-master/crypto/rand/ |
A D | rand_egd.c | 74 int protocol, in hpns_socket() argument 84 return socket(family, type, protocol); in hpns_socket() 89 return socket(family, type, protocol); in hpns_socket() 95 socket_rc = socket(family, type, protocol); in hpns_socket()
|
/openssl-master/doc/man7/ |
A D | ssl.pod | 47 methods/functions which implement the various protocol versions (SSLv3 53 are a core part of the SSL/TLS protocol. The available ciphers are configured 99 This is the sub header file dealing with the SSLv3 protocol only. 103 This is the sub header file dealing with the TLSv1 protocol only.
|
/openssl-master/apps/include/ |
A D | s_apps.h | 24 int family, int type, int protocol, do_server_cb cb, 38 int family, int type, int protocol);
|
/openssl-master/crypto/bio/ |
A D | bio_sock2.c | 41 int BIO_socket(int domain, int socktype, int protocol, int options) in BIO_socket() argument 48 sock = socket(domain, socktype, protocol); in BIO_socket()
|
/openssl-master/ |
A D | README.md | 10 for the Transport Layer Security (TLS) protocol formerly known as the 11 Secure Sockets Layer (SSL) protocol. The protocol implementation is based 38 an implementation of all TLS protocol versions up to TLSv1.3 ([RFC 8446]).
|