Home
last modified time | relevance | path

Searched refs:TLS1 (Results 1 – 25 of 856) sorted by relevance

12345678910>>...35

/dports/security/gnutls/gnutls-3.6.16/doc/
H A Dalgorithms.texi6 @tab TLS1.3
9 @tab TLS1.3
12 @tab TLS1.3
15 @tab TLS1.3
18 @tab TLS1.3
21 @tab TLS1.0
24 @tab TLS1.0
27 @tab TLS1.2
30 @tab TLS1.0
33 @tab TLS1.0
[all …]
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/nxos_nxapi/tests/cli/
H A Dnxapi_ssl.yaml128 - name: Configure NXAPI HTTPs w/TLS1.2 +default TLSv1
146 - name: Configure NXAPI HTTPs w/TLS1.2 again
153 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1
168 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 -default TLSv1 configuration
173 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 again
180 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1
194 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 configuration
199 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 again
206 - name: Configure NXAPI HTTPs with explicit TLS1.2 TLS1.1 TLSv1
221 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 TLSv1 configuration
[all …]
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/mqtt/tasks/
H A Dubuntu.yml18 - name: Send a test message to TLS1.1 endpoint, no client version specified
34 - name: Send a test message to TLS1.2 endpoint, no client version specified
50 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
52 # - name: Send a test message to TLS1.3 endpoint
68 - name: Send a message, client TLS1.1, server (required) TLS1.2 - Expected failure
86 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
88 # - name: Send a message, client TLS1.1, server (required) TLS1.3 - Expected failure
106 - name: Send a message, client TLS1.2, server (required) TLS1.1 - Expected failure
124 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
126 # - name: Send a message, client TLS1.2, server (required) TLS1.3 - Expected failure
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/tests/integration/targets/mqtt/tasks/
H A Dubuntu.yml18 - name: Send a test message to TLS1.1 endpoint, no client version specified
34 - name: Send a test message to TLS1.2 endpoint, no client version specified
50 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
52 # - name: Send a test message to TLS1.3 endpoint
68 - name: Send a message, client TLS1.1, server (required) TLS1.2 - Expected failure
86 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
88 # - name: Send a message, client TLS1.1, server (required) TLS1.3 - Expected failure
106 - name: Send a message, client TLS1.2, server (required) TLS1.1 - Expected failure
124 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version)
126 # - name: Send a message, client TLS1.2, server (required) TLS1.3 - Expected failure
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/cisco/nxos/tests/integration/targets/nxos_nxapi/tests/cli/
H A Dnxapi_ssl.yaml129 - name: Configure NXAPI HTTPs w/TLS1.2 +default TLSv1
147 - name: Configure NXAPI HTTPs w/TLS1.2 again
154 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1
169 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 -default TLSv1 configuration
174 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 again
181 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1
195 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 configuration
200 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 again
207 - name: Configure NXAPI HTTPs with explicit TLS1.2 TLS1.1 TLSv1
222 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 TLSv1 configuration
[all …]
/dports/security/gnutls/gnutls-3.6.16/tests/data/
H A Dlistings-legacy12 TLS_RSA_AES_128_GCM_SHA256 0x00, 0x9c TLS1.2
4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
H A Dlistings-legacy22 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2
4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
H A Dlistings-legacy42 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2
4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
H A Dlistings-legacy32 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2
4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
H A Dlistings-SSL3.0-TLS1.11 Cipher suites for NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1
11 Protocols: VERS-TLS1.0, VERS-TLS1.1
H A Dlistings-old-SSL3.0-TLS1.11 Cipher suites for NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1
11 Protocols: VERS-TLS1.0, VERS-SSL3.0, VERS-TLS1.1
/dports/security/gnutls/gnutls-3.6.16/tests/
H A Dcipher-listings.sh80 check old-SSL3.0-TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1"
83 check SSL3.0-TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1"
85 check TLS1.0 "NORMAL:-VERS-ALL:+VERS-TLS1.0"
86 check TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.1"
H A Dsystem-override-tls.sh61 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC:+…
101 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2 --verify-hostname localhos…
106 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC:+…
111 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC -…
116 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-MAC-ALL:+SHA1 --verify-ho…
/dports/devel/autogen/autogen-5.18.16/autoopts/test/
H A Ddoc.test242 - Version: TLS1.1
258 TLS_ECDHE_ECDSA_AES_256_CBC_SHA384 0xc0, 0x24 TLS1.2
259 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 0xc0, 0x2e TLS1.2
390 - Version: TLS1.1
406 TLS_ECDHE_ECDSA_AES_256_CBC_SHA384 0xc0, 0x24 TLS1.2
407 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 0xc0, 0x2e TLS1.2
408 TLS_ECDHE_RSA_AES_256_GCM_SHA384 0xc0, 0x30 TLS1.2
409 TLS_DHE_RSA_AES_256_CBC_SHA256 0x00, 0x6b TLS1.2
410 TLS_DHE_DSS_AES_256_CBC_SHA256 0x00, 0x6a TLS1.2
411 TLS_RSA_AES_256_CBC_SHA256 0x00, 0x3d TLS1.2
[all …]
/dports/lang/gcc48/gcc-4.8.5/libjava/gnu/javax/crypto/pad/
H A DTLS1.h22 class TLS1; variable
29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad
33 TLS1();
/dports/lang/gnat_util/gcc-6-20180516/libjava/gnu/javax/crypto/pad/
H A DTLS1.h22 class TLS1; variable
29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad
33 TLS1();
/dports/devel/arm-none-eabi-gcc492/gcc-4.9.2/libjava/gnu/javax/crypto/pad/
H A DTLS1.h22 class TLS1; variable
29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad
33 TLS1();
/dports/lang/gcc6-aux/gcc-6-20180516/libjava/gnu/javax/crypto/pad/
H A DTLS1.h22 class TLS1; variable
29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad
33 TLS1();
/dports/devel/mingw32-gcc/gcc-4.8.1/libjava/gnu/javax/crypto/pad/
H A DTLS1.h22 class TLS1; variable
29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad
33 TLS1();
/dports/multimedia/zoneminder/zoneminder-1.36.5/onvif/proxy/lib/ONVIF/Device/Types/
H A DSecurityCapabilities.pm30 my %TLS1_0_of :ATTR(:get<TLS1.0>);
31 my %TLS1_1_of :ATTR(:get<TLS1.1>);
32 my %TLS1_2_of :ATTR(:get<TLS1.2>);
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/
H A DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/
H A DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/
H A DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/
H A DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
/dports/security/openssl-devel/openssl-3.0.2/doc/man7/
H A DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);

12345678910>>...35