/dports/security/gnutls/gnutls-3.6.16/doc/ |
H A D | algorithms.texi | 6 @tab TLS1.3 9 @tab TLS1.3 12 @tab TLS1.3 15 @tab TLS1.3 18 @tab TLS1.3 21 @tab TLS1.0 24 @tab TLS1.0 27 @tab TLS1.2 30 @tab TLS1.0 33 @tab TLS1.0 [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/nxos_nxapi/tests/cli/ |
H A D | nxapi_ssl.yaml | 128 - name: Configure NXAPI HTTPs w/TLS1.2 +default TLSv1 146 - name: Configure NXAPI HTTPs w/TLS1.2 again 153 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 168 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 -default TLSv1 configuration 173 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 again 180 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 194 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 configuration 199 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 again 206 - name: Configure NXAPI HTTPs with explicit TLS1.2 TLS1.1 TLSv1 221 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 TLSv1 configuration [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/mqtt/tasks/ |
H A D | ubuntu.yml | 18 - name: Send a test message to TLS1.1 endpoint, no client version specified 34 - name: Send a test message to TLS1.2 endpoint, no client version specified 50 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 52 # - name: Send a test message to TLS1.3 endpoint 68 - name: Send a message, client TLS1.1, server (required) TLS1.2 - Expected failure 86 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 88 # - name: Send a message, client TLS1.1, server (required) TLS1.3 - Expected failure 106 - name: Send a message, client TLS1.2, server (required) TLS1.1 - Expected failure 124 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 126 # - name: Send a message, client TLS1.2, server (required) TLS1.3 - Expected failure
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/tests/integration/targets/mqtt/tasks/ |
H A D | ubuntu.yml | 18 - name: Send a test message to TLS1.1 endpoint, no client version specified 34 - name: Send a test message to TLS1.2 endpoint, no client version specified 50 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 52 # - name: Send a test message to TLS1.3 endpoint 68 - name: Send a message, client TLS1.1, server (required) TLS1.2 - Expected failure 86 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 88 # - name: Send a message, client TLS1.1, server (required) TLS1.3 - Expected failure 106 - name: Send a message, client TLS1.2, server (required) TLS1.1 - Expected failure 124 # TODO(Uncomment when TLS1.3 is supported in moquitto and ubuntu version) 126 # - name: Send a message, client TLS1.2, server (required) TLS1.3 - Expected failure
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/cisco/nxos/tests/integration/targets/nxos_nxapi/tests/cli/ |
H A D | nxapi_ssl.yaml | 129 - name: Configure NXAPI HTTPs w/TLS1.2 +default TLSv1 147 - name: Configure NXAPI HTTPs w/TLS1.2 again 154 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 169 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 -default TLSv1 configuration 174 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 -default TLSv1 again 181 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 195 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 configuration 200 - name: Configure NXAPI HTTPs w/TLS1.2 TLS1.1 +default TLSv1 again 207 - name: Configure NXAPI HTTPs with explicit TLS1.2 TLS1.1 TLSv1 222 - name: Assert NXAPI HTTPs w/TLS1.2 TLS1.2 TLSv1 configuration [all …]
|
/dports/security/gnutls/gnutls-3.6.16/tests/data/ |
H A D | listings-legacy1 | 2 TLS_RSA_AES_128_GCM_SHA256 0x00, 0x9c TLS1.2 4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
|
H A D | listings-legacy2 | 2 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2 4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
|
H A D | listings-legacy4 | 2 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2 4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
|
H A D | listings-legacy3 | 2 TLS_RSA_CAMELLIA_256_GCM_SHA384 0xc0, 0x7b TLS1.2 4 Protocols: VERS-TLS1.2, VERS-TLS1.1, VERS-TLS1.0
|
H A D | listings-SSL3.0-TLS1.1 | 1 Cipher suites for NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1 11 Protocols: VERS-TLS1.0, VERS-TLS1.1
|
H A D | listings-old-SSL3.0-TLS1.1 | 1 Cipher suites for NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1 11 Protocols: VERS-TLS1.0, VERS-SSL3.0, VERS-TLS1.1
|
/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | cipher-listings.sh | 80 check old-SSL3.0-TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1" 83 check SSL3.0-TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1" 85 check TLS1.0 "NORMAL:-VERS-ALL:+VERS-TLS1.0" 86 check TLS1.1 "NORMAL:-VERS-ALL:+VERS-TLS1.1"
|
H A D | system-override-tls.sh | 61 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC:+… 101 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2 --verify-hostname localhos… 106 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC:+… 111 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-CIPHER-ALL:+AES-128-CBC -… 116 "${CLI}" -p "${PORT}" 127.0.0.1 --priority NORMAL:-VERS-ALL:+VERS-TLS1.2:-MAC-ALL:+SHA1 --verify-ho…
|
/dports/devel/autogen/autogen-5.18.16/autoopts/test/ |
H A D | doc.test | 242 - Version: TLS1.1 258 TLS_ECDHE_ECDSA_AES_256_CBC_SHA384 0xc0, 0x24 TLS1.2 259 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 0xc0, 0x2e TLS1.2 390 - Version: TLS1.1 406 TLS_ECDHE_ECDSA_AES_256_CBC_SHA384 0xc0, 0x24 TLS1.2 407 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 0xc0, 0x2e TLS1.2 408 TLS_ECDHE_RSA_AES_256_GCM_SHA384 0xc0, 0x30 TLS1.2 409 TLS_DHE_RSA_AES_256_CBC_SHA256 0x00, 0x6b TLS1.2 410 TLS_DHE_DSS_AES_256_CBC_SHA256 0x00, 0x6a TLS1.2 411 TLS_RSA_AES_256_CBC_SHA256 0x00, 0x3d TLS1.2 [all …]
|
/dports/lang/gcc48/gcc-4.8.5/libjava/gnu/javax/crypto/pad/ |
H A D | TLS1.h | 22 class TLS1; variable 29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad 33 TLS1();
|
/dports/lang/gnat_util/gcc-6-20180516/libjava/gnu/javax/crypto/pad/ |
H A D | TLS1.h | 22 class TLS1; variable 29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad 33 TLS1();
|
/dports/devel/arm-none-eabi-gcc492/gcc-4.9.2/libjava/gnu/javax/crypto/pad/ |
H A D | TLS1.h | 22 class TLS1; variable 29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad 33 TLS1();
|
/dports/lang/gcc6-aux/gcc-6-20180516/libjava/gnu/javax/crypto/pad/ |
H A D | TLS1.h | 22 class TLS1; variable 29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad 33 TLS1();
|
/dports/devel/mingw32-gcc/gcc-4.8.1/libjava/gnu/javax/crypto/pad/ |
H A D | TLS1.h | 22 class TLS1; variable 29 class gnu::javax::crypto::pad::TLS1 : public ::gnu::javax::crypto::pad::BasePad 33 TLS1();
|
/dports/multimedia/zoneminder/zoneminder-1.36.5/onvif/proxy/lib/ONVIF/Device/Types/ |
H A D | SecurityCapabilities.pm | 30 my %TLS1_0_of :ATTR(:get<TLS1.0>); 31 my %TLS1_1_of :ATTR(:get<TLS1.1>); 32 my %TLS1_2_of :ATTR(:get<TLS1.2>);
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation 9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API. 16 "TLS1-PRF" is the name for this implementation; it 53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL); 72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation 9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API. 16 "TLS1-PRF" is the name for this implementation; it 53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL); 72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation 9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API. 16 "TLS1-PRF" is the name for this implementation; it 53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL); 72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation 9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API. 16 "TLS1-PRF" is the name for this implementation; it 53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL); 72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
|
/dports/security/openssl-devel/openssl-3.0.2/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation 9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API. 16 "TLS1-PRF" is the name for this implementation; it 53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL); 72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
|