Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for enabledProtocols (0.05 sec)

  1. okhttp/src/jvmTest/kotlin/okhttp3/ConnectionSpecTest.kt

            CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA.javaName,
          )
        socket.enabledProtocols =
          arrayOf(
            TlsVersion.TLS_1_2.javaName,
            TlsVersion.TLS_1_1.javaName,
          )
        assertThat(tlsSpec.isCompatible(socket)).isTrue()
        applyConnectionSpec(tlsSpec, socket, isFallback = false)
        assertThat(socket.enabledProtocols).containsExactly(
          TlsVersion.TLS_1_2.javaName,
        )
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 14.9K bytes
    - Viewed (0)
  2. okhttp/src/commonJvmAndroid/kotlin/okhttp3/ConnectionSpec.kt

        val tlsVersionsIntersection =
          if (tlsVersionsAsString != null) {
            sslSocket.enabledProtocols.intersect(tlsVersionsAsString, naturalOrder())
          } else {
            sslSocket.enabledProtocols
          }
    
        // In accordance with https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 the SCSV
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 13.4K bytes
    - Viewed (0)
  3. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt

          ?: throw UnknownServiceException(
            "Unable to find acceptable protocols." +
              " isFallback=$isTlsFallback," +
              " modes=$connectionSpecs," +
              " supported protocols=${sslSocket.enabledProtocols!!.contentToString()}",
          )
      }
    
      /**
       * Returns a copy of this connection with the next connection spec to try, or null if no other
       * compatible connection specs are available.
       */
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Thu Jul 31 04:18:40 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/FessBoot.java

                        doSetupServerConfig(logger, props, "sslProtocol", v -> sslHostConfig.setSslProtocol(v));
                        doSetupServerConfig(logger, props, "enabledProtocols", v -> sslHostConfig.setEnabledProtocols(v.trim().split(",")));
                        sslHostConfig.addCertificate(certificate);
                        connector.addSslHostConfig(sslHostConfig);
    
                    }
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 11.3K bytes
    - Viewed (0)
Back to top