- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for TLS_AES_128_CCM_SHA256 (0.09 sec)
-
docs/security/tls_configuration_history.md
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 * TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 * TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 * TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 * **REMOVED:** ~~TLS_AES_128_CCM_SHA256[¹][tlsv13_only]~~ * **REMOVED:** ~~TLS_AES_128_CCM_8_SHA256[¹][tlsv13_only]~~ ##### MODERN_TLS / COMPATIBLE_TLS cipher suites * TLS_AES_128_GCM_SHA256[¹][tlsv13_only] * TLS_AES_256_GCM_SHA384[¹][tlsv13_only]
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 16:35:36 UTC 2022 - 9K bytes - Viewed (0) -
samples/tlssurvey/src/main/resources/okhttp_3.13.txt
TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_CCM_SHA256 TLS_AES_256_CCM_8_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue Apr 02 01:44:15 UTC 2024 - 591 bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/TestTls13Request.kt
// TLS 1.3 private val TLS13_CIPHER_SUITES = listOf( CipherSuite.TLS_AES_128_GCM_SHA256, CipherSuite.TLS_AES_256_GCM_SHA384, CipherSuite.TLS_CHACHA20_POLY1305_SHA256, CipherSuite.TLS_AES_128_CCM_SHA256, CipherSuite.TLS_AES_128_CCM_8_SHA256, ) /** * A TLS 1.3 only Connection Spec. This will be eventually be exposed * as part of MODERN_TLS or folded into the default OkHttp client once published and
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Thu May 22 14:39:30 UTC 2025 - 3.6K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CipherSuite.kt
@JvmField val TLS_AES_256_GCM_SHA384 = init("TLS_AES_256_GCM_SHA384", 0x1302) @JvmField val TLS_CHACHA20_POLY1305_SHA256 = init("TLS_CHACHA20_POLY1305_SHA256", 0x1303) @JvmField val TLS_AES_128_CCM_SHA256 = init("TLS_AES_128_CCM_SHA256", 0x1304) @JvmField val TLS_AES_128_CCM_8_SHA256 = init("TLS_AES_128_CCM_8_SHA256", 0x1305) /**
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 39.9K bytes - Viewed (0) -
okhttp/api/jvm/okhttp.api
} public final class okhttp3/CipherSuite { public static final field Companion Lokhttp3/CipherSuite$Companion; public static final field TLS_AES_128_CCM_8_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_128_CCM_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_128_GCM_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_256_GCM_SHA384 Lokhttp3/CipherSuite;
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Aug 16 09:39:51 UTC 2025 - 69.4K bytes - Viewed (0) -
docs/changelogs/changelog_3x.md
being selected for any TLS handshakes. We didn't notice because this cipher suite isn't supported on Android, Java, or Conscrypt. We removed this cipher suite and `TLS_AES_128_CCM_SHA256` from the restricted, modern, and compatible sets of cipher suites. These two cipher suites aren't enabled by default in either Firefox or Chrome.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 14:55:54 UTC 2022 - 50.8K bytes - Viewed (0) -
okhttp/api/android/okhttp.api
} public final class okhttp3/CipherSuite { public static final field Companion Lokhttp3/CipherSuite$Companion; public static final field TLS_AES_128_CCM_8_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_128_CCM_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_128_GCM_SHA256 Lokhttp3/CipherSuite; public static final field TLS_AES_256_GCM_SHA384 Lokhttp3/CipherSuite;
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Aug 16 09:39:51 UTC 2025 - 69.4K bytes - Viewed (0)