- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 22 for TLS_1_3 (0.04 seconds)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/ConnectionSpec.kt
@JvmField val RESTRICTED_TLS = Builder(true) .cipherSuites(*RESTRICTED_CIPHER_SUITES.toTypedArray()) .tlsVersions(TlsVersion.TLS_1_3, TlsVersion.TLS_1_2) .supportsTlsExtensions(true) .build() /** * A modern TLS configuration that works on most client platforms and can connect to most servers.Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 27 13:39:56 GMT 2024 - 13.4K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/BouncyCastleTest.kt
client.newCall(request).execute().use { assertThat(it.protocol).isEqualTo(Protocol.HTTP_2) assertThat(it.handshake!!.tlsVersion).isEqualTo(TlsVersion.TLS_1_3) } }Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Jun 18 12:28:21 GMT 2025 - 1.6K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CallHandshakeTest.kt
// We are avoiding making guarantees on ordering of secondary Platforms. platform.assumeNotBouncyCastle() val client = makeClient(ConnectionSpec.MODERN_TLS, TlsVersion.TLS_1_3) val handshake = makeRequest(client) assertThat(handshake.cipherSuite).isIn(*expectedModernTls13CipherSuites.toTypedArray()) // TODO: filter down to TLSv1.3 when only activated.Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Sep 16 07:21:43 GMT 2025 - 11.4K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/KotlinSourceModernTest.kt
builder = builder.cipherSuites(CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) builder = builder.cipherSuites("", "") builder = builder.allEnabledTlsVersions() builder = builder.tlsVersions(TlsVersion.TLS_1_3) builder = builder.tlsVersions("", "") val connectionSpec: ConnectionSpec = builder.build() } @Test fun cookie() { val cookie: Cookie = Cookie.Builder().build()
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Nov 05 18:28:35 GMT 2025 - 47K bytes - Click Count (0) -
android-test/src/androidTest/java/okhttp/android/test/OkHttpTest.kt
} else -> { assertEquals("org.conscrypt.ConscryptFileDescriptorSocket", socketClass) } } assertEquals(TlsVersion.TLS_1_3, response.handshake?.tlsVersion) } } finally { Security.removeProvider("Conscrypt") client.close() } } @Test fun testConscryptRequestLocalhostInsecure() {Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Nov 04 19:13:52 GMT 2025 - 29.9K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/TestTls13Request.kt
* available in JDK11 or Conscrypt. */ private val TLS_13 = ConnectionSpec .Builder(true) .cipherSuites(*TLS13_CIPHER_SUITES.toTypedArray()) .tlsVersions(TlsVersion.TLS_1_3) .build() private val TLS_12 = ConnectionSpec .Builder(ConnectionSpec.RESTRICTED_TLS) .tlsVersions(TlsVersion.TLS_1_2) .build() private fun testClient( urls: List<String>,Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu May 22 14:39:30 GMT 2025 - 3.6K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CipherSuiteTest.kt
socket.enabledCipherSuites = arrayOf("TLS_A") val connectionSpec = ConnectionSpec .Builder(true) .tlsVersions(TlsVersion.TLS_1_1, TlsVersion.TLS_1_2, TlsVersion.TLS_1_3) .cipherSuites("TLS_A") .build() applyConnectionSpec(connectionSpec, socket, false) assertArrayEquals(arrayOf("TLSv1.1", "TLSv1.2"), socket.enabledProtocols) }
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 8.2K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/KotlinDeprecationErrorTest.kt
val proxy: Proxy = route.proxy() val inetSocketAddress: InetSocketAddress = route.socketAddress() } @Test @Disabled fun tlsVersion() { val tlsVersion: TlsVersion = TlsVersion.TLS_1_3 val javaName: String = tlsVersion.javaName() }
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 27 13:39:56 GMT 2024 - 13.3K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/EventListenerTest.kt
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Nov 05 18:28:35 GMT 2025 - 70.5K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt
val fallbackRequest = server.takeRequest() assertThat(fallbackRequest.requestLine).isEqualTo("GET /foo HTTP/1.1") assertThat(fallbackRequest.handshake?.tlsVersion).isIn(TlsVersion.TLS_1_2, TlsVersion.TLS_1_3) } @Test fun connectViaHttpsWithSSLFallbackFailuresRecorded() { platform.assumeNotBouncyCastle() server.useHttps(handshakeCertificates.sslSocketFactory())
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat Jun 21 20:36:35 GMT 2025 - 133.2K bytes - Click Count (0)