413 references to SslProtocols
Aspire.Hosting.Yarp (17)
Aspire.Hosting.Yarp.Tests (2)
Aspire.RabbitMQ.Client.Tests (2)
Aspire.RabbitMQ.Client.v6.Tests (2)
dotnet-svcutil-lib (19)
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\SslStreamSecurityUpgradeProvider.cs (4)
34private SslProtocols _sslProtocols;
37private SslStreamSecurityUpgradeProvider(IDefaultCommunicationTimeouts timeouts, SecurityTokenManager clientSecurityTokenManager, bool requireClientCertificate, string scheme, IdentityVerifier identityVerifier, SslProtocols sslProtocols)
47private SslStreamSecurityUpgradeProvider(IDefaultCommunicationTimeouts timeouts, SecurityTokenProvider serverTokenProvider, bool requireClientCertificate, SecurityTokenAuthenticator clientCertificateAuthenticator, string scheme, IdentityVerifier identityVerifier, SslProtocols sslProtocols)
142public SslProtocols SslProtocols
http2cat (1)
IIS.FunctionalTests (1)
IIS.LongTests (1)
IIS.NewHandler.FunctionalTests (1)
IIS.Tests (3)
IISExpress.FunctionalTests (1)
InMemory.FunctionalTests (36)
HttpsConnectionMiddlewareTests.cs (15)
148Assert.True(tlsFeature.Protocol > SslProtocols.None, "Protocol");
187Assert.True(tlsFeature.Protocol > SslProtocols.None, "Protocol");
234EnabledSslProtocols = SslProtocols.Ssl2,
340Assert.True(handshakeFeature.Protocol > SslProtocols.None);
577stream.AuthenticateAsClientAsync("localhost", new X509CertificateCollection(), SslProtocols.Tls12 | SslProtocols.Tls11, false));
639stream.AuthenticateAsClientAsync("localhost", new X509CertificateCollection(), SslProtocols.Tls12 | SslProtocols.Tls11, false));
941EnabledSslProtocols = SslProtocols.Tls | SslProtocols.Tls11 | SslProtocols.Tls12,
1285options.SslProtocols = SslProtocols.Tls12 | SslProtocols.Tls11;
1303async () => await stream.AuthenticateAsClientAsync("localhost", new X509CertificateCollection(), SslProtocols.Tls, false));
1547EnabledSslProtocols = SslProtocols.None,
Interop.FunctionalTests (3)
Kestrel.SampleApp (2)
Microsoft.AspNetCore.Connections.Abstractions (2)
Microsoft.AspNetCore.InternalTesting (1)
Microsoft.AspNetCore.Server.HttpSys (15)
Microsoft.AspNetCore.Server.HttpSys.FunctionalTests (5)
Microsoft.AspNetCore.Server.IIS (15)
Microsoft.AspNetCore.Server.Kestrel.Core (27)
Internal\Infrastructure\KestrelMetrics.cs (9)
282public void TlsHandshakeStop(ConnectionMetricsContext metricsContext, long startTimestamp, long currentTimestamp, SslProtocols? protocol = null, Exception? exception = null)
291private void TlsHandshakeStopCore(ConnectionMetricsContext metricsContext, long startTimestamp, long currentTimestamp, SslProtocols? protocol = null, Exception? exception = null)
341public static bool TryGetHandshakeProtocol(SslProtocols protocols, [NotNullWhen(true)] out string? name, [NotNullWhen(true)] out string? version)
350case SslProtocols.Ssl2:
354case SslProtocols.Ssl3:
358case SslProtocols.Tls:
362case SslProtocols.Tls11:
366case SslProtocols.Tls12:
370case SslProtocols.Tls13:
Microsoft.AspNetCore.Server.Kestrel.Core.Tests (11)
Microsoft.AspNetCore.Server.Kestrel.Tests (19)
KestrelConfigurationLoaderTests.cs (13)
1073new KeyValuePair<string, string>("Endpoints:End1:SslProtocols:0", SslProtocols.Tls13.ToString()),
1110new KeyValuePair<string, string>("EndpointDefaults:SslProtocols:0", SslProtocols.Tls13.ToString()),
1453Assert.Equal(SslProtocols.None, opt.SslProtocols);
1468Assert.Equal(SslProtocols.Tls11, opt.HttpsOptions.SslProtocols);
1478Assert.Equal(SslProtocols.None, httpsOptions.SslProtocols);
1496opt.SslProtocols = SslProtocols.Tls12;
1509Assert.Equal(SslProtocols.Tls11, opt.HttpsOptions.SslProtocols);
1538Assert.Equal(SslProtocols.Tls11, opt.HttpsOptions.SslProtocols);
1557Assert.Equal(SslProtocols.Tls11, opt.SslProtocols);
1559opt.SslProtocols = SslProtocols.Tls12;
1571Assert.Equal(SslProtocols.Tls12, opt.HttpsOptions.SslProtocols);
1634new KeyValuePair<string, string>("Endpoints:End1:Sni:*.example.org:SslProtocols:0", SslProtocols.Tls13.ToString()),
1646Assert.Equal(SslProtocols.Tls13, sniConfig.SslProtocols);
Microsoft.AspNetCore.Shared.Tests (12)
Microsoft.AspNetCore.WebSockets.ConformanceTests (3)
netstandard (1)
Sockets.FunctionalTests (1)
System (1)
System.Net.Http (2)
System.Net.Http.WinHttpHandler (1)
System.Net.HttpListener (1)
System.Net.Mail (2)
System.Net.Quic (6)
System.Net.Requests (10)
System.Net.Security (141)
System\Net\Security\NetSecurityTelemetry.cs (22)
144private void HandshakeStop(SslProtocols protocol)
148Debug.Assert(sizeof(SslProtocols) == 4);
171HandshakeStop(SslProtocols.None);
175public void HandshakeCompleted(SslProtocols protocol, long startingTimestamp, bool connectionOpen)
183Debug.Assert(Enum.GetValues<SslProtocols>()[^1] == SslProtocols.Tls13, "Make sure to add a counter for new SslProtocols");
188case SslProtocols.Tls:
193case SslProtocols.Tls11:
199case SslProtocols.Tls12:
204case SslProtocols.Tls13:
224public void ConnectionClosed(SslProtocols protocol)
231case SslProtocols.Tls:
235case SslProtocols.Tls11:
240case SslProtocols.Tls12:
244case SslProtocols.Tls13:
335SslProtocols protocol = stream.GetSslProtocolInternal();
351static (string?, string?) GetNameAndVersionString(SslProtocols protocol) => protocol switch
354SslProtocols.Ssl2 => ("ssl", "2"),
355SslProtocols.Ssl3 => ("ssl", "3"),
358SslProtocols.Tls => ("tls", "1"),
359SslProtocols.Tls12 => ("tls", "1.2"),
361SslProtocols.Tls13 => ("tls", "1.3"),
System\Net\Security\SslStream.cs (35)
235return BeginAuthenticateAsClient(targetHost, null, SslProtocols.None, false,
242return BeginAuthenticateAsClient(targetHost, clientCertificates, SslProtocols.None, checkCertificateRevocation, asyncCallback, asyncState);
246SslProtocols enabledSslProtocols, bool checkCertificateRevocation,
272return BeginAuthenticateAsServer(serverCertificate, false, SslProtocols.None, false,
280return BeginAuthenticateAsServer(serverCertificate, clientCertificateRequired, SslProtocols.None, checkCertificateRevocation, asyncCallback, asyncState);
284SslProtocols enabledSslProtocols, bool checkCertificateRevocation,
314AuthenticateAsClient(targetHost, null, SslProtocols.None, false);
319AuthenticateAsClient(targetHost, clientCertificates, SslProtocols.None, checkCertificateRevocation);
322public virtual void AuthenticateAsClient(string targetHost, X509CertificateCollection? clientCertificates, SslProtocols enabledSslProtocols, bool checkCertificateRevocation)
348AuthenticateAsServer(serverCertificate, false, SslProtocols.None, false);
353AuthenticateAsServer(serverCertificate, clientCertificateRequired, SslProtocols.None, checkCertificateRevocation);
356public virtual void AuthenticateAsServer(X509Certificate serverCertificate, bool clientCertificateRequired, SslProtocols enabledSslProtocols, bool checkCertificateRevocation)
382public virtual Task AuthenticateAsClientAsync(string targetHost, X509CertificateCollection? clientCertificates, bool checkCertificateRevocation) => AuthenticateAsClientAsync(targetHost, clientCertificates, SslProtocols.None, checkCertificateRevocation);
384public virtual Task AuthenticateAsClientAsync(string targetHost, X509CertificateCollection? clientCertificates, SslProtocols enabledSslProtocols, bool checkCertificateRevocation)
408AuthenticateAsServerAsync(serverCertificate, false, SslProtocols.None, false);
423public virtual Task AuthenticateAsServerAsync(X509Certificate serverCertificate, bool clientCertificateRequired, SslProtocols enabledSslProtocols, bool checkCertificateRevocation)
485public virtual SslProtocols SslProtocol
495internal SslProtocols GetSslProtocolInternal()
499return SslProtocols.None;
502SslProtocols proto = (SslProtocols)_connectionInfo.Protocol;
503SslProtocols ret = SslProtocols.None;
507if ((proto & SslProtocols.Ssl2) != 0)
509ret |= SslProtocols.Ssl2;
512if ((proto & SslProtocols.Ssl3) != 0)
514ret |= SslProtocols.Ssl3;
519if ((proto & SslProtocols.Tls) != 0)
521ret |= SslProtocols.Tls;
524if ((proto & SslProtocols.Tls11) != 0)
526ret |= SslProtocols.Tls11;
530if ((proto & SslProtocols.Tls12) != 0)
532ret |= SslProtocols.Tls12;
535if ((proto & SslProtocols.Tls13) != 0)
537ret |= SslProtocols.Tls13;
System\Net\Security\TlsFrameHelper.cs (26)
89public SslProtocols Version;
122public SslProtocols SupportedVersions;
208header.Version = SslProtocols.Ssl2;
261if (info.Header.Version == SslProtocols.Ssl2)
277if (((int)info.Header.Version >= (int)SslProtocols.Tls) &&
317private static byte[] CreateProtocolVersionAlert(SslProtocols version) =>
320SslProtocols.Tls13 => s_protocolMismatch13,
321SslProtocols.Tls12 => s_protocolMismatch12,
323SslProtocols.Tls11 => s_protocolMismatch11,
324SslProtocols.Tls => s_protocolMismatch10,
327SslProtocols.Ssl3 => s_protocolMismatch30,
332public static byte[] CreateAlertFrame(SslProtocols version, TlsAlertDescription reason)
339else if ((int)version > (int)SslProtocols.Tls)
346case SslProtocols.Tls13:
350case SslProtocols.Tls11:
353case SslProtocols.Tls:
531if (!TryGetSupportedVersionsFromExtension(extensionData, out SslProtocols versions))
647private static bool TryGetSupportedVersionsFromExtension(ReadOnlySpan<byte> extensionData, out SslProtocols protocols)
662protocols = SslProtocols.None;
753private static SslProtocols TlsMinorVersionToProtocol(byte value)
7574 => SslProtocols.Tls13,
7583 => SslProtocols.Tls12,
7602 => SslProtocols.Tls11,
7611 => SslProtocols.Tls,
7640 => SslProtocols.Ssl3,
766_ => SslProtocols.None,
System.ServiceModel.NetFramingBase (16)
System\ServiceModel\Channels\SslStreamSecurityUpgradeProvider.cs (3)
29private SslStreamSecurityUpgradeProvider(IDefaultCommunicationTimeouts timeouts, SecurityTokenManager clientSecurityTokenManager, bool requireClientCertificate, string scheme, IdentityVerifier identityVerifier, SslProtocols sslProtocols)
39private SslStreamSecurityUpgradeProvider(IDefaultCommunicationTimeouts timeouts, SecurityTokenProvider serverTokenProvider, bool requireClientCertificate, SecurityTokenAuthenticator clientCertificateAuthenticator, string scheme, IdentityVerifier identityVerifier, SslProtocols sslProtocols)
93public SslProtocols SslProtocols { get; }
System.ServiceModel.NetTcp (13)
System.ServiceModel.Primitives (4)
System.ServiceModel.UnixDomainSocket (13)