TlsExperimentalAttributes
Attributes
- Source
- TlsExperimentalAttributes.scala
- Graph
-
- Supertypes
- Self type
Members list
Type members
Classlikes
Values for TlsProtocolName.
Values for TlsProtocolName.
Attributes
- Companion
- object
- Source
- TlsExperimentalAttributes.scala
- Supertypes
- Known subtypes
Attributes
- Companion
- class
- Source
- TlsExperimentalAttributes.scala
- Supertypes
- Self type
-
TlsProtocolNameValue.type
Value members
Concrete fields
String indicating the <a href="https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5">cipher used during the current connection.
String indicating the <a href="https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5">cipher used during the current connection.
Attributes
- Note
-
-
The values allowed for
tls.cipher
MUST be one of theDescriptions
of the <a href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#table-tls-parameters-4">registered TLS Cipher Suits.
-
- Source
- TlsExperimentalAttributes.scala
PEM-encoded stand-alone certificate offered by the client.
PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive of client.certificate_chain
since this value also exists in that list.
Attributes
Array of PEM-encoded certificates that make up the certificate chain offered by the client.
Array of PEM-encoded certificates that make up the certificate chain offered by the client. This is usually mutually-exclusive of client.certificate
since that value should be the first certificate in the chain.
Attributes
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client.
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client.
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client.
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Distinguished name of <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject of the issuer of the x.509 certificate presented by the client.
Distinguished name of <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject of the issuer of the x.509 certificate presented by the client.
Attributes
A hash that identifies clients based on how they perform an SSL/TLS handshake.
A hash that identifies clients based on how they perform an SSL/TLS handshake.
Attributes
Date/Time indicating when client certificate is no longer considered valid.
Date/Time indicating when client certificate is no longer considered valid.
Attributes
Date/Time indicating when client certificate is first considered valid.
Date/Time indicating when client certificate is first considered valid.
Attributes
Also called an SNI, this tells the server which hostname to which the client is attempting to connect to.
Also called an SNI, this tells the server which hostname to which the client is attempting to connect to.
Attributes
Distinguished name of subject of the x.509 certificate presented by the client.
Distinguished name of subject of the x.509 certificate presented by the client.
Attributes
Array of ciphers offered by the client during the client hello.
Array of ciphers offered by the client during the client hello.
Attributes
String indicating the curve used for the given cipher, when applicable
String indicating the curve used for the given cipher, when applicable
Attributes
Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel.
Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel.
Attributes
String indicating the protocol being tunneled.
String indicating the protocol being tunneled. Per the values in the <a href="https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids">IANA registry, this string should be lower case.
Attributes
Normalized lowercase protocol name parsed from original string of the negotiated <a href="https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES">SSL/TLS protocol version
Normalized lowercase protocol name parsed from original string of the negotiated <a href="https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES">SSL/TLS protocol version
Attributes
Numeric part of the version parsed from the original string of the negotiated <a href="https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES">SSL/TLS protocol version
Numeric part of the version parsed from the original string of the negotiated <a href="https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES">SSL/TLS protocol version
Attributes
Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation.
Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation.
Attributes
PEM-encoded stand-alone certificate offered by the server.
PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive of server.certificate_chain
since this value also exists in that list.
Attributes
Array of PEM-encoded certificates that make up the certificate chain offered by the server.
Array of PEM-encoded certificates that make up the certificate chain offered by the server. This is usually mutually-exclusive of server.certificate
since that value should be the first certificate in the chain.
Attributes
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server.
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server.
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server.
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash.
Attributes
Distinguished name of <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject of the issuer of the x.509 certificate presented by the client.
Distinguished name of <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject of the issuer of the x.509 certificate presented by the client.
Attributes
A hash that identifies servers based on how they perform an SSL/TLS handshake.
A hash that identifies servers based on how they perform an SSL/TLS handshake.
Attributes
Date/Time indicating when server certificate is no longer considered valid.
Date/Time indicating when server certificate is no longer considered valid.
Attributes
Date/Time indicating when server certificate is first considered valid.
Date/Time indicating when server certificate is first considered valid.
Attributes
Distinguished name of subject of the x.509 certificate presented by the server.
Distinguished name of subject of the x.509 certificate presented by the server.