
io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder Maven / Gradle / Ivy
The newest version!
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: envoy/api/v2/auth/common.proto
package io.envoyproxy.envoy.api.v2.auth;
public interface TlsParametersOrBuilder extends
// @@protoc_insertion_point(interface_extends:envoy.api.v2.auth.TlsParameters)
com.google.protobuf.MessageOrBuilder {
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMinimumProtocolVersion.
*/
int getTlsMinimumProtocolVersionValue();
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The tlsMinimumProtocolVersion.
*/
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMinimumProtocolVersion();
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMaximumProtocolVersion.
*/
int getTlsMaximumProtocolVersionValue();
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The tlsMaximumProtocolVersion.
*/
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMaximumProtocolVersion();
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return A list containing the cipherSuites.
*/
java.util.List
getCipherSuitesList();
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return The count of cipherSuites.
*/
int getCipherSuitesCount();
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the element to return.
* @return The cipherSuites at the given index.
*/
java.lang.String getCipherSuites(int index);
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the value to return.
* @return The bytes of the cipherSuites at the given index.
*/
com.google.protobuf.ByteString
getCipherSuitesBytes(int index);
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return A list containing the ecdhCurves.
*/
java.util.List
getEcdhCurvesList();
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return The count of ecdhCurves.
*/
int getEcdhCurvesCount();
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the element to return.
* @return The ecdhCurves at the given index.
*/
java.lang.String getEcdhCurves(int index);
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the value to return.
* @return The bytes of the ecdhCurves at the given index.
*/
com.google.protobuf.ByteString
getEcdhCurvesBytes(int index);
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy