Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: envoy/api/v3alpha/auth/cert.proto
package io.envoyproxy.envoy.api.v3alpha.auth;
public interface TlsParametersOrBuilder extends
// @@protoc_insertion_point(interface_extends:envoy.api.v3alpha.auth.TlsParameters)
com.google.protobuf.MessageOrBuilder {
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_0``.
*
* Maximum TLS protocol version. By default, it's ``TLSv1_3`` for servers in non-FIPS builds, and
* ``TLSv1_2`` for clients and for servers using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`.
*
* Maximum TLS protocol version. By default, it's ``TLSv1_3`` for servers in non-FIPS builds, and
* ``TLSv1_2`` for clients and for servers using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`.
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*