Represents a particular configuration composed of an SSL version, certificate filename, and private key filename. This configuration is then used as a key into a Context Registry that stores SciSslContext objects. These objects can be reused by multiple connections between a given client and server.Answers the CA file for the SciSslSocketConfiguration instance. The Certificate Authority (CA) file is a trusted certificate used for verification purposes.Sets the CA file for the SciSslSocketConfiguration instance.Answers the X509 certificate (could be nil) in the same format as provided by the setter. This could be a filename <String> or a certificate object <SciSslX509Certificate>Sets the certificate to be used for the SciSslSocketConfiguration instance. This could be a filename <String> or a certificate object <SciSslX509Certificate>Answers the certificate filename for the SciSslSocketConfiguration instance.Sets the certificate filename for the SciSslSocketConfiguration instance.Answers the context associated with this instance of SciSslSocketConfiguration stored in the ContextRegistry. If none exists, it creates a new context, stores it in the ContextRegistry with this SciSslSocketConfiguration as its key, and answers the newly created instance of SciSslContext.Answers the private key (could be nil) in the same format as provided by the setter. This could be a filename <String> or a private key object <SciSslPrivateKey>Sets the private key to be used for the SciSslSocketConfiguration instance. This could be a filename <String> or a private key object <SciSslPrivateKey>.
• DEFAULT - Specifying 'DEFAULT' will provide the preferred default ssl version protocol of the SSL Interface Implementation. Usually, this will be a TLS based version protocol.
• TLS, TLS_server, TLS_client - A TLS/SSL connection established with these methods may understand the SSLv3, TLSv1, TLSv1.1 and TLSv1.2 protocols.
• TLSv1, TLSv1_server, TLSv1_client - A TLS/SSL connection established with these methods will only understand the TLSv1 protocol
•
• TLSv1_1, TLSv1_1_server, TLSv1_1_client - A TLS/SSL connection established with these methods will only understand the TLSv1.1 protocol
• TLSv1_2, TLSv1_2_server, TLSv1_2_client - A TLS/SSL connection established with these methods will only understand the TLSv1.2 protocol
• SSLv2, SSLv2_server, SSLv2_client - A TLS/SSL connection established with these methods will only understand the SSLv2 protocol.
•
• SSLv3, SSLv3_server, SSLv3_client - A TLS/SSL connection established with these methods will only understand the SSLv3 protocol.
•
• SSLv23, SSLv23_server, SSLv23_client - A TLS/SSL connection established with these methods may understand the SSLv3, TLSv1, TLSv1.1 and TLSv1.2 protocols.
• SSL_VERIFY_NONE -
Server - the server will not send a client certificate request to the client, so the client will not send a certificate.
Client - if anonymous ciphers are not in use (by default disabled), the server will send a certificate which will be checked. The result of the certificate verification process can be checked after the TLS/SSL handshake using the sslVerifyCertificate method. The handshake will be continued regardless of the verification result.
• SSL_VERIFY_PEER -
Server - the server sends a client certificate request to the client. The certificate returned (if any) is checked. If the verification process fails, the TLS/SSL handshake is immediately terminated with an alert message containing the reason for the verification failure. The behavior can be controlled by or-ing the additional SSL_VERIFY_FAIL_IF_NO_PEER_CERT and SSL_VERIFY_CLIENT_ONCE flags.
Client - the server certificate is verified. If the verification process fails, the TLS/SSL handshake is immediately terminated with an alert message containing the reason for the verification failure. If no server certificate is sent, because an anonymous cipher is used, SSL_VERIFY_PEER is ignored.
• SSL_VERIFY_FAIL_IF_NO_PEER_CERT -
Server - if the client did not return a certificate, the TLS/SSL handshake is immediately terminated with a handshake failure alert. This flag must be used together with SSL_VERIFY_PEER.
Client - ignored
• SSL_VERIFY_CLIENT_ONCE -
Server - only request a client certificate on the initial TLS/SSL handshake. Do not ask for a client certificate again in case of a renegotiation. This flag must be used together with SSL_VERIFY_PEER.
Client - ignored
|