Skip to content

Commit 60416bd

Browse files
Merge pull request #1021 from msjuburke/patch-1
Update and reorder protocol list.
2 parents b2b7c9b + a10a4f0 commit 60416bd

File tree

1 file changed

+79
-34
lines changed

1 file changed

+79
-34
lines changed

sdk-api-src/content/schannel/ns-schannel-secpkgcontext_connectioninfo.md

Lines changed: 79 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -70,28 +70,29 @@ Protocol used to establish this connection. The following table describes the co
7070
<th>Value</th>
7171
<th>Meaning</th>
7272
</tr>
73+
7374
<tr>
74-
<td width="40%"><a id="SP_PROT_TLS1_CLIENT"></a><a id="sp_prot_tls1_client"></a><dl>
75-
<dt><b>SP_PROT_TLS1_CLIENT</b></dt>
76-
<dt>128 (0x80)</dt>
75+
<td width="40%"><a id="SP_PROT_SSL2_CLIENT"></a><a id="sp_prot_ssl2_client"></a><dl>
76+
<dt><b>SP_PROT_SSL2_CLIENT</b></dt>
77+
<dt>8 (0x8)</dt>
7778
</dl>
7879
</td>
7980
<td width="60%">
80-
<a href="/windows/desktop/SecGloss/t-gly">Transport Layer Security</a> 1.0 client-side.
81-
81+
Secure Sockets Layer 2.0 client-side. Superseded by SP_PROT_TLS1_CLIENT.
8282
</td>
8383
</tr>
84+
8485
<tr>
85-
<td width="40%"><a id="SP_PROT_TLS1_SERVER"></a><a id="sp_prot_tls1_server"></a><dl>
86-
<dt><b>SP_PROT_TLS1_SERVER</b></dt>
87-
<dt>64 (0x40)</dt>
86+
<td width="40%"><a id="SP_PROT_SSL2_SERVER"></a><a id="sp_prot_ssl2_server"></a><dl>
87+
<dt><b>SP_PROT_SSL2_SERVER</b></dt>
88+
<dt>4 (0x4)</dt>
8889
</dl>
8990
</td>
9091
<td width="60%">
91-
Transport Layer Security 1.0 server-side.
92-
92+
Secure Sockets Layer 2.0 server-side. Superseded by SP_PROT_TLS1_SERVER.
9393
</td>
9494
</tr>
95+
9596
<tr>
9697
<td width="40%"><a id="SP_PROT_SSL3_CLIENT"></a><a id="sp_prot_ssl3_client"></a><dl>
9798
<dt><b>SP_PROT_SSL3_CLIENT</b></dt>
@@ -100,9 +101,9 @@ Transport Layer Security 1.0 server-side.
100101
</td>
101102
<td width="60%">
102103
Secure Sockets Layer 3.0 client-side.
103-
104104
</td>
105105
</tr>
106+
106107
<tr>
107108
<td width="40%"><a id="SP_PROT_SSL3_SERVER"></a><a id="sp_prot_ssl3_server"></a><dl>
108109
<dt><b>SP_PROT_SSL3_SERVER</b></dt>
@@ -111,9 +112,31 @@ Secure Sockets Layer 3.0 client-side.
111112
</td>
112113
<td width="60%">
113114
Secure Sockets Layer 3.0 server-side.
115+
</td>
116+
</tr>
117+
118+
<tr>
119+
<td width="40%"><a id="SP_PROT_TLS1_0_CLIENT"></a><a id="sp_prot_tls1_0_client"></a><dl>
120+
<dt><b>SP_PROT_TLS1_0_CLIENT</b></dt>
121+
<dt>128 (0x80)</dt>
122+
</dl>
123+
</td>
124+
<td width="60%">
125+
<a href="/windows/desktop/SecGloss/t-gly">Transport Layer Security</a> 1.0 client-side.
126+
</td>
127+
</tr>
114128

129+
<tr>
130+
<td width="40%"><a id="SP_PROT_TLS1_0_SERVER"></a><a id="sp_prot_tls1_0_server"></a><dl>
131+
<dt><b>SP_PROT_TLS1_0_SERVER</b></dt>
132+
<dt>64 (0x40)</dt>
133+
</dl>
134+
</td>
135+
<td width="60%">
136+
Transport Layer Security 1.0 server-side.
115137
</td>
116138
</tr>
139+
117140
<tr>
118141
<td width="40%"><a id="SP_PROT_TLS1_1_CLIENT"></a><a id="sp_prot_tls1_1_client"></a><dl>
119142
<dt><b>SP_PROT_TLS1_1_CLIENT</b></dt>
@@ -122,9 +145,9 @@ Secure Sockets Layer 3.0 server-side.
122145
</td>
123146
<td width="60%">
124147
Transport Layer Security 1.1 client-side.
125-
126148
</td>
127149
</tr>
150+
128151
<tr>
129152
<td width="40%"><a id="SP_PROT_TLS1_1_SERVER"></a><a id="sp_prot_tls1_1_server"></a><dl>
130153
<dt><b>SP_PROT_TLS1_1_SERVER</b></dt>
@@ -133,9 +156,9 @@ Transport Layer Security 1.1 client-side.
133156
</td>
134157
<td width="60%">
135158
Transport Layer Security 1.1 server-side.
136-
137159
</td>
138160
</tr>
161+
139162
<tr>
140163
<td width="40%"><a id="SP_PROT_TLS1_2_CLIENT"></a><a id="sp_prot_tls1_2_client"></a><dl>
141164
<dt><b>SP_PROT_TLS1_2_CLIENT</b></dt>
@@ -144,9 +167,9 @@ Transport Layer Security 1.1 server-side.
144167
</td>
145168
<td width="60%">
146169
Transport Layer Security 1.2 client-side.
147-
148170
</td>
149171
</tr>
172+
150173
<tr>
151174
<td width="40%"><a id="SP_PROT_TLS1_2_SERVER"></a><a id="sp_prot_tls1_2_server"></a><dl>
152175
<dt><b>SP_PROT_TLS1_2_SERVER</b></dt>
@@ -155,53 +178,75 @@ Transport Layer Security 1.2 client-side.
155178
</td>
156179
<td width="60%">
157180
Transport Layer Security 1.2 server-side.
158-
159181
</td>
160182
</tr>
183+
161184
<tr>
162-
<td width="40%"><a id="SP_PROT_PCT1_CLIENT"></a><a id="sp_prot_pct1_client"></a><dl>
163-
<dt><b>SP_PROT_PCT1_CLIENT</b></dt>
164-
<dt>2 (0x2)</dt>
185+
<td width="40%"><a id="SP_PROT_TLS1_3_CLIENT"></a><a id="sp_prot_tls1_3_client"></a><dl>
186+
<dt><b>SP_PROT_TLS1_3_CLIENT</b></dt>
187+
<dt>2048 (0x2000)</dt>
165188
</dl>
166189
</td>
167190
<td width="60%">
168-
Private Communications Technology 1.0 client-side. Obsolete.
169-
191+
Transport Layer Security 1.3 client-side.
170192
</td>
171193
</tr>
194+
172195
<tr>
173-
<td width="40%"><a id="SP_PROT_PCT1_SERVER"></a><a id="sp_prot_pct1_server"></a><dl>
174-
<dt><b>SP_PROT_PCT1_SERVER</b></dt>
175-
<dt>1 (0x1)</dt>
196+
<td width="40%"><a id="SP_PROT_TLS1_3_SERVER"></a><a id="sp_prot_tls1_3_server"></a><dl>
197+
<dt><b>SP_PROT_TLS1_3_SERVER</b></dt>
198+
<dt>1024 (0x1000)</dt>
176199
</dl>
177200
</td>
178201
<td width="60%">
179-
Private Communications Technology 1.0 server-side. Obsolete.
202+
Transport Layer Security 1.3 server-side.
203+
</td>
204+
</tr>
180205

206+
<tr>
207+
<td width="40%"><a id="SP_PROT_DTLS1_0_CLIENT"></a><a id="sp_prot_dtls1_0_client"></a><dl>
208+
<dt><b>SP_PROT_DTLS1_0_CLIENT</b></dt>
209+
<dt>1024 (0x00020000)</dt>
210+
</dl>
211+
</td>
212+
<td width="60%">
213+
Datagram Transport Layer Security 1.0 client-side.
181214
</td>
182215
</tr>
216+
183217
<tr>
184-
<td width="40%"><a id="SP_PROT_SSL2_CLIENT"></a><a id="sp_prot_ssl2_client"></a><dl>
185-
<dt><b>SP_PROT_SSL2_CLIENT</b></dt>
186-
<dt>8 (0x8)</dt>
218+
<td width="40%"><a id="SP_PROT_DTLS1_0_SERVER"></a><a id="sp_prot_dtls1_0_server"></a><dl>
219+
<dt><b>SP_PROT_DTLS1_0_SERVER</b></dt>
220+
<dt>1024 (0x00010000)</dt>
187221
</dl>
188222
</td>
189223
<td width="60%">
190-
Secure Sockets Layer 2.0 client-side. Superseded by SP_PROT_TLS1_CLIENT.
224+
Datagram Transport Layer Security 1.0 server-side.
225+
</td>
226+
</tr>
191227

228+
<tr>
229+
<td width="40%"><a id="SP_PROT_DTLS1_2_CLIENT"></a><a id="sp_prot_dtls1_2_client"></a><dl>
230+
<dt><b>SP_PROT_DTLS1_2_CLIENT</b></dt>
231+
<dt>1024 (0x00080000)</dt>
232+
</dl>
233+
</td>
234+
<td width="60%">
235+
Datagram Transport Layer Security 1.2 client-side.
192236
</td>
193237
</tr>
238+
194239
<tr>
195-
<td width="40%"><a id="SP_PROT_SSL2_SERVER"></a><a id="sp_prot_ssl2_server"></a><dl>
196-
<dt><b>SP_PROT_SSL2_SERVER</b></dt>
197-
<dt>4 (0x4)</dt>
240+
<td width="40%"><a id="SP_PROT_DTLS1_2_SERVER"></a><a id="sp_prot_dtls1_2_server"></a><dl>
241+
<dt><b>SP_PROT_DTLS1_2_SERVER</b></dt>
242+
<dt>1024 (0x00040000)</dt>
198243
</dl>
199244
</td>
200245
<td width="60%">
201-
Secure Sockets Layer 2.0 server-side. Superseded by SP_PROT_TLS1_SERVER.
202-
246+
Datagram Transport Layer Security 1.2 server-side.
203247
</td>
204248
</tr>
249+
205250
</table>
206251

207252
### -field aiCipher
@@ -357,4 +402,4 @@ Diffie-Hellman key exchange.
357402

358403
### -field dwExchStrength
359404

360-
Key length, in bits. For RSA key exchange, this member will typically contain one of the following values: 512, 768, 1024, or 2048. For Diffie-Hellman key exchange, this member will typically contain one of the following values: 224, 256, 384 or 512.
405+
Key length, in bits. For RSA key exchange, this member will typically contain one of the following values: 512, 768, 1024, or 2048. For Diffie-Hellman key exchange, this member will typically contain one of the following values: 224, 256, 384 or 512.

0 commit comments

Comments
 (0)