/third_party/nghttp2/src/ |
D | shrpx_connection.cc | 63 : tls{DefaultMemchunks(mcpool), DefaultPeekMemchunks(mcpool), in Connection() 89 tls.last_write_idle = 0.; 99 if (tls.ssl) { in disconnect() 100 SSL_set_shutdown(tls.ssl, in disconnect() 101 SSL_get_shutdown(tls.ssl) | SSL_RECEIVED_SHUTDOWN); in disconnect() 104 if (tls.cached_session) { in disconnect() 105 SSL_SESSION_free(tls.cached_session); in disconnect() 106 tls.cached_session = nullptr; in disconnect() 109 if (tls.cached_session_lookup_req) { in disconnect() 110 tls.cached_session_lookup_req->canceled = true; in disconnect() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-ssl.c | 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 51 if (!wsi->tls.ssl) in lws_ssl_capable_read() 55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read() 72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read() 87 if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->tls.ssl)) { in lws_ssl_capable_read() [all …]
|
D | mbedtls-client.c | 75 const char *alpn_comma = wsi->a.context->tls.alpn_default; in lws_ssl_client_bio_create() 102 wsi->tls.ssl = SSL_new(wsi->a.vhost->tls.ssl_client_ctx); in lws_ssl_client_bio_create() 103 if (!wsi->tls.ssl) { in lws_ssl_client_bio_create() 113 if (wsi->a.vhost->tls.ssl_info_event_mask) in lws_ssl_client_bio_create() 114 SSL_set_info_callback(wsi->tls.ssl, lws_ssl_info_callback); in lws_ssl_client_bio_create() 116 if (!(wsi->tls.use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)) { in lws_ssl_client_bio_create() 117 X509_VERIFY_PARAM *param = SSL_get0_param(wsi->tls.ssl); in lws_ssl_client_bio_create() 126 if (wsi->a.vhost->tls.alpn) in lws_ssl_client_bio_create() 127 alpn_comma = wsi->a.vhost->tls.alpn; in lws_ssl_client_bio_create() 147 SSL_set_alpn_select_cb(wsi->tls.ssl, &protos); in lws_ssl_client_bio_create() [all …]
|
D | CMakeLists.txt | 43 tls/mbedtls/wrapper/include/internal/ssl3.h 44 tls/mbedtls/wrapper/include/internal/ssl_cert.h 45 tls/mbedtls/wrapper/include/internal/ssl_code.h 46 tls/mbedtls/wrapper/include/internal/ssl_dbg.h 47 tls/mbedtls/wrapper/include/internal/ssl_lib.h 48 tls/mbedtls/wrapper/include/internal/ssl_methods.h 49 tls/mbedtls/wrapper/include/internal/ssl_pkey.h 50 tls/mbedtls/wrapper/include/internal/ssl_stack.h 51 tls/mbedtls/wrapper/include/internal/ssl_types.h 52 tls/mbedtls/wrapper/include/internal/ssl_x509.h [all …]
|
D | mbedtls-server.c | 47 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, NULL); in lws_tls_server_client_cert_verify_config() 70 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_mbedtls_sni_cb() 91 if (!vhost->tls.ssl_ctx) { in lws_mbedtls_sni_cb() 99 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_mbedtls_sni_cb() 156 err = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, (int)flen, p); in lws_tls_server_certs_load() 171 err = SSL_CTX_use_PrivateKey_ASN1(0, vhost->tls.ssl_ctx, p, (long)flen); in lws_tls_server_certs_load() 179 vhost->tls.skipped_certs = 0; in lws_tls_server_certs_load() 193 vhost->tls.ssl_ctx = SSL_CTX_new(method, &vhost->context->mcdc); /* create context */ in lws_tls_server_vhost_backend_init() 194 if (!vhost->tls.ssl_ctx) { in lws_tls_server_vhost_backend_init() 199 if (!vhost->tls.use_ssl || in lws_tls_server_vhost_backend_init() [all …]
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-server.c | 85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config() 89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config() 114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert); 233 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 250 vhost->tls.ssl_ctx, NULL, 0)) { 270 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, 278 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx, 298 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p, [all …]
|
D | openssl-ssl.c | 40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher() 55 if (!wsi->tls.ssl) in lws_ssl_get_error() 58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error() 59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error() 142 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx() 145 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx() 148 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx() 149 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx() 151 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx() 153 if (vhost->tls.tcr) { in lws_ssl_destroy_client_ctx() [all …]
|
D | openssl-client.c | 71 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl)); 114 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback() 121 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback() 127 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback() 160 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback() 161 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback() 168 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback() 169 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() 175 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback() 176 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-no-sslv23.js | 7 const tls = require('tls'); constant 10 tls.createSecureContext({ secureProtocol: 'blargh' }); 19 tls.createSecureContext({ secureProtocol: 'SSLv2_method' }); 23 tls.createSecureContext({ secureProtocol: 'SSLv2_client_method' }); 27 tls.createSecureContext({ secureProtocol: 'SSLv2_server_method' }); 33 tls.createSecureContext({ secureProtocol: 'SSLv3_method' }); 37 tls.createSecureContext({ secureProtocol: 'SSLv3_client_method' }); 41 tls.createSecureContext({ secureProtocol: 'SSLv3_server_method' }); 47 tls.createSecureContext({ secureProtocol: 'SSLv23_method' }); 48 tls.createSecureContext({ secureProtocol: 'SSLv23_client_method' }); [all …]
|
D | test-tls-passphrase.js | 28 const tls = require('tls'); constant 44 const server = tls.Server({ 55 tls.connect({ 63 tls.connect({ 70 tls.connect({ 79 tls.connect({ 87 tls.connect({ 94 tls.connect({ 103 tls.connect({ 111 tls.connect({ [all …]
|
D | test-tls-basic-validations.js | 8 const tls = require('tls'); constant 11 () => tls.createSecureContext({ ciphers: 1 }), 20 () => tls.createServer({ ciphers: 1 }), 29 () => tls.createSecureContext({ key: 'dummykey', passphrase: 1 }), 37 () => tls.createServer({ key: 'dummykey', passphrase: 1 }), 45 () => tls.createServer({ ecdhCurve: 1 }), 53 () => tls.createServer({ handshakeTimeout: 'abcd' }), 63 () => tls.createServer({ sessionTimeout: 'abcd' }), 71 () => tls.createServer({ ticketKeys: 'abcd' }), 78 assert.throws(() => tls.createServer({ ticketKeys: Buffer.alloc(0) }), [all …]
|
D | test-tls-root-certificates.js | 6 const tls = require('tls'); constant 8 assert(Array.isArray(tls.rootCertificates)); 9 assert(tls.rootCertificates.length > 0); 12 assert.strictEqual(tls.rootCertificates, tls.rootCertificates); 15 assert.throws(() => tls.rootCertificates[0] = 0, /TypeError/); 16 assert.throws(() => tls.rootCertificates.sort(), /TypeError/); 19 assert.throws(() => tls.rootCertificates = 0, /TypeError/); 22 assert.strictEqual(tls.rootCertificates.length, 23 new Set(tls.rootCertificates).size); 25 assert(tls.rootCertificates.every((s) => { [all …]
|
D | test-x509-escaping.js | 8 const tls = require('tls'); constant 25 const server = tls.createServer({ 30 const socket = tls.connect(port, { 124 const server = tls.createServer({ 132 tls.connect(port, { 234 const server = tls.createServer({ 242 tls.connect(port, { 343 const server = tls.createServer({ 351 tls.connect(port, { 394 tls.checkServerIdentity('example.com', { [all …]
|
D | test-x509-escaping-revert-CVE-2021-44532.js | 9 const tls = require('tls'); constant 102 const server = tls.createServer({ 110 tls.connect(port, { 215 const server = tls.createServer({ 223 tls.connect(port, { 264 tls.checkServerIdentity('example.com', { 287 const err = tls.checkServerIdentity(hostname, { subjectaltname: san }); 313 const server = tls.createServer({ key, cert }, common.mustNotCall()); 316 const socket = tls.connect(port, { 348 const server = tls.createServer({ key, cert }, common.mustCall((socket) => { [all …]
|
D | test-tls-no-cert-required.js | 28 const tls = require('tls'); constant 33 tls.createServer({ ciphers: 'AECDH-NULL-SHA' }) 36 tls.createServer(assert.fail) 39 tls.createServer({}) 43 () => tls.createServer('this is not valid'), 52 tls.createServer()
|
/third_party/nghttp2/doc/bash_completion/ |
D | nghttpx | 11 …tls-ticket-key-file --verify-client-cacert --max-response-header-fields --backend-http2-window-siz…
|
/third_party/libwebsockets/lib/tls/ |
D | tls-server.c | 53 vhost->tls.use_ssl = 0; in lws_context_init_server_ssl() 71 vhost->tls.use_ssl = lws_check_opt(vhost->options, in lws_context_init_server_ssl() 74 if (vhost->tls.use_ssl && info->ssl_cipher_list) in lws_context_init_server_ssl() 79 vhost->name, vhost->tls.use_ssl ? "" : "non-"); in lws_context_init_server_ssl() 95 vhost->tls.allow_non_ssl_on_ssl_port = 1; in lws_context_init_server_ssl() 101 if (vhost->tls.use_ssl) { in lws_context_init_server_ssl() 109 vhost->tls.ssl_ctx, vhost, 0)) in lws_context_init_server_ssl() 113 if (vhost->tls.use_ssl) in lws_context_init_server_ssl() 142 if (wsi->tls.ssl) in lws_server_socket_service_ssl() 188 if (wsi->a.vhost->tls.allow_non_ssl_on_ssl_port && !wsi->skip_fallback) { in lws_server_socket_service_ssl() [all …]
|
D | tls-network.c | 39 lws_dll2_get_head(&pt->tls.dll_pending_tls_owner)) { in lws_tls_fake_POLLIN_for_buffered() 41 tls.dll_pending_tls); in lws_tls_fake_POLLIN_for_buffered() 59 lws_dll2_remove(&wsi->tls.dll_pending_tls); in __lws_ssl_remove_wsi_from_buffered_list() 81 if (v->tls.ssl_ctx && !v->tls.skipped_certs) { in lws_tls_check_cert_lifetime() 155 vhost->tls.skipped_certs = 1; in lws_tls_generic_cert_checks() 183 if (v->tls.alloc_cert_path && v->tls.key_path && in lws_tls_cert_updated() 184 !strcmp(v->tls.alloc_cert_path, certpath) && in lws_tls_cert_updated() 185 !strcmp(v->tls.key_path, keypath)) { in lws_tls_cert_updated() 190 if (v->tls.skipped_certs) in lws_tls_cert_updated() 216 if (v->tls.use_ssl && in lws_gate_accepts()
|
/third_party/grpc/src/core/lib/gpr/ |
D | tls_pthread.h | 45 #define gpr_tls_init(tls) GPR_ASSERT(0 == pthread_key_create(&(tls)->key, NULL)) argument 46 #define gpr_tls_destroy(tls) pthread_key_delete((tls)->key) argument 47 #define gpr_tls_get(tls) ((intptr_t)pthread_getspecific((tls)->key)) argument 51 intptr_t gpr_tls_set(struct gpr_pthread_thread_local* tls, intptr_t value);
|
D | tls_stdcpp.h | 36 #define gpr_tls_init(tls) \ argument 40 #define gpr_tls_destroy(tls) \ argument 44 #define gpr_tls_set(tls, new_value) (*(tls) = (new_value)) argument 46 #define gpr_tls_get(tls) (*(tls)) argument
|
D | tls_gcc.h | 43 #define gpr_tls_init(tls) \ argument 46 #define gpr_tls_destroy(tls) \ argument 49 #define gpr_tls_set(tls, new_value) (((tls)->value) = (new_value)) argument 50 #define gpr_tls_get(tls) ((tls)->value) argument
|
D | tls_msvc.h | 45 #define gpr_tls_init(tls) \ argument 48 #define gpr_tls_destroy(tls) \ argument 51 #define gpr_tls_set(tls, new_value) (((tls)->value) = (new_value)) argument 52 #define gpr_tls_get(tls) ((tls)->value) argument
|
/third_party/flutter/skia/third_party/externals/sdl/test/ |
D | testthread.c | 21 static SDL_TLSID tls; variable 35 SDL_TLSSet(tls, "baby thread", NULL); in ThreadFunc() 37 (char *) data, SDL_ThreadID(), (const char *)SDL_TLSGet(tls)); in ThreadFunc() 69 tls = SDL_TLSCreate(); in main() 70 SDL_assert(tls); in main() 71 SDL_TLSSet(tls, "main thread", NULL); in main() 72 SDL_Log("Main thread data initially: %s\n", (const char *)SDL_TLSGet(tls)); in main() 85 SDL_Log("Main thread data finally: %s\n", (const char *)SDL_TLSGet(tls)); in main()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/Windows/ |
D | ThreadLocal.inc | 25 DWORD* tls = reinterpret_cast<DWORD*>(&data); 26 *tls = TlsAlloc(); 27 assert(*tls != TLS_OUT_OF_INDEXES); 31 DWORD* tls = reinterpret_cast<DWORD*>(&data); 32 TlsFree(*tls); 36 DWORD* tls = reinterpret_cast<DWORD*>(&data); 37 return TlsGetValue(*tls); 41 DWORD* tls = reinterpret_cast<DWORD*>(&data); 42 int errorcode = TlsSetValue(*tls, const_cast<void*>(d));
|
/third_party/toybox/toys/pending/ |
D | wget.c | 89 struct tls *tls; 142 if ((TT.tls = tls_client()) == NULL) in wget_connect() 143 error_exit("tls_client: %s", tls_error(TT.tls)); in wget_connect() 150 if (tls_configure(TT.tls, cfg) != 0) in wget_connect() 151 error_exit("tls_configure: %s", tls_error(TT.tls)); in wget_connect() 154 if (tls_connect(TT.tls, host, port) != 0) in wget_connect() 155 error_exit("tls_connect: %s", tls_error(TT.tls)); in wget_connect() 191 ssize_t ret = tls_read(TT.tls, buf, len); in wget_read() 192 if (ret < 0) error_exit("tls_read: %s", tls_error(TT.tls)); in wget_read() 209 if (len != tls_write(TT.tls, buf, len)) in wget_write() [all …]
|