Home
last modified time | relevance | path

Searched refs:TLS1 (Results 1 – 25 of 34) sorted by relevance

12

/third_party/openssl/test/recipes/30-test_evp_data/
Devppkey_kdf_tls1_prf.txt14 Title = TLS1 PRF tests (from NIST test vectors)
16 PKEYKDF = TLS1-PRF
24 PKEYKDF = TLS1-PRF
33 PKEYKDF = TLS1-PRF
41 PKEYKDF = TLS1-PRF
49 PKEYKDF = TLS1-PRF
67 PKEYKDF = TLS1-PRF
Devpkdf_tls11_prf.txt14 Title = TLS1 PRF tests (from NIST test vectors)
16 KDF = TLS1-PRF
24 KDF = TLS1-PRF
33 KDF = TLS1-PRF
Devpkdf_tls12_prf.txt16 KDF = TLS1-PRF
24 KDF = TLS1-PRF
42 KDF = TLS1-PRF
/third_party/openssl/doc/man7/
DEVP_KDF-TLS1_PRF.pod5 EVP_KDF-TLS1_PRF - The TLS1 PRF EVP_KDF implementation
9 Support for computing the B<TLS1> PRF through the B<EVP_KDF> API.
16 "TLS1-PRF" is the name for this implementation; it
53 EVP_KDF *kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
72 kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
DOSSL_PROVIDER-default.pod136 =item TLS1-PRF, see L<EVP_KDF-TLS1_PRF(7)>
DOSSL_PROVIDER-FIPS.pod97 =item TLS1-PRF, see L<EVP_KDF-TLS1_PRF(7)>
/third_party/openssl/doc/man1/
Dopenssl-kdf.pod.in118 The supported algorithms names include TLS1-PRF, HKDF, SSKDF, PBKDF2,
125 Use TLS1-PRF to create a hex-encoded derived key from a secret key and seed:
128 -kdfopt seed:seed TLS1-PRF
Dopenssl-pkeyutl.pod.in151 at present B<TLS1-PRF> and B<HKDF>.
373 Hexdump 48 bytes of TLS1 PRF using digest B<SHA256> and shared secret and
376 openssl pkeyutl -kdf TLS1-PRF -kdflen 48 -pkeyopt md:SHA256 \
/third_party/curl/docs/cmdline-opts/
Dssl-allow-beast.md20 TLS1.0 protocols known as BEAST. If this option is not used, the SSL layer may
/third_party/curl/tests/data/
Dtest32025 <TABLE border=1><TR><TD>Protocol version:</TD><TD>TLS1.2</TD></TR>
/third_party/openssl/doc/man3/
DSSL_CTX_set1_curves.pod93 are identical in every respect. They exist because, prior to TLS1.3, there was
94 only the concept of supported curves. In TLS1.3 this was renamed to supported
DSSL_CTX_set_stateless_cookie_generate_cb.pod9 - Callback functions for stateless TLS1.3 cookies
DSSL_CTX_set_split_send_fragment.pod39 TLS1.1+. There is no support in SSLv3, TLSv1.0 or DTLS (any version). This
DEVP_EncryptInit.pod856 Gets the maximum record length for a TLS1 multiblock cipher operation.
950 Triggers a multiblock TLS1 encrypt operation for a TLS1 aware cipher that
960 Supplies the data to encrypt for a TLS1 multiblock cipher operation.
964 Sets the maximum send fragment size for a TLS1 multiblock cipher operation.
970 Sets the authenticated additional data used by a TLS1 multiblock cipher operation.
DSSL_extension_supported.pod205 The extension is only defined for TLS1.3 and above. Servers will ignore this
/third_party/curl/docs/libcurl/opts/
DCURLOPT_SSL_OPTIONS.md33 SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
DCURLOPT_PROXY_SSL_OPTIONS.md35 SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
/third_party/openssl/test/ssl-tests/
D04-client_auth.cnf.in50 # TODO(TLS1.3) add TLSv1.3 versions
/third_party/libwebsockets/READMEs/
DREADME.lwsws.md242 …- "`client-ssl-ciphers`": "<cipher list>" OPENSSL only: sets the allowed list of <= TLS1.2 cipher…
244 …- "`tls13-ciphers`": "<cipher list>" OPENSSL 1.1.1+ only: sets allowed list of TLS1.3+ ciphers an…
246 …- "`client-tls13-ciphers`": "<cipher list>" OPENSSL 1.1.1+ only: sets the allowed list of TLS1.3+…
/third_party/mbedtls/tests/suites/
Dtest_suite_psa_crypto_metadata.data293 Key derivation: TLS1.2 ECJPAKE-to-PMS
/third_party/mbedtls/tests/
Dssl-opt.sh674 if $GNUTLS_NEXT_CLI -l 2>&1 | grep VERS-TLS1.3 >/dev/null
11482 requires_ciphersuite_enabled TLS1-3-CHACHA20-POLY1305-SHA256
13271 requires_ciphersuite_enabled TLS1-3-AES-256-GCM-SHA384
/third_party/openssl/
DNEWS.md154 PKCS12 KDF, SCRYPT, SSH KDF, SSKDF, TLS1 PRF, X9.42 KDF and X9.63 KDF.
264 For further important information, see the [TLS1.3 page](
265 https://wiki.openssl.org/index.php/TLS1.3) in the OpenSSL Wiki.
/third_party/node/deps/openssl/openssl/
DNEWS.md182 PKCS12 KDF, SCRYPT, SSH KDF, SSKDF, TLS1 PRF, X9.42 KDF and X9.63 KDF.
292 For further important information, see the [TLS1.3 page](
293 https://wiki.openssl.org/index.php/TLS1.3) in the OpenSSL Wiki.
/third_party/libcoap/man/
Dcoap_encryption.txt.in136 * If not NULL, is called when the Identity Hint (TLS1.2 or earlier) is
183 * Note: Identity Hint is not supported in (D)TLS1.3.
/third_party/node/deps/openssl/openssl/include/openssl/
Dssl.h.in265 /* Extension is only defined for TLS1.2 and below */
267 /* Extension is only defined for TLS1.3 and above */
272 /* Really means TLS1.2 or below */

12