Home
last modified time | relevance | path

Searched refs:tls (Results 1 – 25 of 766) sorted by relevance

12345678910>>...31

/third_party/nghttp2/src/
Dshrpx_connection.cc68 tls{DefaultMemchunks(mcpool), DefaultPeekMemchunks(mcpool),
100 if (tls.ssl) { in disconnect()
102 SSL_set_shutdown(tls.ssl, in disconnect()
103 SSL_get_shutdown(tls.ssl) | SSL_RECEIVED_SHUTDOWN); in disconnect()
106 if (tls.cached_session) { in disconnect()
107 SSL_SESSION_free(tls.cached_session); in disconnect()
108 tls.cached_session = nullptr; in disconnect()
111 if (tls.cached_session_lookup_req) { in disconnect()
112 tls.cached_session_lookup_req->canceled = true; in disconnect()
113 tls.cached_session_lookup_req = nullptr; in disconnect()
[all …]
Dshrpx_tls_test.cc39 auto tree = std::make_unique<tls::CertLookupTree>(); in test_shrpx_tls_create_lookup_tree()
88 tree = std::make_unique<tls::CertLookupTree>(); in test_shrpx_tls_create_lookup_tree()
126 auto nghttp2_tls_ctx_data = std::make_unique<tls::TLSContextData>(); in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
137 auto examples_tls_ctx_data = std::make_unique<tls::TLSContextData>(); in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
144 tls::CertLookupTree tree; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
147 rv = tls::cert_lookup_tree_add_ssl_ctx(&tree, indexed_ssl_ctx, in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
152 rv = tls::cert_lookup_tree_add_ssl_ctx(&tree, indexed_ssl_ctx, in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
167 return tls::tls_hostname_match(StringRef{pattern, N}, StringRef{hostname, M}); in tls_hostname_match_wrapper()
235 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname()
248 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname()
[all …]
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-server.c85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config()
89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config()
114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb()
142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb()
213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert);
236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
265 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
273 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx,
293 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p,
302 vhost->tls.ssl_ctx, p,
[all …]
Dopenssl-client.c73 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl));
116 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback()
123 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback()
129 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback()
162 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback()
163 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback()
170 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback()
171 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback()
177 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback()
178 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback()
[all …]
Dopenssl-ssl.c40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher()
55 if (!wsi->tls.ssl) in lws_ssl_get_error()
58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error()
59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error()
140 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx()
143 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx()
146 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx()
147 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx()
149 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx()
151 if (vhost->tls.tcr) { in lws_ssl_destroy_client_ctx()
[all …]
/third_party/libwebsockets/lib/tls/mbedtls/
Dmbedtls-ssl.c35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy()
36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy()
37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy()
38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy()
40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy()
41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy()
51 if (!wsi->tls.ssl) in lws_ssl_capable_read()
55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read()
72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read()
87 if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->tls.ssl)) { in lws_ssl_capable_read()
[all …]
Dmbedtls-client.c75 const char *alpn_comma = wsi->a.context->tls.alpn_default; in lws_ssl_client_bio_create()
102 wsi->tls.ssl = SSL_new(wsi->a.vhost->tls.ssl_client_ctx); in lws_ssl_client_bio_create()
103 if (!wsi->tls.ssl) { in lws_ssl_client_bio_create()
113 if (wsi->a.vhost->tls.ssl_info_event_mask) in lws_ssl_client_bio_create()
114 SSL_set_info_callback(wsi->tls.ssl, lws_ssl_info_callback); in lws_ssl_client_bio_create()
116 if (!(wsi->tls.use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)) { in lws_ssl_client_bio_create()
117 X509_VERIFY_PARAM *param = SSL_get0_param(wsi->tls.ssl); in lws_ssl_client_bio_create()
126 if (wsi->a.vhost->tls.alpn) in lws_ssl_client_bio_create()
127 alpn_comma = wsi->a.vhost->tls.alpn; in lws_ssl_client_bio_create()
147 SSL_set_alpn_select_cb(wsi->tls.ssl, &protos); in lws_ssl_client_bio_create()
[all …]
DCMakeLists.txt43 tls/mbedtls/wrapper/include/internal/ssl3.h
44 tls/mbedtls/wrapper/include/internal/ssl_cert.h
45 tls/mbedtls/wrapper/include/internal/ssl_code.h
46 tls/mbedtls/wrapper/include/internal/ssl_dbg.h
47 tls/mbedtls/wrapper/include/internal/ssl_lib.h
48 tls/mbedtls/wrapper/include/internal/ssl_methods.h
49 tls/mbedtls/wrapper/include/internal/ssl_pkey.h
50 tls/mbedtls/wrapper/include/internal/ssl_stack.h
51 tls/mbedtls/wrapper/include/internal/ssl_types.h
52 tls/mbedtls/wrapper/include/internal/ssl_x509.h
[all …]
Dmbedtls-server.c47 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, NULL); in lws_tls_server_client_cert_verify_config()
70 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_mbedtls_sni_cb()
91 if (!vhost->tls.ssl_ctx) { in lws_mbedtls_sni_cb()
99 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_mbedtls_sni_cb()
156 err = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, (int)flen, p); in lws_tls_server_certs_load()
171 err = SSL_CTX_use_PrivateKey_ASN1(0, vhost->tls.ssl_ctx, p, (long)flen); in lws_tls_server_certs_load()
179 vhost->tls.skipped_certs = 0; in lws_tls_server_certs_load()
193 vhost->tls.ssl_ctx = SSL_CTX_new(method, &vhost->context->mcdc); /* create context */ in lws_tls_server_vhost_backend_init()
194 if (!vhost->tls.ssl_ctx) { in lws_tls_server_vhost_backend_init()
199 if (!vhost->tls.use_ssl || in lws_tls_server_vhost_backend_init()
[all …]
/third_party/node/test/parallel/
Dtest-tls-no-sslv23.js7 const tls = require('tls'); constant
10 tls.createSecureContext({ secureProtocol: 'blargh' });
19 tls.createSecureContext({ secureProtocol: 'SSLv2_method' });
23 tls.createSecureContext({ secureProtocol: 'SSLv2_client_method' });
27 tls.createSecureContext({ secureProtocol: 'SSLv2_server_method' });
33 tls.createSecureContext({ secureProtocol: 'SSLv3_method' });
37 tls.createSecureContext({ secureProtocol: 'SSLv3_client_method' });
41 tls.createSecureContext({ secureProtocol: 'SSLv3_server_method' });
47 tls.createSecureContext({ secureProtocol: 'SSLv23_method' });
48 tls.createSecureContext({ secureProtocol: 'SSLv23_client_method' });
[all …]
Dtest-tls-passphrase.js28 const tls = require('tls'); constant
44 const server = tls.Server({
55 tls.connect({
63 tls.connect({
70 tls.connect({
79 tls.connect({
87 tls.connect({
94 tls.connect({
103 tls.connect({
111 tls.connect({
[all …]
Dtest-tls-basic-validations.js8 const tls = require('tls'); constant
11 () => tls.createSecureContext({ ciphers: 1 }),
20 () => tls.createServer({ ciphers: 1 }),
29 () => tls.createSecureContext({ key: 'dummykey', passphrase: 1 }),
37 () => tls.createServer({ key: 'dummykey', passphrase: 1 }),
45 () => tls.createServer({ ecdhCurve: 1 }),
53 () => tls.createServer({ handshakeTimeout: 'abcd' }),
63 () => tls.createServer({ sessionTimeout: 'abcd' }),
71 () => tls.createServer({ ticketKeys: 'abcd' }),
78 assert.throws(() => tls.createServer({ ticketKeys: Buffer.alloc(0) }), {
[all …]
Dtest-tls-root-certificates.js6 const tls = require('tls'); constant
8 assert(Array.isArray(tls.rootCertificates));
9 assert(tls.rootCertificates.length > 0);
12 assert.strictEqual(tls.rootCertificates, tls.rootCertificates);
15 assert.throws(() => tls.rootCertificates[0] = 0, /TypeError/);
16 assert.throws(() => tls.rootCertificates.sort(), /TypeError/);
19 assert.throws(() => tls.rootCertificates = 0, /TypeError/);
22 assert.strictEqual(tls.rootCertificates.length,
23 new Set(tls.rootCertificates).size);
25 assert(tls.rootCertificates.every((s) => {
[all …]
Dtest-tls-onread-static-buffer.js7 const tls = require('tls'); constant
20 tls.createServer(options, common.mustCall(function(socket) {
27 tls.connect({
45 tls.createServer(options, common.mustCall(function(socket) {
52 tls.connect({
73 tls.createServer(options, common.mustCall(function(socket) {
82 tls.connect({
105 tls.createServer(options, common.mustCall(function(socket) {
114 tls.connect({
140 tls.createServer(options, common.mustCall(function(socket) {
[all …]
Dtest-x509-escaping.js9 const tls = require('tls'); constant
26 const server = tls.createServer({
31 const socket = tls.connect(port, {
121 const server = tls.createServer({
129 tls.connect(port, {
228 const server = tls.createServer({
236 tls.connect(port, {
342 const server = tls.createServer({
350 tls.connect(port, {
402 tls.checkServerIdentity('example.com', {
[all …]
Dtest-tls-no-cert-required.js28 const tls = require('tls'); constant
33 tls.createServer({ ciphers: 'AECDH-NULL-SHA' })
36 tls.createServer(assert.fail)
39 tls.createServer({})
43 () => tls.createServer('this is not valid'),
52 tls.createServer()
/third_party/nghttp2/doc/bash_completion/
Dnghttpx11tls-min-proto-version --tls-max-proto-version --tls-ticket-key-file --tls-ticket-key-memcached --t…
/third_party/libcoap/src/
Dcoap_dtls.c25 session->tls = coap_dtls_new_client_session(session); in coap_dtls_establish()
29 session->tls = coap_dtls_new_server_session(session); in coap_dtls_establish()
32 if (!session->tls) { in coap_dtls_establish()
41 if (session->tls) { in coap_dtls_close()
43 session->tls = NULL; in coap_dtls_close()
54 session->tls = coap_tls_new_client_session(session); in coap_tls_establish()
58 session->tls = coap_tls_new_server_session(session); in coap_tls_establish()
61 if (!session->tls) { in coap_tls_establish()
70 if (session->tls) { in coap_tls_close()
72 session->tls = NULL; in coap_tls_close()
/third_party/libwebsockets/lib/tls/
Dtls-server.c53 vhost->tls.use_ssl = 0; in lws_context_init_server_ssl()
71 vhost->tls.use_ssl = lws_check_opt(vhost->options, in lws_context_init_server_ssl()
74 if (vhost->tls.use_ssl && info->ssl_cipher_list) in lws_context_init_server_ssl()
79 vhost->name, vhost->tls.use_ssl ? "" : "non-"); in lws_context_init_server_ssl()
95 vhost->tls.allow_non_ssl_on_ssl_port = 1; in lws_context_init_server_ssl()
101 if (vhost->tls.use_ssl) { in lws_context_init_server_ssl()
109 vhost->tls.ssl_ctx, vhost, 0)) in lws_context_init_server_ssl()
113 if (vhost->tls.use_ssl) in lws_context_init_server_ssl()
142 if (wsi->tls.ssl) in lws_server_socket_service_ssl()
188 if (wsi->a.vhost->tls.allow_non_ssl_on_ssl_port && !wsi->skip_fallback) { in lws_server_socket_service_ssl()
[all …]
Dtls-network.c39 lws_dll2_get_head(&pt->tls.dll_pending_tls_owner)) { in lws_tls_fake_POLLIN_for_buffered()
41 tls.dll_pending_tls); in lws_tls_fake_POLLIN_for_buffered()
59 lws_dll2_remove(&wsi->tls.dll_pending_tls); in __lws_ssl_remove_wsi_from_buffered_list()
81 if (v->tls.ssl_ctx && !v->tls.skipped_certs) { in lws_tls_check_cert_lifetime()
155 vhost->tls.skipped_certs = 1; in lws_tls_generic_cert_checks()
183 if (v->tls.alloc_cert_path && v->tls.key_path && in lws_tls_cert_updated()
184 !strcmp(v->tls.alloc_cert_path, certpath) && in lws_tls_cert_updated()
185 !strcmp(v->tls.key_path, keypath)) { in lws_tls_cert_updated()
190 if (v->tls.skipped_certs) in lws_tls_cert_updated()
216 if (v->tls.use_ssl && in lws_gate_accepts()
DCMakeLists.txt25 # This converts everything about the tls support into
109 set(LWS_OPENSSL_CLIENT_CERTS /etc/pki/tls/certs/ CACHE PATH "Client SSL certificate directory")
114 tls/tls.c)
117 tls/tls-network.c)
121 tls/tls-sessions.c)
125 tls/tls-jit-trust.c)
130 tls/mbedtls/mbedtls-tls.c
131 tls/mbedtls/mbedtls-extensions.c
132 tls/mbedtls/mbedtls-x509.c)
135 tls/mbedtls/mbedtls-ssl.c)
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/Windows/
DThreadLocal.inc25 DWORD* tls = reinterpret_cast<DWORD*>(&data);
26 *tls = TlsAlloc();
27 assert(*tls != TLS_OUT_OF_INDEXES);
31 DWORD* tls = reinterpret_cast<DWORD*>(&data);
32 TlsFree(*tls);
36 DWORD* tls = reinterpret_cast<DWORD*>(&data);
37 return TlsGetValue(*tls);
41 DWORD* tls = reinterpret_cast<DWORD*>(&data);
42 int errorcode = TlsSetValue(*tls, const_cast<void*>(d));
/third_party/toybox/toys/pending/
Dwget.c89 struct tls *tls;
142 if ((TT.tls = tls_client()) == NULL) in wget_connect()
143 error_exit("tls_client: %s", tls_error(TT.tls)); in wget_connect()
150 if (tls_configure(TT.tls, cfg) != 0) in wget_connect()
151 error_exit("tls_configure: %s", tls_error(TT.tls)); in wget_connect()
154 if (tls_connect(TT.tls, host, port) != 0) in wget_connect()
155 error_exit("tls_connect: %s", tls_error(TT.tls)); in wget_connect()
191 ssize_t ret = tls_read(TT.tls, buf, len); in wget_read()
192 if (ret < 0) error_exit("tls_read: %s", tls_error(TT.tls)); in wget_read()
209 if (len != tls_write(TT.tls, buf, len)) in wget_write()
[all …]
/third_party/node/doc/api/
Dtls.md7 <!-- source_link=lib/tls.js -->
9 The `node:tls` module provides an implementation of the Transport Layer Security
14 const tls = require('node:tls');
20 `node:crypto` module. In such cases, attempting to `import` from `tls` or
21 calling `require('node:tls')` will result in an error being thrown.
28 let tls;
30 tls = require('node:tls');
32 console.error('tls support is disabled!');
46 let tls;
48 tls = await import('node:tls');
[all …]
/third_party/pulseaudio/src/tests/
Dthread-test.c34 static pa_tls *tls = NULL; variable
47 pa_tls_set(tls, data); in thread_func()
49 pa_log_info("thread_func() for %s starting...", (char*) pa_tls_get(tls)); in thread_func()
56 pa_log_info("%s waiting ...", (char*) pa_tls_get(tls)); in thread_func()
78 pa_log_info("%s got number %i", (char*) pa_tls_get(tls), k); in thread_func()
91 pa_log_info("thread_func() for %s done...", (char*) pa_tls_get(tls)); in thread_func()
104 tls = pa_tls_new(pa_xfree); in START_TEST()
143 pa_tls_free(tls); in START_TEST()

12345678910>>...31