| /third_party/mbedtls/include/mbedtls/ |
| D | ssl_ciphersuites.h | 4 * \brief SSL Ciphersuites for Mbed TLS 7 * Copyright The Mbed TLS Contributors 40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */ 41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */ 46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */ 47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */ 61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */ 62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */ 63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */ 64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */ [all …]
|
| /third_party/nghttp2/src/ |
| D | shrpx_connection.cc | 66 tls{DefaultMemchunks(mcpool), DefaultPeekMemchunks(mcpool), 98 if (tls.ssl) { in disconnect() 100 SSL_set_shutdown(tls.ssl, in disconnect() 101 SSL_get_shutdown(tls.ssl) | SSL_RECEIVED_SHUTDOWN); in disconnect() 104 if (tls.cached_session) { in disconnect() 105 SSL_SESSION_free(tls.cached_session); in disconnect() 106 tls.cached_session = nullptr; in disconnect() 109 if (tls.cached_session_lookup_req) { in disconnect() 110 tls.cached_session_lookup_req->canceled = true; in disconnect() 111 tls.cached_session_lookup_req = nullptr; in disconnect() [all …]
|
| /third_party/openhitls/testcode/framework/tls/ |
| D | CMakeLists.txt | 26 ${openHiTLS_SRC}/include/tls 42 ${openHiTLS_SRC}/tls/cert/hitls_x509_adapt 43 ${openHiTLS_SRC}/tls/include 44 ${openHiTLS_SRC}/tls/cert/cert_self 45 ${openHiTLS_SRC}/tls/cert/include 46 ${openHiTLS_SRC}/tls/config/include 47 ${openHiTLS_SRC}/tls/cm/include 48 ${openHiTLS_SRC}/tls/record/include 49 ${openHiTLS_SRC}/tls/record/src 50 ${openHiTLS_SRC}/tls/handshake/cookie/include [all …]
|
| /third_party/curl/docs/libcurl/opts/ |
| D | CURLOPT_SSLVERSION.md | 13 - TLS 14 TLS-backend: 20 CURLOPT_SSLVERSION - preferred TLS/SSL version 32 Pass a long as parameter to control which version range of SSL/TLS versions to 35 The SSL and TLS versions have typically developed from the most insecure 37 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3. 44 default TLS v1.0 since 7.39.0 (unless the TLS library has a stricter rule). 48 TLS v1.0 or later 60 TLS v1.0 or later (Added in 7.34.0) 64 TLS v1.1 or later (Added in 7.34.0) [all …]
|
| /third_party/openhitls/ |
| D | BUILD.gn | 350 "include/tls", 888 "include/tls", 891 "tls/alert/include", 892 "tls/app/include", 893 "tls/ccs/include", 894 "tls/cert/cert_adapt", 895 "tls/cert/include", 896 "tls/cm/include", 897 "tls/config/include", 898 "tls/crypt/crypt_self", [all …]
|
| /third_party/curl/lib/vtls/ |
| D | cipher_suite.c | 55 "TLS" "\0" 163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,), 165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,), 167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,), 169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,), 171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,), 173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,), 175 CS_ENTRY(0xC004, TLS,ECDH,ECDSA,WITH,AES,128,CBC,SHA), 177 CS_ENTRY(0xC005, TLS,ECDH,ECDSA,WITH,AES,256,CBC,SHA), 179 CS_ENTRY(0xC009, TLS,ECDHE,ECDSA,WITH,AES,128,CBC,SHA), [all …]
|
| /third_party/mbedtls/library/ |
| D | ssl_ciphersuites.c | 4 * \brief SSL ciphersuites for Mbed TLS 6 * Copyright The Mbed TLS Contributors 43 /* TLS 1.3 ciphersuites */ 288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", [all …]
|
| /third_party/libwebsockets/lib/tls/mbedtls/ |
| D | mbedtls-ssl.c | 26 #include "private-lib-tls-mbedtls.h" 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 51 if (!wsi->tls.ssl) in lws_ssl_capable_read() 55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read() 72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read() [all …]
|
| D | CMakeLists.txt | 43 tls/mbedtls/wrapper/include/internal/ssl3.h 44 tls/mbedtls/wrapper/include/internal/ssl_cert.h 45 tls/mbedtls/wrapper/include/internal/ssl_code.h 46 tls/mbedtls/wrapper/include/internal/ssl_dbg.h 47 tls/mbedtls/wrapper/include/internal/ssl_lib.h 48 tls/mbedtls/wrapper/include/internal/ssl_methods.h 49 tls/mbedtls/wrapper/include/internal/ssl_pkey.h 50 tls/mbedtls/wrapper/include/internal/ssl_stack.h 51 tls/mbedtls/wrapper/include/internal/ssl_types.h 52 tls/mbedtls/wrapper/include/internal/ssl_x509.h [all …]
|
| /third_party/openhitls/tls/handshake/send/src/ |
| D | send_process.h | 20 #include "tls.h" 29 * @param ctx [IN] TLS context 43 * @param ctx [IN] TLS context 53 * @param ctx [IN] TLS context 63 * @param ctx [IN] TLS context 73 * @param ctx [IN] TLS context 83 * @param ctx [IN] TLS context 93 * @param ctx [IN] TLS context 102 * @param ctx [IN] TLS context 112 * @param ctx [IN] TLS context [all …]
|
| /third_party/grpc/tools/run_tests/generated/ |
| D | lb_interop_test_scenarios.json | 35 "transport_sec": "tls" 40 "transport_sec": "tls" 48 "transport_sec": "tls" 87 "transport_sec": "tls" 92 "transport_sec": "tls" 100 "transport_sec": "tls" 150 "transport_sec": "tls" 156 "transport_sec": "tls" 166 "transport_sec": "tls" 227 "transport_sec": "tls" [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| D | tls.h | 2 * SSL/TLS interface definition 117 * struct tls_connection_params - Parameters for TLS connection 173 * TLS connection parameters to be configured with tls_connection_set_params() 222 * tls_init - Initialize TLS library 223 * @conf: Configuration data for TLS library 228 * session. In other words, there can be two concurrent TLS contexts. If global 230 * authentication types), the TLS library wrapper should maintain a reference 236 * tls_deinit - Deinitialize TLS library 237 * @tls_ctx: TLS context data from tls_init() 241 * shared between both authentication types), the TLS library wrapper should [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| D | tls.h | 2 * SSL/TLS interface definition 125 * struct tls_connection_params - Parameters for TLS connection 179 * TLS connection parameters to be configured with tls_connection_set_params() 226 * tls_init - Initialize TLS library 227 * @conf: Configuration data for TLS library 232 * session. In other words, there can be two concurrent TLS contexts. If global 234 * authentication types), the TLS library wrapper should maintain a reference 240 * tls_deinit - Deinitialize TLS library 241 * @tls_ctx: TLS context data from tls_init() 245 * shared between both authentication types), the TLS library wrapper should [all …]
|
| /third_party/openhitls/testcode/sdv/ |
| D | CMakeLists.txt | 84 ${openHiTLS_SRC}/testcode/framework/tls/func_wrapper/include 85 ${openHiTLS_SRC}/testcode/framework/tls/include 86 ${openHiTLS_SRC}/testcode/framework/tls/callback/include 87 ${openHiTLS_SRC}/testcode/framework/tls/base/include 88 ${openHiTLS_SRC}/testcode/framework/tls/resource/include 89 ${openHiTLS_SRC}/testcode/framework/tls/rpc/include 90 ${openHiTLS_SRC}/testcode/framework/tls/process/include 91 ${openHiTLS_SRC}/testcode/framework/tls/crypt/include 92 ${openHiTLS_SRC}/testcode/framework/tls/transfer/include 93 ${openHiTLS_SRC}/testcode/framework/tls/frame/src [all …]
|
| /third_party/grpc/tools/distrib/python/xds_protos/envoy/extensions/transport_sockets/tls/v3/ |
| D | cert_pb2.py | 3 # source: envoy/extensions/transport_sockets/tls/v3/cert.proto 14 from envoy.extensions.transport_sockets.tls.v3 import common_pb2 as envoy_dot_extensions_dot_transp… 15 from envoy.extensions.transport_sockets.tls.v3 import secret_pb2 as envoy_dot_extensions_dot_transp… 16 from envoy.extensions.transport_sockets.tls.v3 import tls_pb2 as envoy_dot_extensions_dot_transport… 18 from envoy.extensions.transport_sockets.tls.v3.common_pb2 import * 19 from envoy.extensions.transport_sockets.tls.v3.secret_pb2 import * 20 from envoy.extensions.transport_sockets.tls.v3.tls_pb2 import * 22 …tls/v3/cert.proto\x12)envoy.extensions.transport_sockets.tls.v3\x1a\x36\x65nvoy/extensions/transpo… 26 _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'envoy.extensions.transport_sockets.tls.v3.cert… 29 …nsions.transport_sockets.tls.v3B\tCertProtoP\001ZVgithub.com/envoyproxy/go-control-plane/envoy/ext…
|
| /third_party/libwebsockets/lib/tls/openssl/ |
| D | openssl-server.c | 85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config() 89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config() 114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert); 236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 265 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, 273 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx, 293 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p, 302 vhost->tls.ssl_ctx, p, [all …]
|
| D | openssl-client.c | 35 #include "private-lib-tls-openssl.h" 73 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl)); 116 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback() 123 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback() 129 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback() 162 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback() 163 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback() 170 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback() 171 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() 177 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback() [all …]
|
| D | openssl-ssl.c | 26 #include "private-lib-tls-openssl.h" 40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher() 55 if (!wsi->tls.ssl) in lws_ssl_get_error() 58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error() 59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error() 140 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx() 143 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx() 146 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx() 147 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx() 149 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx() [all …]
|
| /third_party/mbedtls/docs/ |
| D | psa-transition.md | 7 …TLS is gradually moving from legacy `mbedtls_xxx` APIs to newer `psa_xxx` APIs for cryptography. N… 9 This guide is intended to help migrate existing applications that use Mbed TLS for cryptography. It… 22 **Tutorial**: See the [getting started guide](https://mbed-tls.readthedocs.io/en/latest/getting_sta… 24 …le online. Mbed TLS implements a large subset of the specification which is documented in the [`ps… 28 * [Mbed TLS open issues](https://github.com/Mbed-TLS/mbedtls/issues) 30 * [Mbed TLS mailing list](https://lists.trustedfirmware.org/mailman3/lists/mbed-tls.lists.trustedfi… 34 * Mbed TLS APIs are traditionally very transparent: the caller can access internal fields of operat… 35 * Mbed TLS legacy APIs require key material to be present in the application memory. The PSA Crypto… 36 …iew/conventions.html#parameter-conventions) which many legacy APIs in Mbed TLS do not follow. For … 37 * Mbed TLS legacy APIs require passing around a random generator argument where needed. This has hi… [all …]
|
| /third_party/nghttp2/ |
| D | gennghttpxfun.py | 40 "frontend-no-tls", 41 "backend-no-tls", 42 "backend-tls-sni-field", 63 "tls-proto-list", 82 "tls-ticket-key-file", 92 "tls-ticket-key-cipher", 94 "tls-session-cache-memcached", 95 "tls-session-cache-memcached-tls", 96 "tls-ticket-key-memcached", 97 "tls-ticket-key-memcached-interval", [all …]
|
| /third_party/openhitls/testcode/sdv/testcase/tls/interface_tlcp/ |
| D | test_suite_sdv_frame_cert_interface.data | 2 UT_TLS_CERT_CM_LoadCertBuffer_API_TC001:TLS1_2:"../../testcode/testdata/tls/certificate/der/ecdsa_s… 5 UT_TLS_CERT_CM_LoadCertBuffer_API_TC001:TLS1_3:"../../testcode/testdata/tls/certificate/der/ecdsa_s… 8 UT_TLS_CERT_CM_LoadCertFile_API_TC001:TLS1_2:"../../testcode/testdata/tls/certificate/der/ecdsa_sha… 11 UT_TLS_CERT_CM_LoadCertFile_API_TC001:TLS1_3:"../../testcode/testdata/tls/certificate/der/ecdsa_sha… 14 UT_TLS_CERT_CFG_LoadCertBuffer_FUNC_001:TLS1_2:"../../testcode/testdata/tls/certificate/der/rsa_sha… 17 …/tls/certificate/der/ecdsa_sha384/clientcert.der":"../../testcode/testdata/tls/certificate/der/nee… 20 …/tls/certificate/der/ecdsa_sha384/clientcert.der":"../../testcode/testdata/tls/certificate/der/nee… 23 UT_TLS_CERT_CFG_SetDefaultPasswordCb_FUNC_001:TLS1_3:"../../testcode/testdata/tls/certificate/der/n… 38 UT_TLS_CERT_CM_LoadKeyBuffer_API_TC001:TLS1_2:"../../testcode/testdata/tls/certificate/der/rsa_sha/… 41 UT_TLS_CERT_CM_LoadKeyBuffer_API_TC001:TLS1_3:"../../testcode/testdata/tls/certificate/der/rsa_sha/… [all …]
|
| /third_party/openssl/ssl/ |
| D | ssl_stat.c | 21 return "SSLv3/TLS read certificate status"; in SSL_state_string_long() 23 return "SSLv3/TLS write next proto"; in SSL_state_string_long() 25 return "SSLv3/TLS read next proto"; in SSL_state_string_long() 27 return "SSLv3/TLS write certificate status"; in SSL_state_string_long() 33 return "SSLv3/TLS write client hello"; in SSL_state_string_long() 35 return "SSLv3/TLS read server hello"; in SSL_state_string_long() 37 return "SSLv3/TLS read server certificate"; in SSL_state_string_long() 39 return "SSLv3/TLS read server key exchange"; in SSL_state_string_long() 41 return "SSLv3/TLS read server certificate request"; in SSL_state_string_long() 43 return "SSLv3/TLS read server session ticket"; in SSL_state_string_long() [all …]
|
| /third_party/mbedtls/docs/architecture/ |
| D | tls13-support.md | 1 TLS 1.3 support 7 Mbed TLS provides an implementation of the TLS 1.3 protocol. The TLS 1.3 support 15 - Mbed TLS implements both the client and the server side of the TLS 1.3 18 - Mbed TLS supports ECDHE key establishment. 20 - Mbed TLS supports DHE key establishment. 22 - Mbed TLS supports pre-shared keys for key establishment, pre-shared keys 25 - Mbed TLS supports session resumption via the ticket mechanism. 27 - Mbed TLS supports sending and receiving early data (0-RTT data). 81 - TLS 1.2 and TLS 1.3 with version negotiation on client and server side. 83 - TLS 1.2 and TLS 1.3 can be enabled in the build independently of each [all …]
|
| /third_party/libcoap/man/ |
| D | coap_tls_library.txt.in | 25 - Work with CoAP TLS libraries 53 For specific (D)TLS library support, link with 57 *-lcoap-@LIBCOAP_API_VERSION@* to get the default (D)TLS library support. 62 specific TLS implementation type (e.g. https://www.openssl.org[OpenSSL], 64 https://www.trustedfirmware.org/projects/mbed-tls/[Mbed TLS], 67 the application needs to dynamically determine whether DTLS or TLS is 68 supported, what type of TLS implementation libcoap was compiled with, as well 69 as detect what is the version of the currently loaded TLS library is. 84 Due to the nature of TLS, there can be Callbacks that are invoked as the TLS 89 match the TLS implementation type. [all …]
|
| /third_party/openhitls/include/tls/ |
| D | hitls_cert.h | 19 * @brief TLS Certificate Operation Interface 38 …* @brief Set the verify store used by the TLS configuration, which is used for certificate verif… 40 * @param config [OUT] TLS link configuration. 50 * @brief Obtain the verify store used by the TLS configuration. 54 * @param config [IN] TLS link configuration 61 * @brief Set the verify store used by the TLS link for certificate verification. 63 * @param ctx [OUT] TLS link object 73 * @brief Obtain the verify store used by the TLS link. 75 * @param ctx [IN] TLS link object 82 …* @brief Set the chain store used by the TLS configuration, which is used to construct the certi… [all …]
|