Searched +full:- +full:- +full:with +full:- +full:gnutls (Results 1 – 25 of 138) sorted by relevance
123456
| /external/openthread/third_party/mbedtls/repo/tests/docker/bionic/ |
| D | Dockerfile | 4 # ------- 9 # https://github.com/Mbed-TLS/mbedtls-test/blob/master/README.md#quick-start 13 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 22 RUN apt-get update \ 23 && apt-get -y install software-properties-common \ 24 && rm -rf /var/lib/apt/lists 26 RUN add-apt-repository -y ppa:team-gcc-arm-embedded/ppa 28 RUN apt-get update \ 29 && apt-get -y install \ 31 build-essential \ [all …]
|
| /external/mbedtls/tests/docker/bionic/ |
| D | Dockerfile | 4 # ------- 9 # https://github.com/Mbed-TLS/mbedtls-test/blob/master/README.md#quick-start 13 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 22 RUN apt-get update \ 23 && apt-get -y install software-properties-common \ 24 && rm -rf /var/lib/apt/lists 26 RUN add-apt-repository -y ppa:team-gcc-arm-embedded/ppa 28 RUN apt-get update \ 29 && apt-get -y install \ 31 build-essential \ [all …]
|
| /external/curl/.github/workflows/ |
| D | ngtcp2-linux.yml | 3 # SPDX-License-Identifier: curl 5 name: ngtcp2-linux 10 - master 11 - '*/ci' 12 paths-ignore: 13 - '**/*.md' 14 - '**/CMakeLists.txt' 15 - '.azure-pipelines.yml' 16 - '.circleci/**' 17 - '.cirrus.yml' [all …]
|
| /external/curl/m4/ |
| D | curl-gnutls.m4 | 21 # SPDX-License-Identifier: curl 25 dnl ---------------------------------------------------- 26 dnl check for GnuTLS 27 dnl ---------------------------------------------------- 42 dnl this is with no particular path given 43 CURL_CHECK_PKGCONFIG(gnutls) 46 addlib=`$PKGCONFIG --libs-only-l gnutls` 47 addld=`$PKGCONFIG --libs-only-L gnutls` 48 addcflags=`$PKGCONFIG --cflags-only-I gnutls` 49 version=`$PKGCONFIG --modversion gnutls` [all …]
|
| /external/bcc/man/man8/ |
| D | sslsniff.8 | 1 .TH sslsniff 8 "2016-08-16" "USER COMMANDS" 3 sslsniff \- Print data passed to OpenSSL, GnuTLS or NSS. Uses Linux eBPF/bcc. 5 .B sslsniff [-h] [-p PID] [-u UID] [-x] [-c COMM] [-o] [-g] [-n] [-d] 6 .B [--hexdump] [--max-buffer-size SIZE] [-l] [--handshake] 7 .B [--extra-lib EXTRA_LIB] 10 OpenSSL, GnuTLS and NSS, allowing us to read plain text content before 20 \-h 23 \-p PID 26 \-u UID 29 \-x [all …]
|
| /external/bcc/tools/ |
| D | sslsniff_example.txt | 5 GnuTLS and NSS. Data passed to this functions is printed as plain 6 text. Useful, for example, to sniff HTTP before encrypted with SSL. 14 ----- DATA ----- 17 User-Agent: curl/7.50.1 21 ----- END DATA ----- 24 ----- DATA ----- 26 Cache-Control: max-age=604800 27 Content-Type: text/html 31 Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT 33 Vary: Accept-Encoding [all …]
|
| /external/wpa_supplicant_8/src/crypto/ |
| D | tls_gnutls.c | 2 * SSL/TLS interface functions for GnuTLS 3 * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi> 10 #include <gnutls/gnutls.h> 11 #include <gnutls/x509.h> 13 #include <gnutls/pkcs12.h> 16 #include <gnutls/ocsp.h> 92 "gnutls<%d> %s", level, s); in tls_log_func() 103 "GnuTLS: Library version %s (runtime) - %s (build)", in tls_init() 122 global->event_cb = conf->event_cb; in tls_init() 123 global->cb_ctx = conf->cb_ctx; in tls_init() [all …]
|
| /external/mbedtls/tests/ |
| D | compat.sh | 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 10 # Test interoperbility with OpenSSL, GnuTLS as well as itself. 12 # Check each common ciphersuite, with each version, both ways (client/server), 13 # with and without client authentication. 15 set -u 17 # Limit the size of each log to 10 GiB, in case of failures with this script 19 ulimit -f 20971520 36 : ${GNUTLS_CLI:=gnutls-cli} 37 : ${GNUTLS_SERV:=gnutls-serv} 50 # do we have a recent enough GnuTLS? [all …]
|
| /external/oss-fuzz/projects/gnutls/ |
| D | Dockerfile | 4 # you may not use this file except in compliance with the License. 7 # http://www.apache.org/licenses/LICENSE-2.0 17 FROM gcr.io/oss-fuzz-base/base-builder 18 RUN apt-get update && apt-get install -y \ 20 pkg-config \ 36 ENV GNULIB_TOOL $SRC/gnulib/gnulib-tool 38 RUN git clone --depth=1 https://git.savannah.gnu.org/git/libunistring.git 39 RUN git clone --depth=1 https://gitlab.com/libidn/libidn2.git 41 RUN git clone https://gitlab.com/gnutls/libtasn1.git 42 RUN git clone --depth=1 https://git.lysator.liu.se/nettle/nettle.git [all …]
|
| /external/mbedtls/tests/scripts/ |
| D | translate_ciphers.py | 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 9 Translate standard ciphersuite names to GnuTLS, OpenSSL and Mbed TLS standards. 12 python3 -m unittest translate_cipher.py 26 Translate standard ciphersuite names to GnuTLS, OpenSSL and 32 "+ECDHE-ECDSA:+NULL:+SHA1", 33 "ECDHE-ECDSA-NULL-SHA", 34 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"), 36 "+ECDHE-ECDSA:+AES-128-GCM:+AEAD", 37 "ECDHE-ECDSA-AES128-GCM-SHA256", 38 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"), [all …]
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLINFO_CERTINFO.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLINFO_CAPATH (3) 9 - curl_easy_getinfo (3) 10 - curl_easy_setopt (3) 12 - TLS 13 TLS-backend: 14 - OpenSSL 15 - GnuTLS [all …]
|
| D | CURLOPT_TLSAUTH_PASSWORD.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_TLSAUTH_PASSWORD (3) 9 - CURLOPT_TLSAUTH_TYPE (3) 10 - CURLOPT_TLSAUTH_USERNAME (3) 12 - TLS 13 TLS-backend: 14 - OpenSSL 15 - GnuTLS [all …]
|
| D | CURLOPT_TLSAUTH_USERNAME.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_TLSAUTH_PASSWORD (3) 9 - CURLOPT_TLSAUTH_TYPE (3) 11 - TLS 12 TLS-backend: 13 - OpenSSL 14 - GnuTLS 15 --- [all …]
|
| D | CURLOPT_CAPATH.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLINFO_CAPATH (3) 9 - CURLOPT_CAINFO (3) 10 - CURLOPT_DEBUGFUNCTION (3) 11 - CURLOPT_STDERR (3) 13 - TLS 14 TLS-backend: 15 - OpenSSL [all …]
|
| D | CURLOPT_TLSAUTH_TYPE.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_TLSAUTH_PASSWORD (3) 9 - CURLOPT_TLSAUTH_USERNAME (3) 11 - TLS 12 TLS-backend: 13 - OpenSSL 14 - GnuTLS 15 --- [all …]
|
| D | CURLOPT_PROXY_TLSAUTH_TYPE.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_TLSAUTH_PASSWORD (3) 9 - CURLOPT_PROXY_TLSAUTH_USERNAME (3) 10 - CURLOPT_TLSAUTH_PASSWORD (3) 11 - CURLOPT_TLSAUTH_USERNAME (3) 13 - TLS 14 TLS-backend: 15 - OpenSSL [all …]
|
| D | CURLOPT_PROXY_ISSUERCERT.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_ISSUERCERT (3) 9 - CURLOPT_PROXY_SSL_VERIFYHOST (3) 10 - CURLOPT_PROXY_SSL_VERIFYPEER (3) 11 - CURLOPT_SSL_VERIFYHOST (3) 12 - CURLOPT_SSL_VERIFYPEER (3) 14 - TLS 15 TLS-backend: [all …]
|
| D | CURLOPT_PROXY_CRLFILE.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_SSL_VERIFYHOST (3) 9 - CURLOPT_PROXY_SSL_VERIFYPEER (3) 10 - CURLOPT_SSL_VERIFYHOST (3) 11 - CURLOPT_SSL_VERIFYPEER (3) 13 - TLS 14 TLS-backend: 15 - GnuTLS [all …]
|
| D | CURLOPT_CRLFILE.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_CRLFILE (3) 9 - CURLOPT_SSL_VERIFYHOST (3) 10 - CURLOPT_SSL_VERIFYPEER (3) 12 - TLS 13 TLS-backend: 14 - GnuTLS 15 - mbedTLS [all …]
|
| /external/curl/lib/vtls/ |
| D | gtls.c | 21 * SPDX-License-Identifier: curl 26 * Source file for all GnuTLS-specific code for the TLS/SSL layer. No code 29 * Note: don't use the GnuTLS' *_t variable type names in this source code, 37 #include <gnutls/abstract.h> 38 #include <gnutls/gnutls.h> 39 #include <gnutls/x509.h> 40 #include <gnutls/crypto.h> 68 "NORMAL:-VERS-ALL:+VERS-TLS1.3:-CIPHER-ALL:+AES-128-GCM:+AES-256-GCM:" \ 69 "+CHACHA20-POLY1305:+AES-128-CCM:-GROUP-ALL:+GROUP-SECP256R1:" \ 70 "+GROUP-X25519:+GROUP-SECP384R1:+GROUP-SECP521R1:" \ [all …]
|
| /external/zstd/.github/workflows/ |
| D | commit.yml | 5 - dev 6 permissions: read-all 8 short-tests-0: 9 runs-on: ubuntu-latest 12 image: fbopensource/zstd-circleci-primary:0.0.1 13 options: --entrypoint /bin/bash 15 - uses: actions/checkout@v4 16 - name: Install Dependencies 18 sudo apt-get update 19 sudo apt-get install libcurl4-gnutls-dev [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/ |
| D | compat.sh | 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 10 # Test interoperbility with OpenSSL, GnuTLS as well as itself. 12 # Check each common ciphersuite, with each version, both ways (client/server), 13 # with and without client authentication. 15 set -u 17 # Limit the size of each log to 10 GiB, in case of failures with this script 19 ulimit -f 20971520 36 : ${GNUTLS_CLI:=gnutls-cli} 37 : ${GNUTLS_SERV:=gnutls-serv} 50 # do we have a recent enough GnuTLS? [all …]
|
| /external/curl/docs/ |
| D | HTTP3.md | 1 <!-- 4 SPDX-License-Identifier: curl 5 --> 11 [HTTP/3 Explained](https://http3-explained.haxx.se/en/) - the online free 14 [quicwg.org](https://quicwg.org/) - home of the official protocol drafts 22 [quiche](https://github.com/cloudflare/quiche) - **EXPERIMENTAL** 24 [OpenSSL 3.2+ QUIC](https://github.com/openssl/openssl) - **EXPERIMENTAL** 26 [msh3](https://github.com/nibanks/msh3) (with [msquic](https://github.com/microsoft/msquic)) - **EX… 35 master branch using pull-requests, just like ordinary changes. 39 - the used QUIC library needs to consider itself non-beta [all …]
|
| /external/curl/tests/http/ |
| D | test_17_ssl_use.py | 2 # -*- coding: utf-8 -*- 23 # SPDX-License-Identifier: curl 65 xargs = ['--sessionid', '--tls-max', tls_max, f'--tlsv{tls_max}'] 66 if env.curl_uses_lib('gnutls'): 68 exp_resumed = 'Initial' # 1.2 works in gnutls, but 1.3 does not, TODO 73 xargs = ['--sessionid', f'--tlsv{tls_max}'] 76 if env.curl_uses_lib('rustls-ffi'): 87 f'id=[0-{count-1}]&close' 97 with open(dfile) as f: 105 # use host name with trailing dot, verify handshake [all …]
|
| /external/curl/lib/vquic/ |
| D | vquic-tls.c | 21 * SPDX-License-Identifier: curl 34 #include <gnutls/abstract.h> 35 #include <gnutls/gnutls.h> 36 #include <gnutls/x509.h> 37 #include <gnutls/crypto.h> 53 #include "vquic-tls.h" 69 #define QUIC_GROUPS "P-256:P-384:P-521" 94 ctx->ssl_ctx = wolfSSL_CTX_new(wolfTLSv1_3_client_method()); in curl_wssl_init_ctx() 95 if(!ctx->ssl_ctx) { in curl_wssl_init_ctx() 106 wolfSSL_CTX_set_default_verify_paths(ctx->ssl_ctx); in curl_wssl_init_ctx() [all …]
|
123456