Home
last modified time | relevance | path

Searched +full:- +full:- +full:with +full:- +full:gnutls (Results 1 – 25 of 138) sorted by relevance

123456

/external/openthread/third_party/mbedtls/repo/tests/docker/bionic/
DDockerfile4 # -------
9 # https://github.com/Mbed-TLS/mbedtls-test/blob/master/README.md#quick-start
13 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
22 RUN apt-get update \
23 && apt-get -y install software-properties-common \
24 && rm -rf /var/lib/apt/lists
26 RUN add-apt-repository -y ppa:team-gcc-arm-embedded/ppa
28 RUN apt-get update \
29 && apt-get -y install \
31 build-essential \
[all …]
/external/mbedtls/tests/docker/bionic/
DDockerfile4 # -------
9 # https://github.com/Mbed-TLS/mbedtls-test/blob/master/README.md#quick-start
13 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
22 RUN apt-get update \
23 && apt-get -y install software-properties-common \
24 && rm -rf /var/lib/apt/lists
26 RUN add-apt-repository -y ppa:team-gcc-arm-embedded/ppa
28 RUN apt-get update \
29 && apt-get -y install \
31 build-essential \
[all …]
/external/curl/.github/workflows/
Dngtcp2-linux.yml3 # SPDX-License-Identifier: curl
5 name: ngtcp2-linux
10 - master
11 - '*/ci'
12 paths-ignore:
13 - '**/*.md'
14 - '**/CMakeLists.txt'
15 - '.azure-pipelines.yml'
16 - '.circleci/**'
17 - '.cirrus.yml'
[all …]
/external/curl/m4/
Dcurl-gnutls.m421 # SPDX-License-Identifier: curl
25 dnl ----------------------------------------------------
26 dnl check for GnuTLS
27 dnl ----------------------------------------------------
42 dnl this is with no particular path given
43 CURL_CHECK_PKGCONFIG(gnutls)
46 addlib=`$PKGCONFIG --libs-only-l gnutls`
47 addld=`$PKGCONFIG --libs-only-L gnutls`
48 addcflags=`$PKGCONFIG --cflags-only-I gnutls`
49 version=`$PKGCONFIG --modversion gnutls`
[all …]
/external/bcc/man/man8/
Dsslsniff.81 .TH sslsniff 8 "2016-08-16" "USER COMMANDS"
3 sslsniff \- Print data passed to OpenSSL, GnuTLS or NSS. Uses Linux eBPF/bcc.
5 .B sslsniff [-h] [-p PID] [-u UID] [-x] [-c COMM] [-o] [-g] [-n] [-d]
6 .B [--hexdump] [--max-buffer-size SIZE] [-l] [--handshake]
7 .B [--extra-lib EXTRA_LIB]
10 OpenSSL, GnuTLS and NSS, allowing us to read plain text content before
20 \-h
23 \-p PID
26 \-u UID
29 \-x
[all …]
/external/bcc/tools/
Dsslsniff_example.txt5 GnuTLS and NSS. Data passed to this functions is printed as plain
6 text. Useful, for example, to sniff HTTP before encrypted with SSL.
14 ----- DATA -----
17 User-Agent: curl/7.50.1
21 ----- END DATA -----
24 ----- DATA -----
26 Cache-Control: max-age=604800
27 Content-Type: text/html
31 Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT
33 Vary: Accept-Encoding
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls_gnutls.c2 * SSL/TLS interface functions for GnuTLS
3 * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi>
10 #include <gnutls/gnutls.h>
11 #include <gnutls/x509.h>
13 #include <gnutls/pkcs12.h>
16 #include <gnutls/ocsp.h>
92 "gnutls<%d> %s", level, s); in tls_log_func()
103 "GnuTLS: Library version %s (runtime) - %s (build)", in tls_init()
122 global->event_cb = conf->event_cb; in tls_init()
123 global->cb_ctx = conf->cb_ctx; in tls_init()
[all …]
/external/mbedtls/tests/
Dcompat.sh6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
10 # Test interoperbility with OpenSSL, GnuTLS as well as itself.
12 # Check each common ciphersuite, with each version, both ways (client/server),
13 # with and without client authentication.
15 set -u
17 # Limit the size of each log to 10 GiB, in case of failures with this script
19 ulimit -f 20971520
36 : ${GNUTLS_CLI:=gnutls-cli}
37 : ${GNUTLS_SERV:=gnutls-serv}
50 # do we have a recent enough GnuTLS?
[all …]
/external/oss-fuzz/projects/gnutls/
DDockerfile4 # you may not use this file except in compliance with the License.
7 # http://www.apache.org/licenses/LICENSE-2.0
17 FROM gcr.io/oss-fuzz-base/base-builder
18 RUN apt-get update && apt-get install -y \
20 pkg-config \
36 ENV GNULIB_TOOL $SRC/gnulib/gnulib-tool
38 RUN git clone --depth=1 https://git.savannah.gnu.org/git/libunistring.git
39 RUN git clone --depth=1 https://gitlab.com/libidn/libidn2.git
41 RUN git clone https://gitlab.com/gnutls/libtasn1.git
42 RUN git clone --depth=1 https://git.lysator.liu.se/nettle/nettle.git
[all …]
/external/mbedtls/tests/scripts/
Dtranslate_ciphers.py6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9 Translate standard ciphersuite names to GnuTLS, OpenSSL and Mbed TLS standards.
12 python3 -m unittest translate_cipher.py
26 Translate standard ciphersuite names to GnuTLS, OpenSSL and
32 "+ECDHE-ECDSA:+NULL:+SHA1",
33 "ECDHE-ECDSA-NULL-SHA",
34 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"),
36 "+ECDHE-ECDSA:+AES-128-GCM:+AEAD",
37 "ECDHE-ECDSA-AES128-GCM-SHA256",
38 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"),
[all …]
/external/curl/docs/libcurl/opts/
DCURLINFO_CERTINFO.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLINFO_CAPATH (3)
9 - curl_easy_getinfo (3)
10 - curl_easy_setopt (3)
12 - TLS
13 TLS-backend:
14 - OpenSSL
15 - GnuTLS
[all …]
DCURLOPT_TLSAUTH_PASSWORD.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_PROXY_TLSAUTH_PASSWORD (3)
9 - CURLOPT_TLSAUTH_TYPE (3)
10 - CURLOPT_TLSAUTH_USERNAME (3)
12 - TLS
13 TLS-backend:
14 - OpenSSL
15 - GnuTLS
[all …]
DCURLOPT_TLSAUTH_USERNAME.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_TLSAUTH_PASSWORD (3)
9 - CURLOPT_TLSAUTH_TYPE (3)
11 - TLS
12 TLS-backend:
13 - OpenSSL
14 - GnuTLS
15 ---
[all …]
DCURLOPT_CAPATH.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLINFO_CAPATH (3)
9 - CURLOPT_CAINFO (3)
10 - CURLOPT_DEBUGFUNCTION (3)
11 - CURLOPT_STDERR (3)
13 - TLS
14 TLS-backend:
15 - OpenSSL
[all …]
DCURLOPT_TLSAUTH_TYPE.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_TLSAUTH_PASSWORD (3)
9 - CURLOPT_TLSAUTH_USERNAME (3)
11 - TLS
12 TLS-backend:
13 - OpenSSL
14 - GnuTLS
15 ---
[all …]
DCURLOPT_PROXY_TLSAUTH_TYPE.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_PROXY_TLSAUTH_PASSWORD (3)
9 - CURLOPT_PROXY_TLSAUTH_USERNAME (3)
10 - CURLOPT_TLSAUTH_PASSWORD (3)
11 - CURLOPT_TLSAUTH_USERNAME (3)
13 - TLS
14 TLS-backend:
15 - OpenSSL
[all …]
DCURLOPT_PROXY_ISSUERCERT.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_ISSUERCERT (3)
9 - CURLOPT_PROXY_SSL_VERIFYHOST (3)
10 - CURLOPT_PROXY_SSL_VERIFYPEER (3)
11 - CURLOPT_SSL_VERIFYHOST (3)
12 - CURLOPT_SSL_VERIFYPEER (3)
14 - TLS
15 TLS-backend:
[all …]
DCURLOPT_PROXY_CRLFILE.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_PROXY_SSL_VERIFYHOST (3)
9 - CURLOPT_PROXY_SSL_VERIFYPEER (3)
10 - CURLOPT_SSL_VERIFYHOST (3)
11 - CURLOPT_SSL_VERIFYPEER (3)
13 - TLS
14 TLS-backend:
15 - GnuTLS
[all …]
DCURLOPT_CRLFILE.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLOPT_PROXY_CRLFILE (3)
9 - CURLOPT_SSL_VERIFYHOST (3)
10 - CURLOPT_SSL_VERIFYPEER (3)
12 - TLS
13 TLS-backend:
14 - GnuTLS
15 - mbedTLS
[all …]
/external/curl/lib/vtls/
Dgtls.c21 * SPDX-License-Identifier: curl
26 * Source file for all GnuTLS-specific code for the TLS/SSL layer. No code
29 * Note: don't use the GnuTLS' *_t variable type names in this source code,
37 #include <gnutls/abstract.h>
38 #include <gnutls/gnutls.h>
39 #include <gnutls/x509.h>
40 #include <gnutls/crypto.h>
68 "NORMAL:-VERS-ALL:+VERS-TLS1.3:-CIPHER-ALL:+AES-128-GCM:+AES-256-GCM:" \
69 "+CHACHA20-POLY1305:+AES-128-CCM:-GROUP-ALL:+GROUP-SECP256R1:" \
70 "+GROUP-X25519:+GROUP-SECP384R1:+GROUP-SECP521R1:" \
[all …]
/external/zstd/.github/workflows/
Dcommit.yml5 - dev
6 permissions: read-all
8 short-tests-0:
9 runs-on: ubuntu-latest
12 image: fbopensource/zstd-circleci-primary:0.0.1
13 options: --entrypoint /bin/bash
15 - uses: actions/checkout@v4
16 - name: Install Dependencies
18 sudo apt-get update
19 sudo apt-get install libcurl4-gnutls-dev
[all …]
/external/openthread/third_party/mbedtls/repo/tests/
Dcompat.sh6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
10 # Test interoperbility with OpenSSL, GnuTLS as well as itself.
12 # Check each common ciphersuite, with each version, both ways (client/server),
13 # with and without client authentication.
15 set -u
17 # Limit the size of each log to 10 GiB, in case of failures with this script
19 ulimit -f 20971520
36 : ${GNUTLS_CLI:=gnutls-cli}
37 : ${GNUTLS_SERV:=gnutls-serv}
50 # do we have a recent enough GnuTLS?
[all …]
/external/curl/docs/
DHTTP3.md1 <!--
4 SPDX-License-Identifier: curl
5 -->
11 [HTTP/3 Explained](https://http3-explained.haxx.se/en/) - the online free
14 [quicwg.org](https://quicwg.org/) - home of the official protocol drafts
22 [quiche](https://github.com/cloudflare/quiche) - **EXPERIMENTAL**
24 [OpenSSL 3.2+ QUIC](https://github.com/openssl/openssl) - **EXPERIMENTAL**
26 [msh3](https://github.com/nibanks/msh3) (with [msquic](https://github.com/microsoft/msquic)) - **EX…
35 master branch using pull-requests, just like ordinary changes.
39 - the used QUIC library needs to consider itself non-beta
[all …]
/external/curl/tests/http/
Dtest_17_ssl_use.py2 # -*- coding: utf-8 -*-
23 # SPDX-License-Identifier: curl
65 xargs = ['--sessionid', '--tls-max', tls_max, f'--tlsv{tls_max}']
66 if env.curl_uses_lib('gnutls'):
68 exp_resumed = 'Initial' # 1.2 works in gnutls, but 1.3 does not, TODO
73 xargs = ['--sessionid', f'--tlsv{tls_max}']
76 if env.curl_uses_lib('rustls-ffi'):
87 f'id=[0-{count-1}]&close'
97 with open(dfile) as f:
105 # use host name with trailing dot, verify handshake
[all …]
/external/curl/lib/vquic/
Dvquic-tls.c21 * SPDX-License-Identifier: curl
34 #include <gnutls/abstract.h>
35 #include <gnutls/gnutls.h>
36 #include <gnutls/x509.h>
37 #include <gnutls/crypto.h>
53 #include "vquic-tls.h"
69 #define QUIC_GROUPS "P-256:P-384:P-521"
94 ctx->ssl_ctx = wolfSSL_CTX_new(wolfTLSv1_3_client_method()); in curl_wssl_init_ctx()
95 if(!ctx->ssl_ctx) { in curl_wssl_init_ctx()
106 wolfSSL_CTX_set_default_verify_paths(ctx->ssl_ctx); in curl_wssl_init_ctx()
[all …]

123456