| /external/llvm/test/tools/llvm-readobj/ |
| D | mips-got.test | 7 RUN: llvm-readobj -mips-plt-got %p/Inputs/got-tls.so.elf-mips64el | \ 8 RUN: FileCheck %s -check-prefix GOT-TLS 58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0 175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0 178 GOT-TLS: Primary GOT { 179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0 180 GOT-TLS-NEXT: Reserved entries [ 181 GOT-TLS-NEXT: Entry { 182 GOT-TLS-NEXT: Address: 0x10C00 183 GOT-TLS-NEXT: Access: -32752 [all …]
|
| /external/mbedtls/include/mbedtls/ |
| D | ssl_ciphersuites.h | 4 * \brief SSL Ciphersuites for Mbed TLS 7 * Copyright The Mbed TLS Contributors 40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */ 41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */ 46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */ 47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */ 61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */ 62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */ 63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */ 64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */ [all …]
|
| /external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
| D | ssl_ciphersuites.h | 4 * \brief SSL Ciphersuites for Mbed TLS 7 * Copyright The Mbed TLS Contributors 35 #define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */ 39 #define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */ 52 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */ 53 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */ 58 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */ 59 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */ 79 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */ 80 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */ [all …]
|
| /external/aws-crt-java/src/native/ |
| D | tls_context_options.c | 51 static void s_jni_tls_ctx_options_destroy(struct jni_tls_ctx_options *tls) { in s_jni_tls_ctx_options_destroy() argument 52 if (tls == NULL) { in s_jni_tls_ctx_options_destroy() 56 aws_string_destroy(tls->ca_file); in s_jni_tls_ctx_options_destroy() 57 aws_string_destroy(tls->ca_path); in s_jni_tls_ctx_options_destroy() 58 aws_string_destroy(tls->alpn_list); in s_jni_tls_ctx_options_destroy() 59 aws_string_destroy(tls->certificate_path); in s_jni_tls_ctx_options_destroy() 60 aws_string_destroy(tls->private_key_path); in s_jni_tls_ctx_options_destroy() 61 aws_string_destroy(tls->pkcs12_path); in s_jni_tls_ctx_options_destroy() 62 aws_string_destroy_secure(tls->pkcs12_password); in s_jni_tls_ctx_options_destroy() 63 aws_string_destroy(tls->certificate); in s_jni_tls_ctx_options_destroy() [all …]
|
| /external/curl/lib/vtls/ |
| D | cipher_suite.c | 55 "TLS" "\0" 163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,), 165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,), 167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,), 169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,), 171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,), 173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,), 175 CS_ENTRY(0xC004, TLS,ECDH,ECDSA,WITH,AES,128,CBC,SHA), 177 CS_ENTRY(0xC005, TLS,ECDH,ECDSA,WITH,AES,256,CBC,SHA), 179 CS_ENTRY(0xC009, TLS,ECDHE,ECDSA,WITH,AES,128,CBC,SHA), [all …]
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLOPT_SSLVERSION.md | 13 - TLS 14 TLS-backend: 20 CURLOPT_SSLVERSION - preferred TLS/SSL version 32 Pass a long as parameter to control which version range of SSL/TLS versions to 35 The SSL and TLS versions have typically developed from the most insecure 37 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3. 44 default TLS v1.0 since 7.39.0 (unless the TLS library has a stricter rule). 48 TLS v1.0 or later 60 TLS v1.0 or later (Added in 7.34.0) 64 TLS v1.1 or later (Added in 7.34.0) [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/ |
| D | compat.sh | 5 # Copyright The Mbed TLS Contributors 267 # Ciphersuite for Mbed TLS 277 # For GnuTLS client -> Mbed TLS server, 302 TLS-ECDHE-ECDSA-WITH-NULL-SHA \ 303 TLS-ECDHE-ECDSA-WITH-RC4-128-SHA \ 304 TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA \ 305 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA \ 306 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA \ 326 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 \ 327 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 \ [all …]
|
| /external/mbedtls/library/ |
| D | ssl_ciphersuites.c | 4 * \brief SSL ciphersuites for Mbed TLS 6 * Copyright The Mbed TLS Contributors 43 /* TLS 1.3 ciphersuites */ 288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", [all …]
|
| /external/libwebsockets/lib/tls/mbedtls/ |
| D | mbedtls-ssl.c | 26 #include "private-lib-tls-mbedtls.h" 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 51 if (!wsi->tls.ssl) in lws_ssl_capable_read() 55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read() 72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read() [all …]
|
| D | CMakeLists.txt | 43 tls/mbedtls/wrapper/include/internal/ssl3.h 44 tls/mbedtls/wrapper/include/internal/ssl_cert.h 45 tls/mbedtls/wrapper/include/internal/ssl_code.h 46 tls/mbedtls/wrapper/include/internal/ssl_dbg.h 47 tls/mbedtls/wrapper/include/internal/ssl_lib.h 48 tls/mbedtls/wrapper/include/internal/ssl_methods.h 49 tls/mbedtls/wrapper/include/internal/ssl_pkey.h 50 tls/mbedtls/wrapper/include/internal/ssl_stack.h 51 tls/mbedtls/wrapper/include/internal/ssl_types.h 52 tls/mbedtls/wrapper/include/internal/ssl_x509.h [all …]
|
| /external/openthread/third_party/mbedtls/repo/library/ |
| D | ssl_ciphersuites.c | 4 * \brief SSL ciphersuites for Mbed TLS 6 * Copyright The Mbed TLS Contributors 307 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 316 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", 325 "TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 334 "TLS-PSK-WITH-CHACHA20-POLY1305-SHA256", 343 "TLS-ECDHE-PSK-WITH-CHACHA20-POLY1305-SHA256", 352 "TLS-DHE-PSK-WITH-CHACHA20-POLY1305-SHA256", 361 "TLS-RSA-PSK-WITH-CHACHA20-POLY1305-SHA256", 375 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA", [all …]
|
| /external/wpa_supplicant_8/src/crypto/ |
| D | tls.h | 2 * SSL/TLS interface definition 125 * struct tls_connection_params - Parameters for TLS connection 179 * TLS connection parameters to be configured with tls_connection_set_params() 226 * tls_init - Initialize TLS library 227 * @conf: Configuration data for TLS library 232 * session. In other words, there can be two concurrent TLS contexts. If global 234 * authentication types), the TLS library wrapper should maintain a reference 240 * tls_deinit - Deinitialize TLS library 241 * @tls_ctx: TLS context data from tls_init() 245 * shared between both authentication types), the TLS library wrapper should [all …]
|
| /external/grpc-grpc/tools/run_tests/generated/ |
| D | lb_interop_test_scenarios.json | 35 "transport_sec": "tls" 40 "transport_sec": "tls" 48 "transport_sec": "tls" 87 "transport_sec": "tls" 92 "transport_sec": "tls" 100 "transport_sec": "tls" 150 "transport_sec": "tls" 156 "transport_sec": "tls" 166 "transport_sec": "tls" 227 "transport_sec": "tls" [all …]
|
| /external/rust/crates/tonic/src/transport/service/ |
| D | connector.rs | 3 #[cfg(feature = "tls")] 4 use super::tls::TlsConnector; 13 #[cfg(feature = "tls")] 14 tls: Option<TlsConnector>, field 15 #[cfg(not(feature = "tls"))] 17 tls: Option<()>, field 21 #[cfg(not(feature = "tls"))] 23 Self { inner, tls: None } in new() 26 #[cfg(feature = "tls")] 27 pub(crate) fn new(inner: C, tls: Option<TlsConnector>) -> Self { in new() [all …]
|
| /external/libwebsockets/lib/tls/openssl/ |
| D | openssl-server.c | 85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config() 89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config() 114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert); 233 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 250 vhost->tls.ssl_ctx, NULL, 0)) { 270 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, 278 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx, 298 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p, [all …]
|
| D | openssl-client.c | 35 #include "private-lib-tls-openssl.h" 71 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl)); 114 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback() 121 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback() 127 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback() 160 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback() 161 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback() 168 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback() 169 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() 175 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback() [all …]
|
| D | openssl-ssl.c | 26 #include "private-lib-tls-openssl.h" 40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher() 55 if (!wsi->tls.ssl) in lws_ssl_get_error() 58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error() 59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error() 142 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx() 145 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx() 148 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx() 149 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx() 151 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx() [all …]
|
| /external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/extensions/transport_sockets/tls/v3/ |
| D | tls.proto | 3 package envoy.extensions.transport_sockets.tls.v3; 7 import "envoy/extensions/transport_sockets/tls/v3/common.proto"; 8 import "envoy/extensions/transport_sockets/tls/v3/secret.proto"; 18 option java_package = "io.envoyproxy.envoy.extensions.transport_sockets.tls.v3"; 21 option go_package = "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/… 24 // [#protodoc-title: TLS transport socket] 25 // [#extension: envoy.transport_sockets.tls] 26 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS. 32 // Common TLS context settings. 37 …// :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidation… [all …]
|
| /external/scapy/test/tls/ |
| D | tests_tls_netaccess.uts | 1 % TLS session establishment tests 7 + TLS server automaton tests 18 sys.path.append(os.path.abspath("./tls")) 32 CA_f = os.path.abspath("./tls/pki/ca_cert.pem") 66 = Testing TLS server with TLS 1.0 and TLS_RSA_WITH_RC4_128_SHA 71 = Testing TLS server with TLS 1.1 and TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 76 = Testing TLS server with TLS 1.2 and TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 81 = Testing TLS server with TLS 1.2 and TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 86 + TLS client automaton tests 95 sys.path.append(os.path.abspath("./tls")) [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | apigee_v1.organizations.environments.targetservers.html | 114 …TLS configuration information for VirtualHosts and TargetServers. # Optional. Specifies TLS config… 115 …"ciphers": [ # The SSL/TLS cipher suites to be used. Must be one of the cipher suite nam… 118 "clientAuthEnabled": True or False, # Optional. Enables two-way TLS. 119 "commonName": { # The TLS Common Name of the certificate. 120 "value": "A String", # The TLS Common Name string of the certificate. 123 …ot;enabled": True or False, # Required. Enables TLS. If false, neither one-way nor two-way TL… 124 …res TLS certificate errors. Valid when configuring TLS for target servers and target endpoints, an… 127 "protocols": [ # The TLS versioins to be used. 150 …TLS configuration information for VirtualHosts and TargetServers. # Optional. Specifies TLS config… 151 …"ciphers": [ # The SSL/TLS cipher suites to be used. Must be one of the cipher suite nam… [all …]
|
| /external/clang/test/OpenMP/ |
| D | parallel_copyin_codegen.cpp | 1 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -triple %itanium_abi_triple -emit-llv… 2 // RUN: %clang_cc1 -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -triple %itanium_abi_triple -emit-… 3 // RUN: %clang_cc1 -fopenmp -fnoopenmp-use-tls -x c++ -triple %itanium_abi_triple -std=c++11 -inclu… 4 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -DLAMBDA -triple %itanium_… 5 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -fblocks -DBLOCKS -triple %itanium_ab… 6 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -DARRAY -triple x86_64-app… 8 …openmp -x c++ -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck %s -check-prefix=TLS-CHECK 10 …triple -std=c++11 -include-pch %t -verify %s -emit-llvm -o - | FileCheck %s -check-prefix=TLS-CHECK 11 …+11 -DLAMBDA -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck -check-prefix=TLS-LAMBDA %s 12 …cks -DBLOCKS -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck -check-prefix=TLS-BLOCKS %s [all …]
|
| /external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/api/v2/auth/ |
| D | tls.proto | 20 "envoy.extensions.transport_sockets.tls.v3"; 23 // [#protodoc-title: TLS transport socket] 24 // [#extension: envoy.transport_sockets.tls] 25 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS. 28 // Common TLS context settings. 37 // SNI string to use when creating TLS backend connections. 40 // If true, server-initiated TLS renegotiation will be allowed. 44 // TLS renegotiation is considered insecure and shouldn't be used unless absolutely necessary. 56 // Common TLS context settings. 68 // TLS session ticket key settings. [all …]
|
| /external/grpc-grpc/tools/distrib/python/xds_protos/envoy/extensions/transport_sockets/tls/v3/ |
| D | cert_pb2.py | 3 # source: envoy/extensions/transport_sockets/tls/v3/cert.proto 14 from envoy.extensions.transport_sockets.tls.v3 import common_pb2 as envoy_dot_extensions_dot_transp… 15 from envoy.extensions.transport_sockets.tls.v3 import secret_pb2 as envoy_dot_extensions_dot_transp… 16 from envoy.extensions.transport_sockets.tls.v3 import tls_pb2 as envoy_dot_extensions_dot_transport… 18 from envoy.extensions.transport_sockets.tls.v3.common_pb2 import * 19 from envoy.extensions.transport_sockets.tls.v3.secret_pb2 import * 20 from envoy.extensions.transport_sockets.tls.v3.tls_pb2 import * 22 …tls/v3/cert.proto\x12)envoy.extensions.transport_sockets.tls.v3\x1a\x36\x65nvoy/extensions/transpo… 26 _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'envoy.extensions.transport_sockets.tls.v3.cert… 29 …nsions.transport_sockets.tls.v3B\tCertProtoP\001ZVgithub.com/envoyproxy/go-control-plane/envoy/ext…
|
| /external/autotest/server/hosts/tls_client/ |
| D | autotest_common_pb2.py | 23 package='chromiumos.config.api.test.tls', 25 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls', 26 …tls\x1a\x1bgoogle/protobuf/empty.proto\x1a)dependencies/longrunning/operations.proto\"\xc3\x01\n\x… 32 full_name='chromiumos.config.api.test.tls.Output', 59 full_name='chromiumos.config.api.test.tls.ProvisionDutResponse.Reason', 97 full_name='chromiumos.config.api.test.tls.ProvisionLacrosResponse.Reason', 131 full_name='chromiumos.config.api.test.tls.FakeOmaha.Payload.Type', 158 full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest', 164 name='name', full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest.name', index=0, 171 … name='command', full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest.command', index=1, [all …]
|
| /external/wpa_supplicant_8/src/eap_peer/ |
| D | eap_tls_common.c | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 13 #include "crypto/tls.h" 174 * handle the TLS Session Ticket extension (they are supposed in eap_tls_params_from_conf() 175 * to ignore unrecognized TLS extensions, but end up rejecting in eap_tls_params_from_conf() 177 * TLS Sesson Ticket extension for EAP-TLS, EAP-PEAP, and in eap_tls_params_from_conf() 184 /* RFC 7170 requires TLS v1.2 or newer to be used with TEAP */ in eap_tls_params_from_conf() 195 * TLS v1.3 changes, so disable this by default for now. */ in eap_tls_params_from_conf() 202 /* While the current EAP-TLS implementation is more or less in eap_tls_params_from_conf() 203 * complete for TLS v1.3, there has been only minimal in eap_tls_params_from_conf() 207 * with TLS version update. in eap_tls_params_from_conf() [all …]
|