Home
last modified time | relevance | path

Searched full:tls (Results 1 – 25 of 5467) sorted by relevance

12345678910>>...219

/external/llvm/test/tools/llvm-readobj/
Dmips-got.test7 RUN: llvm-readobj -mips-plt-got %p/Inputs/got-tls.so.elf-mips64el | \
8 RUN: FileCheck %s -check-prefix GOT-TLS
58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0
175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0
178 GOT-TLS: Primary GOT {
179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0
180 GOT-TLS-NEXT: Reserved entries [
181 GOT-TLS-NEXT: Entry {
182 GOT-TLS-NEXT: Address: 0x10C00
183 GOT-TLS-NEXT: Access: -32752
[all …]
/external/mbedtls/include/mbedtls/
Dssl_ciphersuites.h4 * \brief SSL Ciphersuites for Mbed TLS
7 * Copyright The Mbed TLS Contributors
40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
[all …]
/external/openthread/third_party/mbedtls/repo/include/mbedtls/
Dssl_ciphersuites.h4 * \brief SSL Ciphersuites for Mbed TLS
7 * Copyright The Mbed TLS Contributors
35 #define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
39 #define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
52 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
53 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
58 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
59 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
79 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
80 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
[all …]
/external/aws-crt-java/src/native/
Dtls_context_options.c51 static void s_jni_tls_ctx_options_destroy(struct jni_tls_ctx_options *tls) { in s_jni_tls_ctx_options_destroy() argument
52 if (tls == NULL) { in s_jni_tls_ctx_options_destroy()
56 aws_string_destroy(tls->ca_file); in s_jni_tls_ctx_options_destroy()
57 aws_string_destroy(tls->ca_path); in s_jni_tls_ctx_options_destroy()
58 aws_string_destroy(tls->alpn_list); in s_jni_tls_ctx_options_destroy()
59 aws_string_destroy(tls->certificate_path); in s_jni_tls_ctx_options_destroy()
60 aws_string_destroy(tls->private_key_path); in s_jni_tls_ctx_options_destroy()
61 aws_string_destroy(tls->pkcs12_path); in s_jni_tls_ctx_options_destroy()
62 aws_string_destroy_secure(tls->pkcs12_password); in s_jni_tls_ctx_options_destroy()
63 aws_string_destroy(tls->certificate); in s_jni_tls_ctx_options_destroy()
[all …]
/external/curl/lib/vtls/
Dcipher_suite.c55 "TLS" "\0"
163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,),
165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,),
167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,),
169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,),
171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,),
173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,),
175 CS_ENTRY(0xC004, TLS,ECDH,ECDSA,WITH,AES,128,CBC,SHA),
177 CS_ENTRY(0xC005, TLS,ECDH,ECDSA,WITH,AES,256,CBC,SHA),
179 CS_ENTRY(0xC009, TLS,ECDHE,ECDSA,WITH,AES,128,CBC,SHA),
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_SSLVERSION.md13 - TLS
14 TLS-backend:
20 CURLOPT_SSLVERSION - preferred TLS/SSL version
32 Pass a long as parameter to control which version range of SSL/TLS versions to
35 The SSL and TLS versions have typically developed from the most insecure
37 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3.
44 default TLS v1.0 since 7.39.0 (unless the TLS library has a stricter rule).
48 TLS v1.0 or later
60 TLS v1.0 or later (Added in 7.34.0)
64 TLS v1.1 or later (Added in 7.34.0)
[all …]
/external/openthread/third_party/mbedtls/repo/tests/
Dcompat.sh5 # Copyright The Mbed TLS Contributors
267 # Ciphersuite for Mbed TLS
277 # For GnuTLS client -> Mbed TLS server,
302 TLS-ECDHE-ECDSA-WITH-NULL-SHA \
303 TLS-ECDHE-ECDSA-WITH-RC4-128-SHA \
304 TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA \
305 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA \
306 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA \
326 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 \
327 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 \
[all …]
/external/mbedtls/library/
Dssl_ciphersuites.c4 * \brief SSL ciphersuites for Mbed TLS
6 * Copyright The Mbed TLS Contributors
43 /* TLS 1.3 ciphersuites */
288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
[all …]
/external/libwebsockets/lib/tls/mbedtls/
Dmbedtls-ssl.c26 #include "private-lib-tls-mbedtls.h"
35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy()
36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy()
37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy()
38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy()
40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy()
41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy()
51 if (!wsi->tls.ssl) in lws_ssl_capable_read()
55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read()
72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read()
[all …]
DCMakeLists.txt43 tls/mbedtls/wrapper/include/internal/ssl3.h
44 tls/mbedtls/wrapper/include/internal/ssl_cert.h
45 tls/mbedtls/wrapper/include/internal/ssl_code.h
46 tls/mbedtls/wrapper/include/internal/ssl_dbg.h
47 tls/mbedtls/wrapper/include/internal/ssl_lib.h
48 tls/mbedtls/wrapper/include/internal/ssl_methods.h
49 tls/mbedtls/wrapper/include/internal/ssl_pkey.h
50 tls/mbedtls/wrapper/include/internal/ssl_stack.h
51 tls/mbedtls/wrapper/include/internal/ssl_types.h
52 tls/mbedtls/wrapper/include/internal/ssl_x509.h
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dssl_ciphersuites.c4 * \brief SSL ciphersuites for Mbed TLS
6 * Copyright The Mbed TLS Contributors
307 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
316 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
325 "TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
334 "TLS-PSK-WITH-CHACHA20-POLY1305-SHA256",
343 "TLS-ECDHE-PSK-WITH-CHACHA20-POLY1305-SHA256",
352 "TLS-DHE-PSK-WITH-CHACHA20-POLY1305-SHA256",
361 "TLS-RSA-PSK-WITH-CHACHA20-POLY1305-SHA256",
375 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA",
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls.h2 * SSL/TLS interface definition
125 * struct tls_connection_params - Parameters for TLS connection
179 * TLS connection parameters to be configured with tls_connection_set_params()
226 * tls_init - Initialize TLS library
227 * @conf: Configuration data for TLS library
232 * session. In other words, there can be two concurrent TLS contexts. If global
234 * authentication types), the TLS library wrapper should maintain a reference
240 * tls_deinit - Deinitialize TLS library
241 * @tls_ctx: TLS context data from tls_init()
245 * shared between both authentication types), the TLS library wrapper should
[all …]
/external/grpc-grpc/tools/run_tests/generated/
Dlb_interop_test_scenarios.json35 "transport_sec": "tls"
40 "transport_sec": "tls"
48 "transport_sec": "tls"
87 "transport_sec": "tls"
92 "transport_sec": "tls"
100 "transport_sec": "tls"
150 "transport_sec": "tls"
156 "transport_sec": "tls"
166 "transport_sec": "tls"
227 "transport_sec": "tls"
[all …]
/external/rust/crates/tonic/src/transport/service/
Dconnector.rs3 #[cfg(feature = "tls")]
4 use super::tls::TlsConnector;
13 #[cfg(feature = "tls")]
14 tls: Option<TlsConnector>, field
15 #[cfg(not(feature = "tls"))]
17 tls: Option<()>, field
21 #[cfg(not(feature = "tls"))]
23 Self { inner, tls: None } in new()
26 #[cfg(feature = "tls")]
27 pub(crate) fn new(inner: C, tls: Option<TlsConnector>) -> Self { in new()
[all …]
/external/libwebsockets/lib/tls/openssl/
Dopenssl-server.c85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config()
89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config()
114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb()
142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb()
213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert);
233 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
250 vhost->tls.ssl_ctx, NULL, 0)) {
270 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
278 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx,
298 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p,
[all …]
Dopenssl-client.c35 #include "private-lib-tls-openssl.h"
71 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl));
114 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback()
121 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback()
127 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback()
160 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback()
161 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback()
168 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback()
169 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback()
175 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback()
[all …]
Dopenssl-ssl.c26 #include "private-lib-tls-openssl.h"
40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher()
55 if (!wsi->tls.ssl) in lws_ssl_get_error()
58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error()
59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error()
142 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx()
145 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx()
148 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx()
149 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx()
151 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx()
[all …]
/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/extensions/transport_sockets/tls/v3/
Dtls.proto3 package envoy.extensions.transport_sockets.tls.v3;
7 import "envoy/extensions/transport_sockets/tls/v3/common.proto";
8 import "envoy/extensions/transport_sockets/tls/v3/secret.proto";
18 option java_package = "io.envoyproxy.envoy.extensions.transport_sockets.tls.v3";
21 option go_package = "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/…
24 // [#protodoc-title: TLS transport socket]
25 // [#extension: envoy.transport_sockets.tls]
26 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS.
32 // Common TLS context settings.
37 …// :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidation…
[all …]
/external/scapy/test/tls/
Dtests_tls_netaccess.uts1 % TLS session establishment tests
7 + TLS server automaton tests
18 sys.path.append(os.path.abspath("./tls"))
32 CA_f = os.path.abspath("./tls/pki/ca_cert.pem")
66 = Testing TLS server with TLS 1.0 and TLS_RSA_WITH_RC4_128_SHA
71 = Testing TLS server with TLS 1.1 and TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
76 = Testing TLS server with TLS 1.2 and TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
81 = Testing TLS server with TLS 1.2 and TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
86 + TLS client automaton tests
95 sys.path.append(os.path.abspath("./tls"))
[all …]
/external/python/google-api-python-client/docs/dyn/
Dapigee_v1.organizations.environments.targetservers.html114TLS configuration information for VirtualHosts and TargetServers. # Optional. Specifies TLS config…
115 …&quot;ciphers&quot;: [ # The SSL/TLS cipher suites to be used. Must be one of the cipher suite nam…
118 &quot;clientAuthEnabled&quot;: True or False, # Optional. Enables two-way TLS.
119 &quot;commonName&quot;: { # The TLS Common Name of the certificate.
120 &quot;value&quot;: &quot;A String&quot;, # The TLS Common Name string of the certificate.
123 …ot;enabled&quot;: True or False, # Required. Enables TLS. If false, neither one-way nor two-way TL…
124 …res TLS certificate errors. Valid when configuring TLS for target servers and target endpoints, an…
127 &quot;protocols&quot;: [ # The TLS versioins to be used.
150TLS configuration information for VirtualHosts and TargetServers. # Optional. Specifies TLS config…
151 …&quot;ciphers&quot;: [ # The SSL/TLS cipher suites to be used. Must be one of the cipher suite nam…
[all …]
/external/clang/test/OpenMP/
Dparallel_copyin_codegen.cpp1 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -triple %itanium_abi_triple -emit-llv…
2 // RUN: %clang_cc1 -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -triple %itanium_abi_triple -emit-…
3 // RUN: %clang_cc1 -fopenmp -fnoopenmp-use-tls -x c++ -triple %itanium_abi_triple -std=c++11 -inclu…
4 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -DLAMBDA -triple %itanium_…
5 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -fblocks -DBLOCKS -triple %itanium_ab…
6 // RUN: %clang_cc1 -verify -fopenmp -fnoopenmp-use-tls -x c++ -std=c++11 -DARRAY -triple x86_64-app…
8 …openmp -x c++ -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck %s -check-prefix=TLS-CHECK
10 …triple -std=c++11 -include-pch %t -verify %s -emit-llvm -o - | FileCheck %s -check-prefix=TLS-CHECK
11 …+11 -DLAMBDA -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck -check-prefix=TLS-LAMBDA %s
12 …cks -DBLOCKS -triple %itanium_abi_triple -emit-llvm %s -o - | FileCheck -check-prefix=TLS-BLOCKS %s
[all …]
/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/api/v2/auth/
Dtls.proto20 "envoy.extensions.transport_sockets.tls.v3";
23 // [#protodoc-title: TLS transport socket]
24 // [#extension: envoy.transport_sockets.tls]
25 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS.
28 // Common TLS context settings.
37 // SNI string to use when creating TLS backend connections.
40 // If true, server-initiated TLS renegotiation will be allowed.
44 // TLS renegotiation is considered insecure and shouldn't be used unless absolutely necessary.
56 // Common TLS context settings.
68 // TLS session ticket key settings.
[all …]
/external/grpc-grpc/tools/distrib/python/xds_protos/envoy/extensions/transport_sockets/tls/v3/
Dcert_pb2.py3 # source: envoy/extensions/transport_sockets/tls/v3/cert.proto
14 from envoy.extensions.transport_sockets.tls.v3 import common_pb2 as envoy_dot_extensions_dot_transp…
15 from envoy.extensions.transport_sockets.tls.v3 import secret_pb2 as envoy_dot_extensions_dot_transp…
16 from envoy.extensions.transport_sockets.tls.v3 import tls_pb2 as envoy_dot_extensions_dot_transport…
18 from envoy.extensions.transport_sockets.tls.v3.common_pb2 import *
19 from envoy.extensions.transport_sockets.tls.v3.secret_pb2 import *
20 from envoy.extensions.transport_sockets.tls.v3.tls_pb2 import *
22tls/v3/cert.proto\x12)envoy.extensions.transport_sockets.tls.v3\x1a\x36\x65nvoy/extensions/transpo…
26 _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'envoy.extensions.transport_sockets.tls.v3.cert…
29 …nsions.transport_sockets.tls.v3B\tCertProtoP\001ZVgithub.com/envoyproxy/go-control-plane/envoy/ext…
/external/autotest/server/hosts/tls_client/
Dautotest_common_pb2.py23 package='chromiumos.config.api.test.tls',
25 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls',
26tls\x1a\x1bgoogle/protobuf/empty.proto\x1a)dependencies/longrunning/operations.proto\"\xc3\x01\n\x…
32 full_name='chromiumos.config.api.test.tls.Output',
59 full_name='chromiumos.config.api.test.tls.ProvisionDutResponse.Reason',
97 full_name='chromiumos.config.api.test.tls.ProvisionLacrosResponse.Reason',
131 full_name='chromiumos.config.api.test.tls.FakeOmaha.Payload.Type',
158 full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest',
164 name='name', full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest.name', index=0,
171 … name='command', full_name='chromiumos.config.api.test.tls.ExecDutCommandRequest.command', index=1,
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_tls_common.c2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
13 #include "crypto/tls.h"
174 * handle the TLS Session Ticket extension (they are supposed in eap_tls_params_from_conf()
175 * to ignore unrecognized TLS extensions, but end up rejecting in eap_tls_params_from_conf()
177 * TLS Sesson Ticket extension for EAP-TLS, EAP-PEAP, and in eap_tls_params_from_conf()
184 /* RFC 7170 requires TLS v1.2 or newer to be used with TEAP */ in eap_tls_params_from_conf()
195 * TLS v1.3 changes, so disable this by default for now. */ in eap_tls_params_from_conf()
202 /* While the current EAP-TLS implementation is more or less in eap_tls_params_from_conf()
203 * complete for TLS v1.3, there has been only minimal in eap_tls_params_from_conf()
207 * with TLS version update. in eap_tls_params_from_conf()
[all …]

12345678910>>...219