Home
last modified time | relevance | path

Searched full:tls (Results 1 – 25 of 5829) sorted by relevance

12345678910>>...234

/external/llvm/test/tools/llvm-readobj/
Dmips-got.test7 RUN: llvm-readobj -mips-plt-got %p/Inputs/got-tls.so.elf-mips64el | \
8 RUN: FileCheck %s -check-prefix GOT-TLS
58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0
175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0
178 GOT-TLS: Primary GOT {
179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0
180 GOT-TLS-NEXT: Reserved entries [
181 GOT-TLS-NEXT: Entry {
182 GOT-TLS-NEXT: Address: 0x10C00
183 GOT-TLS-NEXT: Access: -32752
[all …]
/external/openthread/third_party/mbedtls/repo/include/mbedtls/
Dssl_ciphersuites.h4 * \brief SSL Ciphersuites for Mbed TLS
7 * Copyright The Mbed TLS Contributors
40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
[all …]
/external/mbedtls/include/mbedtls/
Dssl_ciphersuites.h4 * \brief SSL Ciphersuites for Mbed TLS
7 * Copyright The Mbed TLS Contributors
40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
[all …]
/external/aws-crt-java/src/native/
Dtls_context_options.c51 static void s_jni_tls_ctx_options_destroy(struct jni_tls_ctx_options *tls) { in s_jni_tls_ctx_options_destroy() argument
52 if (tls == NULL) { in s_jni_tls_ctx_options_destroy()
56 aws_string_destroy(tls->ca_file); in s_jni_tls_ctx_options_destroy()
57 aws_string_destroy(tls->ca_path); in s_jni_tls_ctx_options_destroy()
58 aws_string_destroy(tls->alpn_list); in s_jni_tls_ctx_options_destroy()
59 aws_string_destroy(tls->certificate_path); in s_jni_tls_ctx_options_destroy()
60 aws_string_destroy(tls->private_key_path); in s_jni_tls_ctx_options_destroy()
61 aws_string_destroy(tls->pkcs12_path); in s_jni_tls_ctx_options_destroy()
62 aws_string_destroy_secure(tls->pkcs12_password); in s_jni_tls_ctx_options_destroy()
63 aws_string_destroy(tls->certificate); in s_jni_tls_ctx_options_destroy()
[all …]
/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/
DTls.h2 EFI TLS Protocols as defined in UEFI 2.5.
4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers
6 TLS protocol.
7 The EFI TLS Protocol provides the ability to manage TLS session.
27 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to
28 /// create and destroy child of the driver to communicate with other host using TLS
37 /// The EFI TLS protocol provides the ability to manage TLS session.
55 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION.
59 /// TLS session as client or as server. The corresponding Data is of
64 /// A priority list of preferred algorithms for the TLS session.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/
DTls.h2 EFI TLS Protocols as defined in UEFI 2.5.
4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers
6 TLS protocol.
7 The EFI TLS Protocol provides the ability to manage TLS session.
21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to
22 /// create and destroy child of the driver to communicate with other host using TLS
31 /// The EFI TLS protocol provides the ability to manage TLS session.
45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION.
49 /// TLS session as client or as server. The corresponding Data is of
54 /// A priority list of preferred algorithms for the TLS session.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/
DTls.h2 EFI TLS Protocols as defined in UEFI 2.5.
4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers
6 TLS protocol.
7 The EFI TLS Protocol provides the ability to manage TLS session.
21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to
22 /// create and destroy child of the driver to communicate with other host using TLS
31 /// The EFI TLS protocol provides the ability to manage TLS session.
45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION.
49 /// TLS session as client or as server. The corresponding Data is of
54 /// A priority list of preferred algorithms for the TLS session.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/
DTls.h2 EFI TLS Protocols as defined in UEFI 2.5.
4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers
6 TLS protocol.
7 The EFI TLS Protocol provides the ability to manage TLS session.
21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to
22 /// create and destroy child of the driver to communicate with other host using TLS
31 /// The EFI TLS protocol provides the ability to manage TLS session.
45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION.
49 /// TLS session as client or as server. The corresponding Data is of
54 /// A priority list of preferred algorithms for the TLS session.
[all …]
/external/curl/lib/vtls/
Dcipher_suite.c56 "TLS" "\0"
194 /* TLS 1.3 ciphers */
196 CS_ENTRY(0x1301, TLS,AES,128,GCM,SHA256,,,),
197 CS_ENTRY(0x1302, TLS,AES,256,GCM,SHA384,,,),
198 CS_ENTRY(0x1303, TLS,CHACHA20,POLY1305,SHA256,,,,),
199 CS_ENTRY(0x1304, TLS,AES,128,CCM,SHA256,,,),
200 CS_ENTRY(0x1305, TLS,AES,128,CCM,8,SHA256,,),
202 /* TLS 1.2 ciphers */
203 CS_ENTRY(0xC02B, TLS,ECDHE,ECDSA,WITH,AES,128,GCM,SHA256),
205 CS_ENTRY(0xC02C, TLS,ECDHE,ECDSA,WITH,AES,256,GCM,SHA384),
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_SSLVERSION.md13 - TLS
14 TLS-backend:
21 CURLOPT_SSLVERSION - preferred TLS/SSL version
33 Pass a long as parameter to control which version range of SSL/TLS versions to
36 The SSL and TLS versions have typically developed from the most insecure
38 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3.
45 default TLS v1.0 since 7.39.0 (unless the TLS library has a stricter rule).
49 TLS v1.0 or later
61 TLS v1.0 or later (Added in 7.34.0)
65 TLS v1.1 or later (Added in 7.34.0)
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dssl_ciphersuites.c4 * \brief SSL ciphersuites for Mbed TLS
6 * Copyright The Mbed TLS Contributors
43 /* TLS 1.3 ciphersuites */
288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
[all …]
/external/mbedtls/library/
Dssl_ciphersuites.c4 * \brief SSL ciphersuites for Mbed TLS
6 * Copyright The Mbed TLS Contributors
43 /* TLS 1.3 ciphersuites */
288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */
328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
[all …]
/external/scapy/test/scapy/layers/tls/
Dtlsclientserver.uts1 % TLS session establishment tests
25 from scapy.layers.tls.automaton_srv import TLSServerAutomaton
30 load_layer("tls")
69 mycert = scapy_path("/test/scapy/layers/tls/pki/srv_cert.pem")
70 mykey = scapy_path("/test/scapy/layers/tls/pki/srv_key.pem")
72 mycert = scapy_path("/test/scapy/layers/tls/pki/srv_cert_ed25519.pem")
73 mykey = scapy_path("/test/scapy/layers/tls/pki/srv_key_ed25519.pem")
125 CA_f = scapy_path("/test/scapy/layers/tls/pki/ca_cert.pem")
126 mycert = scapy_path("/test/scapy/layers/tls/pki/cli_cert.pem")
127 mykey = scapy_path("/test/scapy/layers/tls/pki/cli_key.pem")
[all …]
/external/libwebsockets/lib/tls/mbedtls/
Dmbedtls-ssl.c26 #include "private-lib-tls-mbedtls.h"
35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy()
36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy()
37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy()
38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy()
40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy()
41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy()
51 if (!wsi->tls.ssl) in lws_ssl_capable_read()
55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read()
72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read()
[all …]
/external/rust/android-crates-io/crates/tonic/src/transport/service/
Dconnector.rs3 #[cfg(feature = "tls")]
4 use super::tls::TlsConnector;
13 #[cfg(feature = "tls")]
14 tls: Option<TlsConnector>, field
15 #[cfg(not(feature = "tls"))]
17 tls: Option<()>, field
21 #[cfg(not(feature = "tls"))]
23 Self { inner, tls: None } in new()
26 #[cfg(feature = "tls")]
27 pub(crate) fn new(inner: C, tls: Option<TlsConnector>) -> Self { in new()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls.h2 * SSL/TLS interface definition
125 * struct tls_connection_params - Parameters for TLS connection
179 * TLS connection parameters to be configured with tls_connection_set_params()
226 * tls_init - Initialize TLS library
227 * @conf: Configuration data for TLS library
232 * session. In other words, there can be two concurrent TLS contexts. If global
234 * authentication types), the TLS library wrapper should maintain a reference
240 * tls_deinit - Deinitialize TLS library
241 * @tls_ctx: TLS context data from tls_init()
245 * shared between both authentication types), the TLS library wrapper should
[all …]
/external/grpc-grpc/tools/run_tests/generated/
Dlb_interop_test_scenarios.json35 "transport_sec": "tls"
40 "transport_sec": "tls"
48 "transport_sec": "tls"
87 "transport_sec": "tls"
92 "transport_sec": "tls"
100 "transport_sec": "tls"
150 "transport_sec": "tls"
156 "transport_sec": "tls"
166 "transport_sec": "tls"
227 "transport_sec": "tls"
[all …]
/external/scapy/scapy/layers/tls/
D__init__.py9 Tools for handling TLS sessions and digital certificates.
10 Use load_layer('tls') to load them to the main namespace.
23 - TLS records and sublayers (handshake...) parsing/building. Works with
24 versions SSLv2 to TLS 1.3. This may be enhanced by a TLS context. For
25 instance, if Scapy reads a ServerHello with version TLS 1.2 and a cipher
27 See test/tls.uts for real examples.
29 - TLS encryption/decryption capabilities with many ciphersuites, including
30 some which may be deemed dangerous. Once again, the TLS context enables
36 - TLS client & server basic automatons, provided for testing and tweaking
37 purposes. These make for a very primitive TLS stack.
[all …]
/external/libwebsockets/lib/tls/openssl/
Dopenssl-server.c85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config()
89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config()
114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb()
142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb()
213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert);
233 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
250 vhost->tls.ssl_ctx, NULL, 0)) {
270 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
278 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx,
298 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p,
[all …]
Dopenssl-client.c35 #include "private-lib-tls-openssl.h"
71 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl));
114 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback()
121 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback()
127 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback()
160 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback()
161 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback()
168 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback()
169 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback()
175 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback()
[all …]
/external/chromiumos-config/python/chromiumos/config/api/test/tls/
Dwiring_pb2.py3 # source: chromiumos/config/api/test/tls/wiring.proto
14 from chromiumos.config.api.test.tls.dependencies.longrunning import operations_pb2 as chromiumos_do…
19 name='chromiumos/config/api/test/tls/wiring.proto',
20 package='chromiumos.config.api.test.tls',
22 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls',
24tls/wiring.proto\x12\x1e\x63hromiumos.config.api.test.tls\x1aHchromiumos/config/api/test/tls/depen…
32 full_name='chromiumos.config.api.test.tls.License.Type',
62 full_name='chromiumos.config.api.test.tls.SetDutPowerSupplyRequest.State',
92 full_name='chromiumos.config.api.test.tls.SetDutPowerSupplyResponse.Status',
138 full_name='chromiumos.config.api.test.tls.GetDutRequest',
[all …]
Dcommontls_pb2.py3 # source: chromiumos/config/api/test/tls/commontls.proto
16 from chromiumos.config.api.test.tls.dependencies.longrunning import operations_pb2 as chromiumos_do…
20 name='chromiumos/config/api/test/tls/commontls.proto',
21 package='chromiumos.config.api.test.tls',
23 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls',
25tls/commontls.proto\x12\x1e\x63hromiumos.config.api.test.tls\x1a\x1bgoogle/protobuf/empty.proto\x1…
31 full_name='chromiumos.config.api.test.tls.Output',
61 full_name='chromiumos.config.api.test.tls.ProvisionDutResponse.Reason',
121 full_name='chromiumos.config.api.test.tls.ProvisionLacrosResponse.Reason',
161 full_name='chromiumos.config.api.test.tls.ProvisionAshResponse.Reason',
[all …]
/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/extensions/transport_sockets/tls/v3/
Dtls.proto3 package envoy.extensions.transport_sockets.tls.v3;
7 import "envoy/extensions/transport_sockets/tls/v3/common.proto";
8 import "envoy/extensions/transport_sockets/tls/v3/secret.proto";
18 option java_package = "io.envoyproxy.envoy.extensions.transport_sockets.tls.v3";
21 option go_package = "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/…
24 // [#protodoc-title: TLS transport socket]
25 // [#extension: envoy.transport_sockets.tls]
26 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS.
32 // Common TLS context settings.
37 …// :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidation…
[all …]
/external/openthread/third_party/mbedtls/repo/docs/
Dpsa-transition.md7TLS is gradually moving from legacy `mbedtls_xxx` APIs to newer `psa_xxx` APIs for cryptography. N…
9 This guide is intended to help migrate existing applications that use Mbed TLS for cryptography. It…
22 **Tutorial**: See the [getting started guide](https://mbed-tls.readthedocs.io/en/latest/getting_sta…
24 …le online. Mbed TLS implements a large subset of the specification which is documented in the [`ps…
28 * [Mbed TLS open issues](https://github.com/Mbed-TLS/mbedtls/issues)
30 * [Mbed TLS mailing list](https://lists.trustedfirmware.org/mailman3/lists/mbed-tls.lists.trustedfi…
34 * Mbed TLS APIs are traditionally very transparent: the caller can access internal fields of operat…
35 * Mbed TLS legacy APIs require key material to be present in the application memory. The PSA Crypto…
36 …iew/conventions.html#parameter-conventions) which many legacy APIs in Mbed TLS do not follow. For …
37 * Mbed TLS legacy APIs require passing around a random generator argument where needed. This has hi…
[all …]
/external/grpc-grpc/tools/distrib/python/xds_protos/envoy/extensions/transport_sockets/tls/v3/
Dcert_pb2.py3 # source: envoy/extensions/transport_sockets/tls/v3/cert.proto
14 from envoy.extensions.transport_sockets.tls.v3 import common_pb2 as envoy_dot_extensions_dot_transp…
15 from envoy.extensions.transport_sockets.tls.v3 import secret_pb2 as envoy_dot_extensions_dot_transp…
16 from envoy.extensions.transport_sockets.tls.v3 import tls_pb2 as envoy_dot_extensions_dot_transport…
18 from envoy.extensions.transport_sockets.tls.v3.common_pb2 import *
19 from envoy.extensions.transport_sockets.tls.v3.secret_pb2 import *
20 from envoy.extensions.transport_sockets.tls.v3.tls_pb2 import *
22tls/v3/cert.proto\x12)envoy.extensions.transport_sockets.tls.v3\x1a\x36\x65nvoy/extensions/transpo…
26 _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'envoy.extensions.transport_sockets.tls.v3.cert…
29 …nsions.transport_sockets.tls.v3B\tCertProtoP\001ZVgithub.com/envoyproxy/go-control-plane/envoy/ext…

12345678910>>...234