/external/llvm/test/tools/llvm-readobj/ |
D | mips-got.test | 7 RUN: llvm-readobj -mips-plt-got %p/Inputs/got-tls.so.elf-mips64el | \ 8 RUN: FileCheck %s -check-prefix GOT-TLS 58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0 175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0 178 GOT-TLS: Primary GOT { 179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0 180 GOT-TLS-NEXT: Reserved entries [ 181 GOT-TLS-NEXT: Entry { 182 GOT-TLS-NEXT: Address: 0x10C00 183 GOT-TLS-NEXT: Access: -32752 [all …]
|
/external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl_ciphersuites.h | 4 * \brief SSL Ciphersuites for Mbed TLS 7 * Copyright The Mbed TLS Contributors 40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */ 41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */ 46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */ 47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */ 61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */ 62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */ 63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */ 64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */ [all …]
|
/external/mbedtls/include/mbedtls/ |
D | ssl_ciphersuites.h | 4 * \brief SSL Ciphersuites for Mbed TLS 7 * Copyright The Mbed TLS Contributors 40 #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */ 41 #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */ 46 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */ 47 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */ 61 #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */ 62 #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */ 63 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */ 64 #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */ [all …]
|
/external/aws-crt-java/src/native/ |
D | tls_context_options.c | 51 static void s_jni_tls_ctx_options_destroy(struct jni_tls_ctx_options *tls) { in s_jni_tls_ctx_options_destroy() argument 52 if (tls == NULL) { in s_jni_tls_ctx_options_destroy() 56 aws_string_destroy(tls->ca_file); in s_jni_tls_ctx_options_destroy() 57 aws_string_destroy(tls->ca_path); in s_jni_tls_ctx_options_destroy() 58 aws_string_destroy(tls->alpn_list); in s_jni_tls_ctx_options_destroy() 59 aws_string_destroy(tls->certificate_path); in s_jni_tls_ctx_options_destroy() 60 aws_string_destroy(tls->private_key_path); in s_jni_tls_ctx_options_destroy() 61 aws_string_destroy(tls->pkcs12_path); in s_jni_tls_ctx_options_destroy() 62 aws_string_destroy_secure(tls->pkcs12_password); in s_jni_tls_ctx_options_destroy() 63 aws_string_destroy(tls->certificate); in s_jni_tls_ctx_options_destroy() [all …]
|
/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/ |
D | Tls.h | 2 EFI TLS Protocols as defined in UEFI 2.5. 4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers 6 TLS protocol. 7 The EFI TLS Protocol provides the ability to manage TLS session. 27 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to 28 /// create and destroy child of the driver to communicate with other host using TLS 37 /// The EFI TLS protocol provides the ability to manage TLS session. 55 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION. 59 /// TLS session as client or as server. The corresponding Data is of 64 /// A priority list of preferred algorithms for the TLS session. [all …]
|
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/ |
D | Tls.h | 2 EFI TLS Protocols as defined in UEFI 2.5. 4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers 6 TLS protocol. 7 The EFI TLS Protocol provides the ability to manage TLS session. 21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to 22 /// create and destroy child of the driver to communicate with other host using TLS 31 /// The EFI TLS protocol provides the ability to manage TLS session. 45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION. 49 /// TLS session as client or as server. The corresponding Data is of 54 /// A priority list of preferred algorithms for the TLS session. [all …]
|
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/ |
D | Tls.h | 2 EFI TLS Protocols as defined in UEFI 2.5. 4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers 6 TLS protocol. 7 The EFI TLS Protocol provides the ability to manage TLS session. 21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to 22 /// create and destroy child of the driver to communicate with other host using TLS 31 /// The EFI TLS protocol provides the ability to manage TLS session. 45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION. 49 /// TLS session as client or as server. The corresponding Data is of 54 /// A priority list of preferred algorithms for the TLS session. [all …]
|
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/ |
D | Tls.h | 2 EFI TLS Protocols as defined in UEFI 2.5. 4 The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers 6 TLS protocol. 7 The EFI TLS Protocol provides the ability to manage TLS session. 21 /// The EFI TLS Service Binding Protocol is used to locate EFI TLS Protocol drivers to 22 /// create and destroy child of the driver to communicate with other host using TLS 31 /// The EFI TLS protocol provides the ability to manage TLS session. 45 /// TLS session Version. The corresponding Data is of type EFI_TLS_VERSION. 49 /// TLS session as client or as server. The corresponding Data is of 54 /// A priority list of preferred algorithms for the TLS session. [all …]
|
/external/curl/lib/vtls/ |
D | cipher_suite.c | 56 "TLS" "\0" 194 /* TLS 1.3 ciphers */ 196 CS_ENTRY(0x1301, TLS,AES,128,GCM,SHA256,,,), 197 CS_ENTRY(0x1302, TLS,AES,256,GCM,SHA384,,,), 198 CS_ENTRY(0x1303, TLS,CHACHA20,POLY1305,SHA256,,,,), 199 CS_ENTRY(0x1304, TLS,AES,128,CCM,SHA256,,,), 200 CS_ENTRY(0x1305, TLS,AES,128,CCM,8,SHA256,,), 202 /* TLS 1.2 ciphers */ 203 CS_ENTRY(0xC02B, TLS,ECDHE,ECDSA,WITH,AES,128,GCM,SHA256), 205 CS_ENTRY(0xC02C, TLS,ECDHE,ECDSA,WITH,AES,256,GCM,SHA384), [all …]
|
/external/curl/docs/libcurl/opts/ |
D | CURLOPT_SSLVERSION.md | 13 - TLS 14 TLS-backend: 21 CURLOPT_SSLVERSION - preferred TLS/SSL version 33 Pass a long as parameter to control which version range of SSL/TLS versions to 36 The SSL and TLS versions have typically developed from the most insecure 38 SSLv3, TLS v1.0, TLS v1.1, TLS v1.2 and the most recent TLS v1.3. 45 default TLS v1.0 since 7.39.0 (unless the TLS library has a stricter rule). 49 TLS v1.0 or later 61 TLS v1.0 or later (Added in 7.34.0) 65 TLS v1.1 or later (Added in 7.34.0) [all …]
|
/external/openthread/third_party/mbedtls/repo/library/ |
D | ssl_ciphersuites.c | 4 * \brief SSL ciphersuites for Mbed TLS 6 * Copyright The Mbed TLS Contributors 43 /* TLS 1.3 ciphersuites */ 288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", [all …]
|
/external/mbedtls/library/ |
D | ssl_ciphersuites.c | 4 * \brief SSL ciphersuites for Mbed TLS 6 * Copyright The Mbed TLS Contributors 43 /* TLS 1.3 ciphersuites */ 288 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 295 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 303 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 308 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 317 MBEDTLS_KEY_EXCHANGE_NONE, /* Key exchange not part of ciphersuite in TLS 1.3 */ 328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", [all …]
|
/external/scapy/test/scapy/layers/tls/ |
D | tlsclientserver.uts | 1 % TLS session establishment tests 25 from scapy.layers.tls.automaton_srv import TLSServerAutomaton 30 load_layer("tls") 69 mycert = scapy_path("/test/scapy/layers/tls/pki/srv_cert.pem") 70 mykey = scapy_path("/test/scapy/layers/tls/pki/srv_key.pem") 72 mycert = scapy_path("/test/scapy/layers/tls/pki/srv_cert_ed25519.pem") 73 mykey = scapy_path("/test/scapy/layers/tls/pki/srv_key_ed25519.pem") 125 CA_f = scapy_path("/test/scapy/layers/tls/pki/ca_cert.pem") 126 mycert = scapy_path("/test/scapy/layers/tls/pki/cli_cert.pem") 127 mykey = scapy_path("/test/scapy/layers/tls/pki/cli_key.pem") [all …]
|
/external/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-ssl.c | 26 #include "private-lib-tls-mbedtls.h" 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 51 if (!wsi->tls.ssl) in lws_ssl_capable_read() 55 n = SSL_read(wsi->tls.ssl, buf, (int)len); in lws_ssl_capable_read() 72 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_capable_read() [all …]
|
/external/rust/android-crates-io/crates/tonic/src/transport/service/ |
D | connector.rs | 3 #[cfg(feature = "tls")] 4 use super::tls::TlsConnector; 13 #[cfg(feature = "tls")] 14 tls: Option<TlsConnector>, field 15 #[cfg(not(feature = "tls"))] 17 tls: Option<()>, field 21 #[cfg(not(feature = "tls"))] 23 Self { inner, tls: None } in new() 26 #[cfg(feature = "tls")] 27 pub(crate) fn new(inner: C, tls: Option<TlsConnector>) -> Self { in new() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls.h | 2 * SSL/TLS interface definition 125 * struct tls_connection_params - Parameters for TLS connection 179 * TLS connection parameters to be configured with tls_connection_set_params() 226 * tls_init - Initialize TLS library 227 * @conf: Configuration data for TLS library 232 * session. In other words, there can be two concurrent TLS contexts. If global 234 * authentication types), the TLS library wrapper should maintain a reference 240 * tls_deinit - Deinitialize TLS library 241 * @tls_ctx: TLS context data from tls_init() 245 * shared between both authentication types), the TLS library wrapper should [all …]
|
/external/grpc-grpc/tools/run_tests/generated/ |
D | lb_interop_test_scenarios.json | 35 "transport_sec": "tls" 40 "transport_sec": "tls" 48 "transport_sec": "tls" 87 "transport_sec": "tls" 92 "transport_sec": "tls" 100 "transport_sec": "tls" 150 "transport_sec": "tls" 156 "transport_sec": "tls" 166 "transport_sec": "tls" 227 "transport_sec": "tls" [all …]
|
/external/scapy/scapy/layers/tls/ |
D | __init__.py | 9 Tools for handling TLS sessions and digital certificates. 10 Use load_layer('tls') to load them to the main namespace. 23 - TLS records and sublayers (handshake...) parsing/building. Works with 24 versions SSLv2 to TLS 1.3. This may be enhanced by a TLS context. For 25 instance, if Scapy reads a ServerHello with version TLS 1.2 and a cipher 27 See test/tls.uts for real examples. 29 - TLS encryption/decryption capabilities with many ciphersuites, including 30 some which may be deemed dangerous. Once again, the TLS context enables 36 - TLS client & server basic automatons, provided for testing and tweaking 37 purposes. These make for a very primitive TLS stack. [all …]
|
/external/libwebsockets/lib/tls/openssl/ |
D | openssl-server.c | 85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config() 89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config() 114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert); 233 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 250 vhost->tls.ssl_ctx, NULL, 0)) { 270 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, 278 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx, 298 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p, [all …]
|
D | openssl-client.c | 35 #include "private-lib-tls-openssl.h" 71 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl)); 114 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback() 121 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback() 127 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback() 160 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback() 161 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback() 168 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback() 169 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() 175 &wsi->tls.kid_chain.akid[ in OpenSSL_client_verify_callback() [all …]
|
/external/chromiumos-config/python/chromiumos/config/api/test/tls/ |
D | wiring_pb2.py | 3 # source: chromiumos/config/api/test/tls/wiring.proto 14 from chromiumos.config.api.test.tls.dependencies.longrunning import operations_pb2 as chromiumos_do… 19 name='chromiumos/config/api/test/tls/wiring.proto', 20 package='chromiumos.config.api.test.tls', 22 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls', 24 …tls/wiring.proto\x12\x1e\x63hromiumos.config.api.test.tls\x1aHchromiumos/config/api/test/tls/depen… 32 full_name='chromiumos.config.api.test.tls.License.Type', 62 full_name='chromiumos.config.api.test.tls.SetDutPowerSupplyRequest.State', 92 full_name='chromiumos.config.api.test.tls.SetDutPowerSupplyResponse.Status', 138 full_name='chromiumos.config.api.test.tls.GetDutRequest', [all …]
|
D | commontls_pb2.py | 3 # source: chromiumos/config/api/test/tls/commontls.proto 16 from chromiumos.config.api.test.tls.dependencies.longrunning import operations_pb2 as chromiumos_do… 20 name='chromiumos/config/api/test/tls/commontls.proto', 21 package='chromiumos.config.api.test.tls', 23 serialized_options=b'Z1go.chromium.org/chromiumos/config/go/api/test/tls', 25 …tls/commontls.proto\x12\x1e\x63hromiumos.config.api.test.tls\x1a\x1bgoogle/protobuf/empty.proto\x1… 31 full_name='chromiumos.config.api.test.tls.Output', 61 full_name='chromiumos.config.api.test.tls.ProvisionDutResponse.Reason', 121 full_name='chromiumos.config.api.test.tls.ProvisionLacrosResponse.Reason', 161 full_name='chromiumos.config.api.test.tls.ProvisionAshResponse.Reason', [all …]
|
/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/extensions/transport_sockets/tls/v3/ |
D | tls.proto | 3 package envoy.extensions.transport_sockets.tls.v3; 7 import "envoy/extensions/transport_sockets/tls/v3/common.proto"; 8 import "envoy/extensions/transport_sockets/tls/v3/secret.proto"; 18 option java_package = "io.envoyproxy.envoy.extensions.transport_sockets.tls.v3"; 21 option go_package = "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/… 24 // [#protodoc-title: TLS transport socket] 25 // [#extension: envoy.transport_sockets.tls] 26 // The TLS contexts below provide the transport socket configuration for upstream/downstream TLS. 32 // Common TLS context settings. 37 …// :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidation… [all …]
|
/external/openthread/third_party/mbedtls/repo/docs/ |
D | psa-transition.md | 7 …TLS is gradually moving from legacy `mbedtls_xxx` APIs to newer `psa_xxx` APIs for cryptography. N… 9 This guide is intended to help migrate existing applications that use Mbed TLS for cryptography. It… 22 **Tutorial**: See the [getting started guide](https://mbed-tls.readthedocs.io/en/latest/getting_sta… 24 …le online. Mbed TLS implements a large subset of the specification which is documented in the [`ps… 28 * [Mbed TLS open issues](https://github.com/Mbed-TLS/mbedtls/issues) 30 * [Mbed TLS mailing list](https://lists.trustedfirmware.org/mailman3/lists/mbed-tls.lists.trustedfi… 34 * Mbed TLS APIs are traditionally very transparent: the caller can access internal fields of operat… 35 * Mbed TLS legacy APIs require key material to be present in the application memory. The PSA Crypto… 36 …iew/conventions.html#parameter-conventions) which many legacy APIs in Mbed TLS do not follow. For … 37 * Mbed TLS legacy APIs require passing around a random generator argument where needed. This has hi… [all …]
|
/external/grpc-grpc/tools/distrib/python/xds_protos/envoy/extensions/transport_sockets/tls/v3/ |
D | cert_pb2.py | 3 # source: envoy/extensions/transport_sockets/tls/v3/cert.proto 14 from envoy.extensions.transport_sockets.tls.v3 import common_pb2 as envoy_dot_extensions_dot_transp… 15 from envoy.extensions.transport_sockets.tls.v3 import secret_pb2 as envoy_dot_extensions_dot_transp… 16 from envoy.extensions.transport_sockets.tls.v3 import tls_pb2 as envoy_dot_extensions_dot_transport… 18 from envoy.extensions.transport_sockets.tls.v3.common_pb2 import * 19 from envoy.extensions.transport_sockets.tls.v3.secret_pb2 import * 20 from envoy.extensions.transport_sockets.tls.v3.tls_pb2 import * 22 …tls/v3/cert.proto\x12)envoy.extensions.transport_sockets.tls.v3\x1a\x36\x65nvoy/extensions/transpo… 26 _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'envoy.extensions.transport_sockets.tls.v3.cert… 29 …nsions.transport_sockets.tls.v3B\tCertProtoP\001ZVgithub.com/envoyproxy/go-control-plane/envoy/ext…
|