| /external/python/cpython3/Tools/ssl/ |
| D | multissltests.py | 2 """Run Python tests against multiple installations of OpenSSL and LibreSSL 6 (1) downloads OpenSSL / LibreSSL tar bundle 8 (3) compiles OpenSSL / LibreSSL 9 (4) installs OpenSSL / LibreSSL into ../multissl/$LIB/$VERSION/ 23 (c) 2013-2017 Christian Heimes <christian@python.org> 71 "Run CPython tests with multiple OpenSSL and LibreSSL " 76 '--debug', 81 '--disable-ancient', 83 help="Don't test OpenSSL and LibreSSL versions without upstream support", 86 '--openssl', [all …]
|
| /external/libwebsockets/READMEs/ |
| D | README.libressl.md | 3 libressl is another fork of Openssl. 5 ## Example build for libressl itself 7 If you unpack or clone into `/path/to/libressl` and enter that dir... 13 $ make -j8 16 ## Example build for lws against libressl 23 …-DLWS_OPENSSL_LIBRARIES='/path/to/libressl/build/tls/libtls.a;/path/to/libressl/build/ssl/libssl.a… 24 $ make -j8 27 Libressl by default will look for a trust bundle in `/usr/local/etc/ssl/cert.pem`, you either have … 34 $ sudo mkdir -p /usr/local/etc/ssl 35 $ sudo ln -sf /etc/pki/tls/cert.pem /usr/local/etc/ssl/cert.pem [all …]
|
| /external/curl/.github/workflows/ |
| D | non-native.yml | 3 # SPDX-License-Identifier: curl 5 name: non-native 10 - master 11 - '*/ci' 12 paths-ignore: 13 - '**/*.md' 14 - '.circleci/**' 15 - 'appveyor.*' 16 - 'packages/**' 17 - 'plan9/**' [all …]
|
| D | linux.yml | 3 # SPDX-License-Identifier: curl 10 - master 11 - '*/ci' 12 paths-ignore: 13 - '**/*.md' 14 - '.circleci/**' 15 - 'appveyor.*' 16 - 'packages/**' 17 - 'plan9/**' 18 - 'projects/**' [all …]
|
| D | macos.yml | 3 # SPDX-License-Identifier: curl 10 - master 11 - '*/ci' 12 paths-ignore: 13 - '**/*.md' 14 - '.circleci/**' 15 - 'appveyor.*' 16 - 'packages/**' 17 - 'plan9/**' 18 - 'projects/**' [all …]
|
| /external/rust/crates/openssl/ |
| D | CHANGELOG.md | 5 ## [v0.10.64] - 2024-02-19 13 ## [v0.10.63] - 2024-01-19 26 …RAINPOOL_P256R1,BRAINPOOL_P320R1,BRAINPOOL_P384R1,BRAINPOOL_P512R1}` are now available on LibreSSL. 28 ## [v0.10.62] - 2023-12-22 39 ## [v0.10.61] - 2023-12-04 49 ## [v0.10.60] - 2023-11-22 69 * `cipher::Cipher::chacha20` is now available on LibreSSL 70 * `symm::Cipher::chacha20` is now available on LibreSSL 72 ## [v0.10.59] - 2023-11-03 82 ## [v0.10.58] - 2023-11-01 [all …]
|
| D | build.rs | 11 println!("cargo:rustc-cfg=libressl"); in main() 15 println!("cargo:rustc-cfg=boringssl"); in main() 22 println!("cargo:rustc-cfg=libressl250"); in main() 25 println!("cargo:rustc-cfg=libressl251"); in main() 28 println!("cargo:rustc-cfg=libressl261"); in main() 31 println!("cargo:rustc-cfg=libressl270"); in main() 34 println!("cargo:rustc-cfg=libressl271"); in main() 37 println!("cargo:rustc-cfg=libressl273"); in main() 40 println!("cargo:rustc-cfg=libressl280"); in main() 43 println!("cargo:rustc-cfg=libressl291"); in main() [all …]
|
| /external/rust/crates/openssl/patches/ |
| D | 0008-Enable-set_alpn_select_callback-for-BoringSSL.patch | 6 --- 7 src/ssl/callbacks.rs | 4 ++-- 8 src/ssl/mod.rs | 21 ++++++++++++++------- 9 2 files changed, 16 insertions(+), 9 deletions(-) 11 diff --git a/src/ssl/callbacks.rs b/src/ssl/callbacks.rs 13 --- a/src/ssl/callbacks.rs 15 @@ -19,7 +19,7 @@ use crate::dh::Dh; 19 -#[cfg(any(ossl102, libressl261))] 24 @@ -178,7 +178,7 @@ where 28 -#[cfg(any(ossl102, libressl261))] [all …]
|
| /external/curl/docs/ |
| D | CIPHERS.md | 1 <!-- 4 SPDX-License-Identifier: curl 5 --> 10 [`--tls13-ciphers`](https://curl.se/docs/manpage.html#--tls13-ciphers) 15 [`--ciphers`](https://curl.se/docs/manpage.html#--ciphers) 25 using [`--tlsv1.3`](https://curl.se/docs/manpage.html#--tlsv13) 44 OpenSSL (1.1.1+, curl 7.61.0+), LibreSSL (3.4.1+, curl 8.3.0+), 47 The list of cipher suites that can be used for the `--tls13-ciphers` option: 65 Setting TLS 1.2 cipher suites is supported by curl with OpenSSL, LibreSSL, 72 are with OpenSSL names (e.g. `ECDHE-RSA-AES128-GCM-SHA256`) and IANA names [all …]
|
| /external/curl/plan9/ |
| D | README | 12 LibreSSL Portable can be downloaded from: 14 https://github.com/libressl-portable/portable/pull/510 20 % bind -ac ../lib lib 21 % bind -ac ../src src 22 % bind -ac ../include include 23 % bind -ac .. .
|
| /external/rust/crates/openssl/src/ |
| D | version.rs | 5 // http://www.apache.org/licenses/LICENSE-2.0 48 pub fn number() -> i64 { in number() 54 pub fn version() -> &'static str { in version() 65 pub fn c_flags() -> &'static str { in c_flags() 75 pub fn built_on() -> &'static str { in built_on() 85 pub fn platform() -> &'static str { in platform() 95 pub fn dir() -> &'static str { in dir() 114 #[cfg(not(any(libressl, boringssl)))] in test_versions() 115 fn expected_name() -> &'static str { in test_versions() 118 #[cfg(libressl)] in test_versions() [all …]
|
| D | lib.rs | 4 //! 3.x.x and LibreSSL versions 2.5 through 3.7.x are supported. 13 //! If the `vendored` Cargo feature is enabled, the `openssl-src` crate will be used to compile and… 14 //! a copy of OpenSSL. The build process requires a C compiler, perl (and perl-core), and make. The… 23 //! `openssl-probe` crate can be used to do that instead. 27 //! The `openssl-sys` crate will automatically detect OpenSSL installations via Homebrew on macOS a… 28 //! Additionally, it will use `pkg-config` on Unix-like systems to find the system installation. 41 //! $ sudo pacman -S pkg-config openssl 44 //! $ sudo apt-get install pkg-config libssl-dev 47 //! $ sudo dnf install pkg-config perl-FindBin openssl-devel 50 //! $ apk add pkgconfig openssl-dev [all …]
|
| D | error.rs | 43 pub fn get() -> ErrorStack { in get() 61 pub fn errors(&self) -> &[Error] { in errors() 67 fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result { in fmt() 87 fn from(e: ErrorStack) -> io::Error { in from() 93 fn from(_: ErrorStack) -> fmt::Error { in from() 113 pub fn get() -> Option<Error> { in get() 223 pub fn code(&self) -> ErrType { in code() 228 pub fn library(&self) -> Option<&'static str> { in library() 242 // OpenSSL/LibreSSL they're safe. 244 pub fn library_code(&self) -> libc::c_int { in library_code() [all …]
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLOPT_TLS13_CIPHERS.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_SSLVERSION (3) 9 - CURLOPT_PROXY_SSL_CIPHER_LIST (3) 10 - CURLOPT_PROXY_TLS13_CIPHERS (3) 11 - CURLOPT_SSLVERSION (3) 12 - CURLOPT_SSL_CIPHER_LIST (3) 13 - CURLOPT_USE_SSL (3) 15 - TLS [all …]
|
| D | CURLOPT_PROXY_TLS13_CIPHERS.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - CURLOPT_PROXY_SSLVERSION (3) 9 - CURLOPT_PROXY_SSL_CIPHER_LIST (3) 10 - CURLOPT_SSLVERSION (3) 11 - CURLOPT_SSL_CIPHER_LIST (3) 12 - CURLOPT_TLS13_CIPHERS (3) 14 - TLS 15 TLS-backend: [all …]
|
| /external/scapy/.config/ci/ |
| D | test.sh | 3 # SPDX-License-Identifier: GPL-2.0-only 14 if [ "$OSTYPE" = "linux-gnu" ] 18 UT_FLAGS+=" -K tshark" 19 if [ -z "$SIMPLE_TESTS" ] 22 sudo modprobe -n -v vcan 23 if [[ $? -ne 0 ]] 26 UT_FLAGS+=" -K vcan_socket" 29 UT_FLAGS+=" -K vcan_socket" 35 UT_FLAGS+=" -K tun -K tap" 38 # Note: LibreSSL 3.6.* does not support X25519 according to [all …]
|
| /external/rust/crates/openssl/src/ssl/ |
| D | mod.rs | 3 //! `SslConnector` and `SslAcceptor` should be used in most cases - they handle 120 /// Returns the OpenSSL name of a cipher corresponding to an RFC-standard cipher name. 127 pub fn cipher_name(std_name: &str) -> &'static str { in cipher_name() 168 /// [RFC 4347 Section 4.2.1]: https://tools.ietf.org/html/rfc4347#section-4.2.1 224 /// Requires OpenSSL 1.1.1 or LibreSSL 3.4.0 or newer. 230 /// Requires OpenSSL 1.0.2 or LibreSSL 3.3.2 or newer. 236 /// Requires OpenSSL 1.0.2 or LibreSSL 3.3.2 or newer. 273 /// Temporarily reprioritize ChaCha20-Poly1305 ciphers to the top of the server cipher list 274 /// if a ChaCha20-Poly1305 cipher is at the top of the client cipher list. This helps those 275 /// clients (e.g. mobile) use ChaCha20-Poly1305 if that cipher is anywhere in the server [all …]
|
| /external/tcpdump/ |
| D | configure.ac | 25 # At minimum, we want C++/C99-style // comments. 36 # Get the size of a void *, to know whether this is a 32-bit or 64-bit build. 41 # Get the size of a time_t, to know whether it's 32-bit or 64-bit. 49 AS_HELP_STRING([--disable-universal],[don't build universal on macOS])) 55 # Leopard. Build for x86 and 32-bit PowerPC, with 58 V_CCOPT="$V_CCOPT -arch i386 -arch ppc" 59 LDFLAGS="$LDFLAGS -arch i386 -arch ppc" 64 # Snow Leopard. Build for x86-64 and x86, with 65 # x86-64 first. (That's what Apple does.) 67 V_CCOPT="$V_CCOPT -arch x86_64 -arch i386" [all …]
|
| /external/curl/tests/http/ |
| D | test_17_ssl_use.py | 2 # -*- coding: utf-8 -*- 23 # SPDX-License-Identifier: curl 43 env.make_data_file(indir=httpd.docs_dir, fname="data-10k", fsize=10*1024) 68 xargs = ['--sessionid', '--tls-max', tls_max, f'--tlsv{tls_max}'] 69 if env.curl_uses_lib('libressl'): 71 exp_resumed = 'Initial' # 1.2 works in LibreSSL, but 1.3 does not, TODO 72 if env.curl_uses_lib('rustls-ffi'): 85 f'id=[0-{count-1}]&close' 127 '-H', f'Host: {env.domain1}', 135 # 7 - Rustls rejects a servername with .. during setup [all …]
|
| /external/libwebsockets/ |
| D | .sai.json | 2 "schema": "sai-1", 8 "linux-debian-11/x86_64-amd/gcc": { 9 …-test-server/plugins:../destdir/usr/local/lib;export SAI_CPACK=\"-G DEB\";cmake .. ${cmake} && mak… 11 "linux-debian-buster/x86-amd/gcc": { 12 …-test-server/plugins:../destdir/usr/local/lib;export SAI_CPACK=\"-G DEB\";cmake .. ${cmake} && mak… 14 "linux-debian-sid/x86_64-amd/gcc": { 15 …-test-server/plugins:../destdir/usr/local/lib;export SAI_CPACK=\"-G DEB\";cmake .. ${cmake} && mak… 17 "linux-ubuntu-xenial/x86_64-amd/gcc": { 18 …-test-server/plugins:../destdir/usr/local/lib;export SAI_CPACK=\"-G DEB\";cmake .. ${cmake} && mak… 20 "linux-debian-sid/x86-amd/gcc": { [all …]
|
| /external/python/cpython3/Tools/ |
| D | README | 9 c-analyzer Tools to check no new global variables have been added. 17 freeze Create a stand-alone executable from a Python program. 27 importbench A set of micro-benchmarks for various import scenarios. 36 peg_generator PEG-based parser generator (pegen) used for new parser. 38 scripts A number of useful single-file programs, e.g. run_tests.py 42 tests against multiple installations of OpenSSL and LibreSSL. 47 and other mapping files (by Fredrik Lundh, Marc-Andre Lemburg
|
| /external/cronet/stable/third_party/netty-tcnative/src/c/ |
| D | ssl_private.h | 8 * http://www.apache.org/licenses/LICENSE-2.0 23 * http://www.apache.org/licenses/LICENSE-2.0 71 * when the user points at an explicit non-engine flavor of OpenSSL 112 #define SSL_CVERIFY_IGNORED (-1) 136 #define X509_REVOKED_get0_serialNumber(x) x->serialNumber 138 #define BIO_get_init(x) ((x)->init) 139 #define BIO_set_init(x,v) ((x)->init=(v)) 140 #define BIO_get_data(x) ((x)->ptr) 141 #define BIO_set_data(x,v) ((x)->ptr=(v)) 142 #define BIO_set_shutdown(x,v) ((x)->shutdown=(v)) [all …]
|
| /external/cronet/tot/third_party/netty-tcnative/src/c/ |
| D | ssl_private.h | 8 * http://www.apache.org/licenses/LICENSE-2.0 23 * http://www.apache.org/licenses/LICENSE-2.0 71 * when the user points at an explicit non-engine flavor of OpenSSL 112 #define SSL_CVERIFY_IGNORED (-1) 136 #define X509_REVOKED_get0_serialNumber(x) x->serialNumber 138 #define BIO_get_init(x) ((x)->init) 139 #define BIO_set_init(x,v) ((x)->init=(v)) 140 #define BIO_get_data(x) ((x)->ptr) 141 #define BIO_set_data(x,v) ((x)->ptr=(v)) 142 #define BIO_set_shutdown(x,v) ((x)->shutdown=(v)) [all …]
|
| /external/curl/m4/ |
| D | curl-openssl.m4 | 21 # SPDX-License-Identifier: curl 36 dnl backup the pre-ssl variables 44 *-*-msys* | *-*-mingw*) 47 LIBS="-lgdi32 $LIBS" 66 dnl --with-openssl (without path) used 71 dnl check the given --with-openssl spot 75 dnl Try pkg-config even when cross-compiling. Since we 79 if test -f "$OPENSSL_PCDIR/openssl.pc"; then 87 if test -f "$OPENSSL_PCDIR/openssl.pc"; then 94 if test ! -f "$PREFIX_OPENSSL/include/openssl/ssl.h"; then [all …]
|
| /external/curl/docs/libcurl/ |
| D | curl_global_sslset.md | 1 --- 3 SPDX-License-Identifier: curl 7 See-also: 8 - curl_global_init (3) 9 - libcurl (3) 11 - All 12 Added-in: 7.56.0 13 --- 17 curl_global_sslset - select SSL backend to use 43 NULL-terminated list of available backends. The available backends are those [all …]
|