Home
last modified time | relevance | path

Searched +full:no +full:- +full:tls (Results 1 – 25 of 1028) sorted by relevance

12345678910>>...42

/third_party/mbedtls/docs/architecture/
Dtls13-support.md1 TLS 1.3 support
5 --------
7 Mbed TLS provides a minimum viable implementation of the TLS 1.3 protocol
8 defined in the "MVP definition" section below. The TLS 1.3 support enablement
11 The development of the TLS 1.3 protocol is based on the TLS 1.3 prototype
20 --------------
22 - Overview
24 - The TLS 1.3 MVP implements only the client side of the protocol.
26 - The TLS 1.3 MVP supports ECDHE key establishment.
28 - The TLS 1.3 MVP does not support DHE key establishment.
[all …]
/third_party/nghttp2/
Dgennghttpxfun.py6 "private-key-file",
7 "private-key-passwd-file",
8 "certificate-file",
9 "dh-param-file",
14 "http2-max-concurrent-streams",
15 "log-level",
17 "http2-proxy",
18 "http2-bridge",
19 "client-proxy",
20 "add-x-forwarded-for",
[all …]
/third_party/nghttp2/doc/bash_completion/
Dnghttpx10 -*)
11-W '--backend --frontend --backlog --backend-address-family --backend-http-proxy-uri --workers --s…
19 complete -F _nghttpx nghttpx
/third_party/libcoap/
D.travis.yml2 - linux
7 - gcc
8 - clang
11 - docker
14 - PLATFORM=posix TESTS=yes TLS=no
15 - PLATFORM=posix TESTS=yes TLS=gnutls SMALL_STACK=yes
16 - PLATFORM=posix TESTS=yes TLS=gnutls SMALL_STACK=no
17 - PLATFORM=posix TESTS=yes TLS=gnutls SMALL_STACK=yes EPOLL=no
18 - PLATFORM=posix TESTS=yes TLS=gnutls SMALL_STACK=no EPOLL=no
19 - PLATFORM=posix TESTS=yes TLS=openssl
[all …]
/third_party/openssl/test/ssl-tests/
D17-renegotiate.cnf.in1 # -*- mode: perl; -*-
2 # Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
20 name => "renegotiate-client-no-resume",
27 "Method" => "TLS",
29 "ResumptionExpected" => "No",
34 name => "renegotiate-client-resume",
40 "Method" => "TLS",
47 name => "renegotiate-server-no-resume",
54 "Method" => "TLS",
56 "ResumptionExpected" => "No",
[all …]
D20-cert-select.cnf5 test-0 = 0-ECDSA CipherString Selection
6 test-1 = 1-ECDSA CipherString Selection
7 test-2 = 2-ECDSA CipherString Selection
8 test-3 = 3-RSA CipherString Selection
9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection
10 test-5 = 5-ECDSA CipherString Selection, no ECDSA certificate
11 test-6 = 6-ECDSA Signature Algorithm Selection
12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384
13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point
14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate
[all …]
D17-renegotiate.cnf5 test-0 = 0-renegotiate-client-no-resume
6 test-1 = 1-renegotiate-client-resume
7 test-2 = 2-renegotiate-server-no-resume
8 test-3 = 3-renegotiate-server-resume
9 test-4 = 4-renegotiate-client-auth-require
10 test-5 = 5-renegotiate-client-auth-once
11 test-6 = 6-renegotiate-client-legacy-connect
12 test-7 = 7-renegotiate-aead-to-non-aead
13 test-8 = 8-renegotiate-non-aead-to-aead
14 test-9 = 9-renegotiate-non-aead-to-non-aead
[all …]
/third_party/mbedtls/docs/
D3.0-migration-guide.md1 # Migrating from Mbed TLS 2.x to Mbed TLS 3.0
3 This guide details the steps required to migrate from Mbed TLS version 2.x to
4 Mbed TLS version 3.0 or greater. Unlike normal releases, Mbed TLS 3.0 breaks
6 need to change their own code in order to make it work with Mbed TLS 3.0.
13 - Removal of many insecure or obsolete features
14 - Tidying up of configuration options (including removing some less useful options).
15 - Changing function signatures, e.g. adding return codes, adding extra parameters, or making some a…
16 - Removal of functions previously marked as deprecated.
35 Defining it to a particular value will ensure that Mbed TLS interprets
37 used by the Mbed TLS release whose `MBEDTLS_VERSION_NUMBER` has the same
[all …]
Duse-psa-crypto.md1 This document describes the compile-time configuration option
9 -------------------
11 Compile-time: enabling `MBEDTLS_USE_PSA_CRYPTO` requires
15 Effect: `MBEDTLS_USE_PSA_CRYPTO` has no effect on TLS 1.3 for which PSA
24 -------------------------
27 pre-existing APIs, in order to get access to the benefits; in the sub-sections
28 below these are indicated by "Use in (X.509 and) TLS: opt-in", meaning that
29 this requires changes to the application code for the (X.509 and) TLS layers
32 Some of these APIs are mostly meant for internal use by the TLS (and X.509)
33 layers; they are indicated below by "Use in (X.509 and) TLS: automatic",
[all …]
/third_party/nghttp2/doc/sources/
Dnghttpx-howto.rst3 nghttpx - HTTP/2 proxy - HOW-TO
9 describes each operation mode and explains the intended use-cases. It
13 ------------
15 If nghttpx is invoked without :option:`--http2-proxy`, it operates in
20 By default, frontend connection is encrypted using SSL/TLS. So
25 To turn off encryption on frontend connection, use ``no-tls`` keyword
26 in :option:`--frontend` option. HTTP/2 and HTTP/1 are available on
32 :option:`--frontend` option (.e.g, ``--frontend='*,443;quic'``)
35 by using multiple :option:`--frontend` options. For each frontend
36 address, TLS can be enabled or disabled.
[all …]
/third_party/libwebsockets/READMEs/
DREADME.lws_metrics.md9 - the architecture inside lws for collecting and aggregating / decimating the
12 - an external handler for forwarding aggregated metrics. An lws_system ops
18 - a policy for when to emit each type of aggregated information to the external
20 a linked-list of lws_metric_policy_t object passed it at context creation in
26 ### `lws_metrics` policy-based reporting
28 Normally metrics implementations are fixed at build-time and cannot change
35 ![policy based metrics](/doc-assets/lws_metrics-policy.png)
62 There is no predefined metrics schema, metrics objects, including those created
84 Histogram metrics track differently-qualified results in the same metric, for
89 …dcert_selfsigned",hostname="invalidca.badcert.warmcat.com",peer="46.105.127.147",tls="invalidca"} 2
[all …]
/third_party/nghttp2/src/
Dshrpx_config.h2 * nghttp2 - HTTP/2 C Library
20 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
71 namespace tls {
75 } // namespace tls
78 StringRef::from_lit("private-key-file");
80 StringRef::from_lit("private-key-passwd-file");
82 StringRef::from_lit("certificate-file");
83 constexpr auto SHRPX_OPT_DH_PARAM_FILE = StringRef::from_lit("dh-param-file");
89 StringRef::from_lit("http2-max-concurrent-streams");
90 constexpr auto SHRPX_OPT_LOG_LEVEL = StringRef::from_lit("log-level");
[all …]
/third_party/nghttp2/doc/
Dnghttpx.14 .nr rst2man-indent-level 0
7 \\$1 \\n[an-margin]
8 level \\n[rst2man-indent-level]
9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
10 -
11 \\n[rst2man-indent0]
12 \\n[rst2man-indent1]
13 \\n[rst2man-indent2]
18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
19 . nr rst2man-indent-level +1
[all …]
Dnghttpx.1.rst10 --------
15 -----------
23 "no-tls" parameter is used in :option:`--frontend` option.
28 "no-tls" parameter is used in :option:`--frontend` option. To
33 -------
40 .. option:: -b, --backend=(<HOST>,<PORT>|unix:<PATH>)[;[<PATTERN>[:...]][[;<PARAM>]...]
62 listener with "sni-fwd" parameter enabled, SNI host is
96 pattern, which matches all request paths (catch-all
97 pattern). The catch-all backend must be given.
101 converted to lower case. For path part, percent-encoded
[all …]
/third_party/mbedtls/docs/proposed/
Dpsa-conditional-inclusion-c.md1 Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS
6 This is currently a proposal for Mbed TLS. It is not currently on track for standardization in PSA.
12-crypto/psa/#application-programming-interface) specifies the interface between a PSA Cryptography…
18 Mbed TLS offers a way to select which cryptographic mechanisms are included in a build through its …
22-in implementations of cryptographic mechanisms) can be augmented with drivers. **Transparent driv…
24 … for asymmetric cryptography. For example, many parts of the ECC code have no `MBEDTLS_xxx_ALT` sy…
30 …d Mbed TLS build must not include it. The granularity of mechanisms must work for typical use case…
32 [Req.drivers] If a PSA driver is available in the build, a suitably configured Mbed TLS build must …
34 …ssary to allow building an application and Mbed TLS in development environments that do not allow …
36 …able with future evolution of the PSA cryptography specifications and Mbed TLS. Therefore the inte…
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_tls_common.c2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
13 #include "crypto/tls.h"
47 return -1; in eap_tls_check_blob()
51 *data = blob->data; in eap_tls_check_blob()
52 *data_len = blob->len; in eap_tls_check_blob()
64 params->flags |= TLS_CONN_ALLOW_SIGN_RSA_MD5; in eap_tls_params_flags()
66 params->flags |= TLS_CONN_DISABLE_TIME_CHECKS; in eap_tls_params_flags()
68 params->flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
70 params->flags &= ~TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_tls_common.c2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
13 #include "crypto/tls.h"
47 return -1; in eap_tls_check_blob()
51 *data = blob->data; in eap_tls_check_blob()
52 *data_len = blob->len; in eap_tls_check_blob()
64 params->flags |= TLS_CONN_ALLOW_SIGN_RSA_MD5; in eap_tls_params_flags()
66 params->flags |= TLS_CONN_DISABLE_TIME_CHECKS; in eap_tls_params_flags()
68 params->flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
70 params->flags &= ~TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
[all …]
/third_party/python/Doc/library/
Dssl.rst1 :mod:`ssl` --- TLS/SSL wrapper for socket objects
5 :synopsis: TLS/SSL wrapper for socket objects
14 .. index:: TLS, SSL, Transport Layer Security, Secure Sockets Layer
16 --------------
20 sockets, both client-side and server-side. This module uses the OpenSSL
32 Don't use this module without reading the :ref:`ssl-security`. Doing so
38 general information about TLS, SSL, and certificates, the reader is referred to
42 :class:`socket.socket` type, and provides a socket-like wrapper that also
57 OpenSSL 0.9.8, 1.0.0 and 1.0.1 are deprecated and no longer supported.
70 ------------------------------------
[all …]
/third_party/node/test/parallel/
Dtest-tls-no-cert-required.js17 // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
28 const tls = require('tls'); constant
30 // Omitting the cert or pfx option to tls.createServer() should not throw.
31 // AECDH-NULL-SHA is a no-authentication/no-encryption cipher and hence
33 tls.createServer({ ciphers: 'AECDH-NULL-SHA' })
36 tls.createServer(assert.fail)
39 tls.createServer({})
43 () => tls.createServer('this is not valid'),
52 tls.createServer()
/third_party/openssl/doc/man3/
DSSL_CIPHER_get_name.pod20 - get SSL_CIPHER properties
49 has no standard name, it returns B<NULL>. If B<cipher> was defined in both
50 SSLv3 and TLS, it returns the TLS name.
53 If the B<stdname> is NULL, or B<stdname> has no corresponding OpenSSL name,
54 it returns "(NONE)". Where both exist, B<stdname> should be the TLS name rather
60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol
64 If there is no cipher (e.g. for cipher suites with no encryption) then
68 used by B<c> during record encryption/decryption. If there is no digest (e.g.
72 the SSL/TLS handshake when using the SSL_CIPHER B<c>. Note that this may be
76 used by B<c>. If there is no key exchange, then B<NID_undef> is returned.
[all …]
DSSL_get_error.pod5 SSL_get_error - obtain result code for TLS/SSL I/O operation
18 SSL_write_ex() or SSL_write() on B<ssl>. The value returned by that TLS/SSL I/O
23 used in the same thread that performed the TLS/SSL I/O operation, and no
25 thread's error queue must be empty before the TLS/SSL I/O operation is
30 Some TLS implementations do not send a close_notify alert on shutdown.
45 The TLS/SSL I/O operation completed. This result code is returned
50 The TLS/SSL peer has closed the connection for writing by sending the
52 No more data can be read.
81 There is no fixed upper limit for the number of iterations that
94 TLS/SSL I/O function should be retried.
[all …]
/third_party/mbedtls/tests/
Dssl-opt.sh3 # ssl-opt.sh
5 # Copyright The Mbed TLS Contributors
6 # SPDX-License-Identifier: Apache-2.0
12 # http://www.apache.org/licenses/LICENSE-2.0
22 # Executes tests to prove various TLS/SSL options and extensions.
33 set -u
37 ulimit -f 20971520
50 : ${GNUTLS_CLI:=gnutls-cli}
51 : ${GNUTLS_SERV:=gnutls-serv}
55 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then
[all …]
/third_party/libwebsockets/lib/tls/
Dtls-server.c2 * libwebsockets - small server side websockets and web server implementation
4 * Copyright (C) 2010 - 2019 Andy Green <andy@warmcat.com>
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
25 #include "private-lib-core.h"
35 lws_tls_check_all_cert_lifetimes(pt->context); in lws_sul_tls_cb()
37 __lws_sul_insert_us(&pt->pt_sul_owner[LWSSULLI_MISS_IF_SUSPENDED], in lws_sul_tls_cb()
38 &pt->sul_tls, in lws_sul_tls_cb()
46 struct lws_context *context = vhost->context; in lws_context_init_server_ssl()
47 lws_fakewsi_def_plwsa(&vhost->context->pt[0]); in lws_context_init_server_ssl()
49 lws_fakewsi_prep_plwsa_ctx(vhost->context); in lws_context_init_server_ssl()
[all …]
/third_party/libcoap/man/
Dcoap_tls_library.txt.in1 // -*- mode:doc; -*-
12 ----
21 - Work with CoAP TLS libraries
24 --------
41 For specific (D)TLS library support, link with
42 *-lcoap-@LIBCOAP_API_VERSION@-notls*, *-lcoap-@LIBCOAP_API_VERSION@-gnutls*,
43 *-lcoap-@LIBCOAP_API_VERSION@-openssl*, *-lcoap-@LIBCOAP_API_VERSION@-mbedtls*
44 or *-lcoap-@LIBCOAP_API_VERSION@-tinydtls*. Otherwise, link with
45 *-lcoap-@LIBCOAP_API_VERSION@* to get the default (D)TLS library support.
48 -----------
[all …]
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-ssl.c2 * libwebsockets - small server side websockets and web server implementation
4 * Copyright (C) 2010 - 2019 Andy Green <andy@warmcat.com>
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
25 #include "private-lib-core.h"
26 #include "private-lib-tls-openssl.h"
39 int np = -1; in lws_openssl_describe_cipher()
40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher()
55 if (!wsi->tls.ssl) in lws_ssl_get_error()
58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error()
59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error()
[all …]

12345678910>>...42