| /src/crypto/openssl/test/ssl-tests/ |
| H A D | 20-cert-select.cnf | 22 test-17 = 17-TLS 1.2 Ed25519 Client Auth 23 test-18 = 18-TLS 1.2 Ed448 Client Auth 39 test-34 = 34-Only RSA-PSS Certificate, TLS v1.1 40 test-35 = 35-TLS 1.3 ECDSA Signature Algorithm Selection 41 test-36 = 36-TLS 1.3 ECDSA Signature Algorithm Selection compressed point 42 test-37 = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1 43 test-38 = 38-TLS 1.3 ECDSA Signature Algorithm Selection with PSS 44 test-39 = 39-TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS 45 test-40 = 40-TLS 1.3 ECDSA Signature Algorithm Selection, no ECDSA certificate 46 test-41 = 41-TLS 1.3 RSA Signature Algorithm Selection, no PSS [all …]
|
| H A D | 17-renegotiate.cnf.in | 29 "Method" => "TLS", 42 "Method" => "TLS", 56 "Method" => "TLS", 69 "Method" => "TLS", 88 "Method" => "TLS", 107 "Method" => "TLS", 124 "Method" => "TLS", 145 "Method" => "TLS", 164 "Method" => "TLS", 183 "Method" => "TLS", [all …]
|
| H A D | 20-cert-select.cnf.in | 89 # Note: certificate_authorities not sent for TLS < 1.3 113 # Note: certificate_authorities not sent for TLS < 1.3 322 # Note: certificate_authorities not sent for TLS < 1.3 340 # Note: certificate_authorities not sent for TLS < 1.3 346 name => "TLS 1.2 Ed25519 Client Auth", 364 name => "TLS 1.2 Ed448 Client Auth", 423 # Note: certificate_authorities not sent for TLS < 1.3 601 name => "Only RSA-PSS Certificate, TLS v1.1", 654 name => "TLS 1.3 ECDSA Signature Algorithm Selection", 668 name => "TLS 1.3 ECDSA Signature Algorithm Selection compressed point", [all …]
|
| H A D | 17-renegotiate.cnf | 47 Method = TLS 74 Method = TLS 102 Method = TLS 129 Method = TLS 161 Method = TLS 193 Method = TLS 221 Method = TLS 249 Method = TLS 281 Method = TLS 313 Method = TLS [all …]
|
| /src/crypto/openssl/test/recipes/90-test_sslapi_data/ |
| H A D | ssltraceref.txt | 1 Sent TLS Record 3 Version = TLS 1.0 (0x301) 7 client_version=0x303 (TLS 1.2) 56 TLS 1.3 (772) 63 Received TLS Record 65 Version = TLS 1.2 (0x303) 69 server_version=0x303 (TLS 1.2) 78 TLS 1.3 (772) 83 Received TLS Record 85 Version = TLS 1.2 (0x303) [all …]
|
| H A D | ssltraceref-zlib.txt | 1 Sent TLS Record 3 Version = TLS 1.0 (0x301) 7 client_version=0x303 (TLS 1.2) 56 TLS 1.3 (772) 65 Received TLS Record 67 Version = TLS 1.2 (0x303) 71 server_version=0x303 (TLS 1.2) 80 TLS 1.3 (772) 85 Received TLS Record 87 Version = TLS 1.2 (0x303) [all …]
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | eap_testing.txt | 56 EAP-TLS + + + + + + + + - - + + 61 EAP-PEAPv0/TLS + + - + + + F + - - + + 72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + + 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 107 EAP-FAST/TLS(aprov) - - - - - - - - - - + + 112 EAP-FAST/TLS(auth) - - - - - - - - - - + + 145 - EAP-TLS 149 - EAP-PEAPv0 / TLS 153 - EAP-TTLS / EAP-TLS 163 - EAP-TLS [all …]
|
| /src/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-tls.md | 1 QUIC-TLS Handshake Integration 4 QUIC reuses the TLS handshake for the establishment of keys. It does not use 5 the standard TLS record layer and instead assumes responsibility for the 6 confidentiality and integrity of QUIC packets itself. Only the TLS handshake is 12 A QUIC-TLS handshake is managed by a QUIC_TLS object. This object provides 27 `SSL` object is initialised with an `SSL_CONNECTION` to represent the TLS 45 state of the QUIC-TLS handshake. On each call to `ossl_quic_tls_tick` newly 77 /* Called when a traffic secret is available for a given TLS protection level. */ 122 QUIC-TLS handshake when there is new CRYPTO frame data to be sent, or when it 125 When the TLS handshake generates secrets they will be communicated to the [all …]
|
| /src/contrib/wpa/hostapd/ |
| H A D | eap_testing.txt | 21 EAP-TLS + + +1 + + 25 EAP-PEAPv0/TLS + F - + + 35 EAP-PEAPv1/TLS + F - - + 49 EAP-TTLS/EAP-TLS + F - - - 63 EAP-FAST/TLS(aprov) + - - - - 68 EAP-FAST/TLS(auth) + - - - - 75 1) EAP-TLS itself worked, but peer certificate validation failed at 76 least when using the internal TLS server (peer included incorrect
|
| H A D | hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 27 # avoid having to configure every certificate for EAP-TLS authentication. The 61 "example user" TLS 72 "0"* AKA,TTLS,TLS,PEAP,SIM 73 "1"* SIM,TTLS,TLS,PEAP,AKA 74 "2"* AKA,TTLS,TLS,PEAP,SIM 75 "3"* SIM,TTLS,TLS,PEAP,AKA 76 "4"* AKA,TTLS,TLS,PEAP,SIM 77 "5"* SIM,TTLS,TLS,PEAP,AKA 83 * PEAP,TTLS,TLS,SIM,AKA
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_get_handshake_rtt.pod | 26 writing to the client. This is during the ServerFinished in TLS 1.3 and 27 ServerHelloDone in TLS 1.2. The other timestamp is taken when the server is 34 TLS 1.3 and after ServerHelloDone in TLS 1.2. 37 metric includes processing time on both endpoints, as this is based on TLS 38 protocol-level messages and the TLS protocol is not designed to measure 44 Returns 1 if the TLS handshake RTT is successfully retrieved. 45 Returns 0 if the TLS handshake RTT cannot be determined yet. 46 Returns -1 if, while retrieving the TLS handshake RTT, an error occurs.
|
| H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 7 TLS PRF key derivation algorithm 22 TLS. It has no associated private key and only implements key derivation 26 TLS PRF. EVP_md5_sha1() is treated as a special case which uses the PRF 27 algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1. 29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF 38 The TLS PRF also supports string based control operations using 49 A context for the TLS PRF can be obtained by calling: 57 be more than enough for any normal use of the TLS PRF. 61 the buffer to B<NULL> is not meaningful for the TLS PRF. 63 Optimised versions of the TLS PRF can be implemented in an ENGINE.
|
| H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 46 The TLS/SSL handshake was not successful but was shut down controlled and 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 57 The TLS/SSL handshake was not successful because a fatal error occurred either
|
| H A D | SSL_get_client_random.pod | 9 - get internal TLS/SSL random values and get/set master key 25 to the server during the initial SSL/TLS handshake. It copies as many 33 sent from the server to the client during the initial SSL/TLS handshake. 36 secret used to guarantee the security of the SSL/TLS session. This one 51 These functions expose internal values from the TLS handshake, for 58 were already generated and used in the TLS protocol. Using them 61 The security of your TLS session depends on keeping the master key secret: 67 In current versions of the TLS protocols, the length of client_random 70 in case of the unlikely event that a future version or variant of TLS 74 "random", many TLS implementations will generate four bytes of those
|
| H A D | SSL_do_handshake.pod | 5 SSL_do_handshake - perform a TLS/SSL handshake 15 SSL_do_handshake() will wait for an SSL/TLS handshake to take place. If the 47 The TLS/SSL handshake was not successful but was shut down controlled and 48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 58 The TLS/SSL handshake was not successful because a fatal error occurred either
|
| H A D | SSL_connect.pod | 5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server 15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication 61 The TLS/SSL handshake was not successful but was shut down controlled and 62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 72 The TLS/SSL handshake was not successful, because a fatal error occurred either
|
| /src/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/ |
| H A D | AddressPool.h | 26 bool TLS; member 28 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry() 43 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
|
| /src/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-quic-introduction.pod | 13 some OpenSSL and TLS fundamentals (see L<ossl-guide-libraries-introduction(7)> 21 TLS protocol for connection establishment but independently protects packets. 22 It provides similar security guarantees to TLS such as confidentiality, 38 client and server as is required when opening an additional TLS/TCP 50 transmitted without any waiting time. This is similar to TLS 1.3's 0-RTT 52 it is similar to a combination of TLS 1.3 0-RTT and TCP Fast Open. 62 allowing support for both TLS and DTLS-style use cases on a single connection. 82 A key difference between the TLS implementation and the QUIC implementation in 106 =head1 QUIC AND TLS 108 QUIC reuses parts of the TLS protocol in its implementation. Specifically the [all …]
|
| H A D | EVP_KDF-TLS13_KDF.pod | 5 EVP_KDF-TLS13_KDF - The TLS 1.3 EVP_KDF implementation 9 Support for computing the TLS 1.3 version of the B<HKDF> KDF through 13 as used by TLS 1.3. 40 This parameter sets the label prefix on the specified TLS 1.3 KDF context. 41 For TLS 1.3 this should be set to the ASCII string "tls13 " without a 46 This parameter sets the label on the specified TLS 1.3 KDF context. 51 This parameter sets the context data on the specified TLS 1.3 KDF context. 56 This parameter sets the mode for the TLS 1.3 KDF operation. 120 This KDF is intended for use by the TLS 1.3 implementation in libssl. 127 A context for a TLS 1.3 KDF can be obtained by calling: [all …]
|
| H A D | ossl-guide-tls-server-block.pod | 13 - OpenSSL Guide: Writing a simple blocking TLS server 15 =head1 SIMPLE BLOCKING TLS SERVER EXAMPLE 18 simple, non-concurrent, TLS "echo" server application which accepts one client 26 The complete source code for this example blocking TLS server is available in 32 already have some fundamental understanding of OpenSSL concepts and TLS (see 46 TLS server. This method will automatically use TLS version negotiation to select 60 We would also like to restrict the TLS versions that we are willing to accept to 61 TLSv1.2 or above. TLS protocol versions earlier than that are generally to be 66 * TLS versions older than TLS 1.2 are deprecated by IETF and SHOULD 72 errx(res, "Failed to set the minimum TLS protocol version"); [all …]
|
| H A D | ossl-guide-quic-client-block.pod | 24 already have some fundamental understanding of OpenSSL concepts, TLS and QUIC 30 tutorial will amend the blocking TLS client example that is covered in 46 In the TLS tutorial (L<ossl-guide-tls-client-block(7)>) we created an B<SSL_CTX> 48 TLS connection. A QUIC connection works in exactly the same way. We first create 52 As in the TLS example the first step is to create an B<SSL_CTX> object for our 75 The other setup steps that we applied to the B<SSL_CTX> for TLS also apply to 76 QUIC except for restricting the TLS versions that we are willing to accept. The 83 same way as for the TLS application. 87 A major difference between TLS and QUIC is the underlying transport protocol. 88 TLS uses TCP while QUIC uses UDP. The way that the QUIC socket is created in our [all …]
|
| /src/release/packages/ucl/ |
| H A D | openssl-all.ucl | 19 comment = "OpenSSL Transport Layer Security (TLS) library" 24 over a potentially insecure network. TLS is commonly used to secure Internet 27 OpenSSL provides openssl(1), a command-line utility used for testing TLS 28 clients and servers, managing certificate used in TLS authentication, and 33 the TLS protocol itself. 36 protocol, which was commonly used prior to the standardisation of TLS.
|
| /src/crypto/openssl/test/recipes/75-test_quicapi_data/ |
| H A D | ssltraceref-zlib.txt | 1 Sent TLS Record 3 Version = TLS 1.0 (0x301) 7 client_version=0x303 (TLS 1.2) 62 TLS 1.3 (772) 191 Received TLS Record 193 Version = TLS 1.2 (0x303) 200 Received TLS Record 202 Version = TLS 1.2 (0x303) 207 server_version=0x303 (TLS 1.2) 216 TLS 1.3 (772) [all …]
|
| H A D | ssltraceref.txt | 1 Sent TLS Record 3 Version = TLS 1.0 (0x301) 7 client_version=0x303 (TLS 1.2) 62 TLS 1.3 (772) 189 Received TLS Record 191 Version = TLS 1.2 (0x303) 198 Received TLS Record 200 Version = TLS 1.2 (0x303) 205 server_version=0x303 (TLS 1.2) 214 TLS 1.3 (772) [all …]
|
| /src/contrib/libfido2/src/ |
| H A D | log.c | 21 #ifndef TLS 22 #define TLS macro 25 static TLS int logging; 26 static TLS fido_log_handler_t *log_handler;
|