Home
last modified time | relevance | path

Searched refs:TLS (Results 1 – 25 of 406) sorted by relevance

12345678910>>...17

/src/crypto/openssl/test/ssl-tests/
H A D20-cert-select.cnf22 test-17 = 17-TLS 1.2 Ed25519 Client Auth
23 test-18 = 18-TLS 1.2 Ed448 Client Auth
39 test-34 = 34-Only RSA-PSS Certificate, TLS v1.1
40 test-35 = 35-TLS 1.3 ECDSA Signature Algorithm Selection
41 test-36 = 36-TLS 1.3 ECDSA Signature Algorithm Selection compressed point
42 test-37 = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1
43 test-38 = 38-TLS 1.3 ECDSA Signature Algorithm Selection with PSS
44 test-39 = 39-TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS
45 test-40 = 40-TLS 1.3 ECDSA Signature Algorithm Selection, no ECDSA certificate
46 test-41 = 41-TLS 1.3 RSA Signature Algorithm Selection, no PSS
[all …]
H A D17-renegotiate.cnf.in29 "Method" => "TLS",
42 "Method" => "TLS",
56 "Method" => "TLS",
69 "Method" => "TLS",
88 "Method" => "TLS",
107 "Method" => "TLS",
124 "Method" => "TLS",
145 "Method" => "TLS",
164 "Method" => "TLS",
183 "Method" => "TLS",
[all …]
H A D20-cert-select.cnf.in89 # Note: certificate_authorities not sent for TLS < 1.3
113 # Note: certificate_authorities not sent for TLS < 1.3
322 # Note: certificate_authorities not sent for TLS < 1.3
340 # Note: certificate_authorities not sent for TLS < 1.3
346 name => "TLS 1.2 Ed25519 Client Auth",
364 name => "TLS 1.2 Ed448 Client Auth",
423 # Note: certificate_authorities not sent for TLS < 1.3
601 name => "Only RSA-PSS Certificate, TLS v1.1",
654 name => "TLS 1.3 ECDSA Signature Algorithm Selection",
668 name => "TLS 1.3 ECDSA Signature Algorithm Selection compressed point",
[all …]
H A D17-renegotiate.cnf47 Method = TLS
74 Method = TLS
102 Method = TLS
129 Method = TLS
161 Method = TLS
193 Method = TLS
221 Method = TLS
249 Method = TLS
281 Method = TLS
313 Method = TLS
[all …]
/src/crypto/openssl/test/recipes/90-test_sslapi_data/
H A Dssltraceref.txt1 Sent TLS Record
3 Version = TLS 1.0 (0x301)
7 client_version=0x303 (TLS 1.2)
56 TLS 1.3 (772)
63 Received TLS Record
65 Version = TLS 1.2 (0x303)
69 server_version=0x303 (TLS 1.2)
78 TLS 1.3 (772)
83 Received TLS Record
85 Version = TLS 1.2 (0x303)
[all …]
H A Dssltraceref-zlib.txt1 Sent TLS Record
3 Version = TLS 1.0 (0x301)
7 client_version=0x303 (TLS 1.2)
56 TLS 1.3 (772)
65 Received TLS Record
67 Version = TLS 1.2 (0x303)
71 server_version=0x303 (TLS 1.2)
80 TLS 1.3 (772)
85 Received TLS Record
87 Version = TLS 1.2 (0x303)
[all …]
/src/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt56 EAP-TLS + + + + + + + + - - + +
61 EAP-PEAPv0/TLS + + - + + + F + - - + +
72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + +
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
107 EAP-FAST/TLS(aprov) - - - - - - - - - - + +
112 EAP-FAST/TLS(auth) - - - - - - - - - - + +
145 - EAP-TLS
149 - EAP-PEAPv0 / TLS
153 - EAP-TTLS / EAP-TLS
163 - EAP-TLS
[all …]
/src/crypto/openssl/doc/designs/quic-design/
H A Dquic-tls.md1 QUIC-TLS Handshake Integration
4 QUIC reuses the TLS handshake for the establishment of keys. It does not use
5 the standard TLS record layer and instead assumes responsibility for the
6 confidentiality and integrity of QUIC packets itself. Only the TLS handshake is
12 A QUIC-TLS handshake is managed by a QUIC_TLS object. This object provides
27 `SSL` object is initialised with an `SSL_CONNECTION` to represent the TLS
45 state of the QUIC-TLS handshake. On each call to `ossl_quic_tls_tick` newly
77 /* Called when a traffic secret is available for a given TLS protection level. */
122 QUIC-TLS handshake when there is new CRYPTO frame data to be sent, or when it
125 When the TLS handshake generates secrets they will be communicated to the
[all …]
/src/contrib/wpa/hostapd/
H A Deap_testing.txt21 EAP-TLS + + +1 + +
25 EAP-PEAPv0/TLS + F - + +
35 EAP-PEAPv1/TLS + F - - +
49 EAP-TTLS/EAP-TLS + F - - -
63 EAP-FAST/TLS(aprov) + - - - -
68 EAP-FAST/TLS(auth) + - - - -
75 1) EAP-TLS itself worked, but peer certificate validation failed at
76 least when using the internal TLS server (peer included incorrect
H A Dhostapd.eap_user19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
27 # avoid having to configure every certificate for EAP-TLS authentication. The
61 "example user" TLS
72 "0"* AKA,TTLS,TLS,PEAP,SIM
73 "1"* SIM,TTLS,TLS,PEAP,AKA
74 "2"* AKA,TTLS,TLS,PEAP,SIM
75 "3"* SIM,TTLS,TLS,PEAP,AKA
76 "4"* AKA,TTLS,TLS,PEAP,SIM
77 "5"* SIM,TTLS,TLS,PEAP,AKA
83 * PEAP,TTLS,TLS,SIM,AKA
/src/crypto/openssl/doc/man3/
H A DSSL_get_handshake_rtt.pod26 writing to the client. This is during the ServerFinished in TLS 1.3 and
27 ServerHelloDone in TLS 1.2. The other timestamp is taken when the server is
34 TLS 1.3 and after ServerHelloDone in TLS 1.2.
37 metric includes processing time on both endpoints, as this is based on TLS
38 protocol-level messages and the TLS protocol is not designed to measure
44 Returns 1 if the TLS handshake RTT is successfully retrieved.
45 Returns 0 if the TLS handshake RTT cannot be determined yet.
46 Returns -1 if, while retrieving the TLS handshake RTT, an error occurs.
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod7 TLS PRF key derivation algorithm
22 TLS. It has no associated private key and only implements key derivation
26 TLS PRF. EVP_md5_sha1() is treated as a special case which uses the PRF
27 algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1.
29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF
38 The TLS PRF also supports string based control operations using
49 A context for the TLS PRF can be obtained by calling:
57 be more than enough for any normal use of the TLS PRF.
61 the buffer to B<NULL> is not meaningful for the TLS PRF.
63 Optimised versions of the TLS PRF can be implemented in an ENGINE.
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
46 The TLS/SSL handshake was not successful but was shut down controlled and
47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
57 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_get_client_random.pod9 - get internal TLS/SSL random values and get/set master key
25 to the server during the initial SSL/TLS handshake. It copies as many
33 sent from the server to the client during the initial SSL/TLS handshake.
36 secret used to guarantee the security of the SSL/TLS session. This one
51 These functions expose internal values from the TLS handshake, for
58 were already generated and used in the TLS protocol. Using them
61 The security of your TLS session depends on keeping the master key secret:
67 In current versions of the TLS protocols, the length of client_random
70 in case of the unlikely event that a future version or variant of TLS
74 "random", many TLS implementations will generate four bytes of those
H A DSSL_do_handshake.pod5 SSL_do_handshake - perform a TLS/SSL handshake
15 SSL_do_handshake() will wait for an SSL/TLS handshake to take place. If the
47 The TLS/SSL handshake was not successful but was shut down controlled and
48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
58 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
61 The TLS/SSL handshake was not successful but was shut down controlled and
62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
72 The TLS/SSL handshake was not successful, because a fatal error occurred either
/src/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/
H A DAddressPool.h26 bool TLS; member
28 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry()
43 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
/src/crypto/openssl/doc/man7/
H A Dossl-guide-quic-introduction.pod13 some OpenSSL and TLS fundamentals (see L<ossl-guide-libraries-introduction(7)>
21 TLS protocol for connection establishment but independently protects packets.
22 It provides similar security guarantees to TLS such as confidentiality,
38 client and server as is required when opening an additional TLS/TCP
50 transmitted without any waiting time. This is similar to TLS 1.3's 0-RTT
52 it is similar to a combination of TLS 1.3 0-RTT and TCP Fast Open.
62 allowing support for both TLS and DTLS-style use cases on a single connection.
82 A key difference between the TLS implementation and the QUIC implementation in
106 =head1 QUIC AND TLS
108 QUIC reuses parts of the TLS protocol in its implementation. Specifically the
[all …]
H A DEVP_KDF-TLS13_KDF.pod5 EVP_KDF-TLS13_KDF - The TLS 1.3 EVP_KDF implementation
9 Support for computing the TLS 1.3 version of the B<HKDF> KDF through
13 as used by TLS 1.3.
40 This parameter sets the label prefix on the specified TLS 1.3 KDF context.
41 For TLS 1.3 this should be set to the ASCII string "tls13 " without a
46 This parameter sets the label on the specified TLS 1.3 KDF context.
51 This parameter sets the context data on the specified TLS 1.3 KDF context.
56 This parameter sets the mode for the TLS 1.3 KDF operation.
120 This KDF is intended for use by the TLS 1.3 implementation in libssl.
127 A context for a TLS 1.3 KDF can be obtained by calling:
[all …]
H A Dossl-guide-tls-server-block.pod13 - OpenSSL Guide: Writing a simple blocking TLS server
15 =head1 SIMPLE BLOCKING TLS SERVER EXAMPLE
18 simple, non-concurrent, TLS "echo" server application which accepts one client
26 The complete source code for this example blocking TLS server is available in
32 already have some fundamental understanding of OpenSSL concepts and TLS (see
46 TLS server. This method will automatically use TLS version negotiation to select
60 We would also like to restrict the TLS versions that we are willing to accept to
61 TLSv1.2 or above. TLS protocol versions earlier than that are generally to be
66 * TLS versions older than TLS 1.2 are deprecated by IETF and SHOULD
72 errx(res, "Failed to set the minimum TLS protocol version");
[all …]
H A Dossl-guide-quic-client-block.pod24 already have some fundamental understanding of OpenSSL concepts, TLS and QUIC
30 tutorial will amend the blocking TLS client example that is covered in
46 In the TLS tutorial (L<ossl-guide-tls-client-block(7)>) we created an B<SSL_CTX>
48 TLS connection. A QUIC connection works in exactly the same way. We first create
52 As in the TLS example the first step is to create an B<SSL_CTX> object for our
75 The other setup steps that we applied to the B<SSL_CTX> for TLS also apply to
76 QUIC except for restricting the TLS versions that we are willing to accept. The
83 same way as for the TLS application.
87 A major difference between TLS and QUIC is the underlying transport protocol.
88 TLS uses TCP while QUIC uses UDP. The way that the QUIC socket is created in our
[all …]
/src/release/packages/ucl/
H A Dopenssl-all.ucl19 comment = "OpenSSL Transport Layer Security (TLS) library"
24 over a potentially insecure network. TLS is commonly used to secure Internet
27 OpenSSL provides openssl(1), a command-line utility used for testing TLS
28 clients and servers, managing certificate used in TLS authentication, and
33 the TLS protocol itself.
36 protocol, which was commonly used prior to the standardisation of TLS.
/src/crypto/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref-zlib.txt1 Sent TLS Record
3 Version = TLS 1.0 (0x301)
7 client_version=0x303 (TLS 1.2)
62 TLS 1.3 (772)
191 Received TLS Record
193 Version = TLS 1.2 (0x303)
200 Received TLS Record
202 Version = TLS 1.2 (0x303)
207 server_version=0x303 (TLS 1.2)
216 TLS 1.3 (772)
[all …]
H A Dssltraceref.txt1 Sent TLS Record
3 Version = TLS 1.0 (0x301)
7 client_version=0x303 (TLS 1.2)
62 TLS 1.3 (772)
189 Received TLS Record
191 Version = TLS 1.2 (0x303)
198 Received TLS Record
200 Version = TLS 1.2 (0x303)
205 server_version=0x303 (TLS 1.2)
214 TLS 1.3 (772)
[all …]
/src/contrib/libfido2/src/
H A Dlog.c21 #ifndef TLS
22 #define TLS macro
25 static TLS int logging;
26 static TLS fido_log_handler_t *log_handler;

12345678910>>...17