/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 22 test-17 = 17-TLS 1.2 Ed25519 Client Auth 23 test-18 = 18-TLS 1.2 Ed448 Client Auth 39 test-34 = 34-Only RSA-PSS Certificate, TLS v1.1 40 test-35 = 35-TLS 1.3 ECDSA Signature Algorithm Selection 41 test-36 = 36-TLS 1.3 ECDSA Signature Algorithm Selection compressed point 42 test-37 = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1 43 test-38 = 38-TLS 1.3 ECDSA Signature Algorithm Selection with PSS 44 test-39 = 39-TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS 45 test-40 = 40-TLS 1.3 ECDSA Signature Algorithm Selection, no ECDSA certificate 46 test-41 = 41-TLS 1. [all...] |
H A D | 17-renegotiate.cnf.in | 27 "Method" => "TLS", 40 "Method" => "TLS", 54 "Method" => "TLS", 67 "Method" => "TLS", 86 "Method" => "TLS", 105 "Method" => "TLS", 122 "Method" => "TLS", 143 "Method" => "TLS", 162 "Method" => "TLS", 181 "Method" => "TLS", [all …]
|
H A D | 20-cert-select.cnf.in | 75 # Note: certificate_authorities not sent for TLS < 1.3 99 # Note: certificate_authorities not sent for TLS < 1.3 308 # Note: certificate_authorities not sent for TLS < 1.3 326 # Note: certificate_authorities not sent for TLS < 1.3 332 name => "TLS 1.2 Ed25519 Client Auth", 350 name => "TLS 1.2 Ed448 Client Auth", 409 # Note: certificate_authorities not sent for TLS < 1.3 587 name => "Only RSA-PSS Certificate, TLS v1.1", 635 name => "TLS 1.3 ECDSA Signature Algorithm Selection", 649 name => "TLS 1. [all...] |
H A D | 17-renegotiate.cnf | 47 Method = TLS 74 Method = TLS 102 Method = TLS 129 Method = TLS 161 Method = TLS 193 Method = TLS 221 Method = TLS 249 Method = TLS 281 Method = TLS 313 Method = TLS [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | eap_testing.txt | 56 EAP-TLS + + + + + + + + - - + + 61 EAP-PEAPv0/TLS + + - + + + F + - - + + 72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + + 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 107 EAP-FAST/TLS(aprov) - - - - - - - - - - + + 112 EAP-FAST/TLS(auth) - - - - - - - - - - + + 145 - EAP-TLS 149 - EAP-PEAPv0 / TLS 153 - EAP-TTLS / EAP-TLS 163 - EAP-TLS [all …]
|
/freebsd/contrib/wpa/hostapd/ |
H A D | eap_testing.txt | 21 EAP-TLS + + +1 + + 25 EAP-PEAPv0/TLS + F - + + 35 EAP-PEAPv1/TLS + F - - + 49 EAP-TTLS/EAP-TLS + F - - - 63 EAP-FAST/TLS(aprov) + - - - - 68 EAP-FAST/TLS(auth) + - - - - 75 1) EAP-TLS itself worked, but peer certificate validation failed at 76 least when using the internal TLS server (peer included incorrect
|
H A D | hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 27 # avoid having to configure every certificate for EAP-TLS authentication. The 61 "example user" TLS 72 "0"* AKA,TTLS,TLS,PEAP,SIM 73 "1"* SIM,TTLS,TLS,PEAP,AKA 74 "2"* AKA,TTLS,TLS,PEAP,SIM 75 "3"* SIM,TTLS,TLS,PEAP,AKA 76 "4"* AKA,TTLS,TLS,PEAP,SIM 77 "5"* SIM,TTLS,TLS,PEAP,AKA 83 * PEAP,TTLS,TLS,SIM,AKA
|
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/ |
H A D | AddressPool.h | 26 bool TLS; member 28 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry() 43 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-TLS13_KDF.pod | 5 EVP_KDF-TLS13_KDF - The TLS 1.3 EVP_KDF implementation 9 Support for computing the TLS 1.3 version of the B<HKDF> KDF through 13 as used by TLS 1.3. 40 This parameter sets the label prefix on the specified TLS 1.3 KDF context. 41 For TLS 1.3 this should be set to the ASCII string "tls13 " without a 46 This parameter sets the label on the specified TLS 1.3 KDF context. 51 This parameter sets the context data on the specified TLS 1.3 KDF context. 56 This parameter sets the mode for the TLS 1.3 KDF operation. 86 This KDF is intended for use by the TLS 1.3 implementation in libssl. 93 A context for a TLS 1.3 KDF can be obtained by calling: [all …]
|
H A D | ssl.pod | 5 ssl - OpenSSL SSL/TLS library 20 TLS/SSL enabled connections (see L<SSL_CTX_new(3)>). 30 When the TLS/SSL handshake is performed using 34 used to read and write data on the TLS/SSL connection. 36 TLS/SSL connection. 53 are a core part of the SSL/TLS protocol. The available ciphers are configured 65 This is a structure containing the current TLS/SSL session details for a 70 This is the main SSL/TLS structure which is created by a server or client per 86 This is the common header file for the SSL/TLS API. Include it into your
|
H A D | EVP_KDF-TLS1_PRF.pod | 11 The EVP_KDF-TLS1_PRF algorithm implements the PRF used by TLS versions up to 12 and including TLS 1.2. 34 associated with the TLS PRF. 36 PRF algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1. 40 This parameter sets the secret value of the TLS PRF. 47 this should be more than enough for any normal use of the TLS PRF. 53 A context for the TLS PRF can be obtained by calling:
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 7 TLS PRF key derivation algorithm 22 TLS. It has no associated private key and only implements key derivation 26 TLS PRF. EVP_md5_sha1() is treated as a special case which uses the PRF 27 algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1. 29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF 38 The TLS PRF also supports string based control operations using 49 A context for the TLS PRF can be obtained by calling: 57 be more than enough for any normal use of the TLS PRF. 61 the buffer to B<NULL> is not meaningful for the TLS PRF. 63 Optimised versions of the TLS PRF can be implemented in an ENGINE.
|
H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 46 The TLS/SSL handshake was not successful but was shut down controlled and 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 57 The TLS/SSL handshake was not successful because a fatal error occurred either
|
H A D | SSL_get_client_random.pod | 9 - get internal TLS/SSL random values and get/set master key 25 to the server during the initial SSL/TLS handshake. It copies as many 33 sent from the server to the client during the initial SSL/TLS handshake. 36 secret used to guarantee the security of the SSL/TLS session. This one 51 These functions expose internal values from the TLS handshake, for 58 were already generated and used in the TLS protocol. Using them 61 The security of your TLS session depends on keeping the master key secret: 67 In current versions of the TLS protocols, the length of client_random 70 in case of the unlikely event that a future version or variant of TLS 74 "random", many TLS implementations will generate four bytes of those
|
H A D | SSL_do_handshake.pod | 5 SSL_do_handshake - perform a TLS/SSL handshake 15 SSL_do_handshake() will wait for a SSL/TLS handshake to take place. If the 47 The TLS/SSL handshake was not successful but was shut down controlled and 48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 58 The TLS/SSL handshake was not successful because a fatal error occurred either
|
H A D | SSL_CTX_set_record_padding_callback.pod | 12 SSL_set_block_padding - install callback to specify TLS 1.3 record padding 34 for TLS 1.3 records. The value set in B<ctx> is copied to a new SSL by SSL_new(). 35 Kernel TLS is not possible if the record padding callback is set, and the callback 36 function cannot be set if Kernel TLS is already configured for the current SSL object. 50 The B<type> parameter is the TLS record type that is being processed; may be 70 the callback function is not set because Kernel TLS is configured for the SSL object. 80 These functions only apply to TLS 1.3 records being written. 90 The record padding API was added for TLS 1.3 support in OpenSSL 1.1.1.
|
H A D | SSL_connect.pod | 5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server 15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication 61 The TLS/SSL handshake was not successful but was shut down controlled and 62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 72 The TLS/SSL handshake was not successful, because a fatal error occurred either
|
H A D | SSL_get_error.pod | 5 SSL_get_error - obtain result code for TLS/SSL I/O operation 18 SSL_write_ex() or SSL_write() on B<ssl>. The value returned by that TLS/SSL I/O 23 used in the same thread that performed the TLS/SSL I/O operation, and no 25 thread's error queue must be empty before the TLS/SSL I/O operation is 30 Some TLS implementations do not send a close_notify alert on shutdown. 47 The TLS/SSL I/O operation completed. This result code is returned 52 The TLS/SSL peer has closed the connection for writing by sending the 96 TLS/SSL I/O function should be retried. 98 Caveat: Any TLS/SSL I/O function can lead to either of 104 TLS/SSL handshakes may occur at any time during the protocol (initiated by [all …]
|
H A D | OSSL_trace_enabled.pod | 111 OSSL_TRACE_BEGIN(TLS) { 115 } OSSL_TRACE_END(TLS); 131 OSSL_TRACE_BEGIN(TLS) { 134 OSSL_TRACE_CANCEL(TLS); 139 } OSSL_TRACE_END(TLS); 179 if (OSSL_TRACE_ENABLED(TLS)) { 201 OSSL_TRACE_BEGIN(TLS) { 206 } OSSL_TRACE_END(TLS); 214 if (OSSL_TRACE_ENABLED(TLS)) { 250 OSSL_TRACE_BEGIN(TLS) { [all …]
|
H A D | SSL_CIPHER_get_name.pod | 50 SSLv3 and TLS, it returns the TLS name. 54 it returns "(NONE)". Where both exist, B<stdname> should be the TLS name rather 60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol 72 the SSL/TLS handshake when using the SSL_CIPHER B<c>. Note that this may be 77 If any appropriate key exchange algorithm can be used (as in the case of TLS 1.3 88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive): 99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter 100 is usually retrieved from a TLS packet by using functions like 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protoco [all...] |
H A D | SSL_CTX_new.pod | 14 - create a new SSL_CTX object as framework for TLS/SSL or DTLS enabled 77 configuration and data relevant to SSL/TLS or DTLS session establishment. 108 The SSL/(D)TLS implementation uses the L<X509_STORE_CTX_set_default(3)> 125 These are the general-purpose I<version-flexible> SSL/TLS methods. 143 A TLS/SSL connection established with these methods will only understand the 148 A TLS/SSL connection established with these methods will only understand the 153 A TLS/SSL connection established with these methods will only understand the 158 A TLS/SSL connection established with these methods will only understand the 194 allow newer protocols like TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3.
|
H A D | SSL_CTX_set_ssl_version.pod | 6 - choose a new TLS/SSL method 20 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects 22 SSL_CTX object is retained, with the exception of the configured TLS ciphers, 30 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl> 33 SSL_get_ssl_method() returns a pointer to the TLS/SSL method
|
H A D | SSL_get_peer_signature_nid.pod | 6 SSL_get_signature_nid, SSL_get_signature_type_nid - get TLS message signing 21 by the peer to sign TLS messages. It is implemented as a macro. 24 type used by the peer to sign TLS messages. Currently the signature type 37 uses RSA key exchange or is anonymous), the TLS version is below 1.2 or
|
/freebsd/contrib/libfido2/src/ |
H A D | log.c | 21 #ifndef TLS 22 #define TLS macro 25 static TLS int logging; 26 static TLS fido_log_handler_t *log_handler;
|
/freebsd/sys/contrib/libsodium/m4/ |
H A D | ax_tls.m4 | 11 # Provides a test for the compiler support of thread local storage (TLS) 12 # extensions. Defines TLS if it is found. Currently knows about C++11, 50 AC_MSG_CHECKING([for thread local storage (TLS) class]) 71 …[AC_DEFINE_UNQUOTED([TLS],[$ac_cv_tls],[If the compiler supports a TLS storage class define it to …
|