Home
last modified time | relevance | path

Searched refs:TLS (Results 1 – 25 of 315) sorted by relevance

12345678910>>...13

/freebsd/crypto/openssl/test/ssl-tests/
H A D20-cert-select.cnf22 test-17 = 17-TLS 1.2 Ed25519 Client Auth
23 test-18 = 18-TLS 1.2 Ed448 Client Auth
39 test-34 = 34-Only RSA-PSS Certificate, TLS v1.1
40 test-35 = 35-TLS 1.3 ECDSA Signature Algorithm Selection
41 test-36 = 36-TLS 1.3 ECDSA Signature Algorithm Selection compressed point
42 test-37 = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1
43 test-38 = 38-TLS 1.3 ECDSA Signature Algorithm Selection with PSS
44 test-39 = 39-TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS
45 test-40 = 40-TLS 1.3 ECDSA Signature Algorithm Selection, no ECDSA certificate
46 test-41 = 41-TLS 1.
[all...]
H A D17-renegotiate.cnf.in27 "Method" => "TLS",
40 "Method" => "TLS",
54 "Method" => "TLS",
67 "Method" => "TLS",
86 "Method" => "TLS",
105 "Method" => "TLS",
122 "Method" => "TLS",
143 "Method" => "TLS",
162 "Method" => "TLS",
181 "Method" => "TLS",
[all …]
H A D20-cert-select.cnf.in75 # Note: certificate_authorities not sent for TLS < 1.3
99 # Note: certificate_authorities not sent for TLS < 1.3
308 # Note: certificate_authorities not sent for TLS < 1.3
326 # Note: certificate_authorities not sent for TLS < 1.3
332 name => "TLS 1.2 Ed25519 Client Auth",
350 name => "TLS 1.2 Ed448 Client Auth",
409 # Note: certificate_authorities not sent for TLS < 1.3
587 name => "Only RSA-PSS Certificate, TLS v1.1",
635 name => "TLS 1.3 ECDSA Signature Algorithm Selection",
649 name => "TLS 1.
[all...]
H A D17-renegotiate.cnf47 Method = TLS
74 Method = TLS
102 Method = TLS
129 Method = TLS
161 Method = TLS
193 Method = TLS
221 Method = TLS
249 Method = TLS
281 Method = TLS
313 Method = TLS
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt56 EAP-TLS + + + + + + + + - - + +
61 EAP-PEAPv0/TLS + + - + + + F + - - + +
72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + +
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
107 EAP-FAST/TLS(aprov) - - - - - - - - - - + +
112 EAP-FAST/TLS(auth) - - - - - - - - - - + +
145 - EAP-TLS
149 - EAP-PEAPv0 / TLS
153 - EAP-TTLS / EAP-TLS
163 - EAP-TLS
[all …]
/freebsd/contrib/wpa/hostapd/
H A Deap_testing.txt21 EAP-TLS + + +1 + +
25 EAP-PEAPv0/TLS + F - + +
35 EAP-PEAPv1/TLS + F - - +
49 EAP-TTLS/EAP-TLS + F - - -
63 EAP-FAST/TLS(aprov) + - - - -
68 EAP-FAST/TLS(auth) + - - - -
75 1) EAP-TLS itself worked, but peer certificate validation failed at
76 least when using the internal TLS server (peer included incorrect
H A Dhostapd.eap_user19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
27 # avoid having to configure every certificate for EAP-TLS authentication. The
61 "example user" TLS
72 "0"* AKA,TTLS,TLS,PEAP,SIM
73 "1"* SIM,TTLS,TLS,PEAP,AKA
74 "2"* AKA,TTLS,TLS,PEAP,SIM
75 "3"* SIM,TTLS,TLS,PEAP,AKA
76 "4"* AKA,TTLS,TLS,PEAP,SIM
77 "5"* SIM,TTLS,TLS,PEAP,AKA
83 * PEAP,TTLS,TLS,SIM,AKA
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/AsmPrinter/
H A DAddressPool.h26 bool TLS; member
28 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry()
43 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-TLS13_KDF.pod5 EVP_KDF-TLS13_KDF - The TLS 1.3 EVP_KDF implementation
9 Support for computing the TLS 1.3 version of the B<HKDF> KDF through
13 as used by TLS 1.3.
40 This parameter sets the label prefix on the specified TLS 1.3 KDF context.
41 For TLS 1.3 this should be set to the ASCII string "tls13 " without a
46 This parameter sets the label on the specified TLS 1.3 KDF context.
51 This parameter sets the context data on the specified TLS 1.3 KDF context.
56 This parameter sets the mode for the TLS 1.3 KDF operation.
86 This KDF is intended for use by the TLS 1.3 implementation in libssl.
93 A context for a TLS 1.3 KDF can be obtained by calling:
[all …]
H A Dssl.pod5 ssl - OpenSSL SSL/TLS library
20 TLS/SSL enabled connections (see L<SSL_CTX_new(3)>).
30 When the TLS/SSL handshake is performed using
34 used to read and write data on the TLS/SSL connection.
36 TLS/SSL connection.
53 are a core part of the SSL/TLS protocol. The available ciphers are configured
65 This is a structure containing the current TLS/SSL session details for a
70 This is the main SSL/TLS structure which is created by a server or client per
86 This is the common header file for the SSL/TLS API. Include it into your
H A DEVP_KDF-TLS1_PRF.pod11 The EVP_KDF-TLS1_PRF algorithm implements the PRF used by TLS versions up to
12 and including TLS 1.2.
34 associated with the TLS PRF.
36 PRF algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1.
40 This parameter sets the secret value of the TLS PRF.
47 this should be more than enough for any normal use of the TLS PRF.
53 A context for the TLS PRF can be obtained by calling:
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod7 TLS PRF key derivation algorithm
22 TLS. It has no associated private key and only implements key derivation
26 TLS PRF. EVP_md5_sha1() is treated as a special case which uses the PRF
27 algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1.
29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF
38 The TLS PRF also supports string based control operations using
49 A context for the TLS PRF can be obtained by calling:
57 be more than enough for any normal use of the TLS PRF.
61 the buffer to B<NULL> is not meaningful for the TLS PRF.
63 Optimised versions of the TLS PRF can be implemented in an ENGINE.
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
46 The TLS/SSL handshake was not successful but was shut down controlled and
47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
57 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_get_client_random.pod9 - get internal TLS/SSL random values and get/set master key
25 to the server during the initial SSL/TLS handshake. It copies as many
33 sent from the server to the client during the initial SSL/TLS handshake.
36 secret used to guarantee the security of the SSL/TLS session. This one
51 These functions expose internal values from the TLS handshake, for
58 were already generated and used in the TLS protocol. Using them
61 The security of your TLS session depends on keeping the master key secret:
67 In current versions of the TLS protocols, the length of client_random
70 in case of the unlikely event that a future version or variant of TLS
74 "random", many TLS implementations will generate four bytes of those
H A DSSL_do_handshake.pod5 SSL_do_handshake - perform a TLS/SSL handshake
15 SSL_do_handshake() will wait for a SSL/TLS handshake to take place. If the
47 The TLS/SSL handshake was not successful but was shut down controlled and
48 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
58 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_CTX_set_record_padding_callback.pod12 SSL_set_block_padding - install callback to specify TLS 1.3 record padding
34 for TLS 1.3 records. The value set in B<ctx> is copied to a new SSL by SSL_new().
35 Kernel TLS is not possible if the record padding callback is set, and the callback
36 function cannot be set if Kernel TLS is already configured for the current SSL object.
50 The B<type> parameter is the TLS record type that is being processed; may be
70 the callback function is not set because Kernel TLS is configured for the SSL object.
80 These functions only apply to TLS 1.3 records being written.
90 The record padding API was added for TLS 1.3 support in OpenSSL 1.1.1.
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
61 The TLS/SSL handshake was not successful but was shut down controlled and
62 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
72 The TLS/SSL handshake was not successful, because a fatal error occurred either
H A DSSL_get_error.pod5 SSL_get_error - obtain result code for TLS/SSL I/O operation
18 SSL_write_ex() or SSL_write() on B<ssl>. The value returned by that TLS/SSL I/O
23 used in the same thread that performed the TLS/SSL I/O operation, and no
25 thread's error queue must be empty before the TLS/SSL I/O operation is
30 Some TLS implementations do not send a close_notify alert on shutdown.
47 The TLS/SSL I/O operation completed. This result code is returned
52 The TLS/SSL peer has closed the connection for writing by sending the
96 TLS/SSL I/O function should be retried.
98 Caveat: Any TLS/SSL I/O function can lead to either of
104 TLS/SSL handshakes may occur at any time during the protocol (initiated by
[all …]
H A DOSSL_trace_enabled.pod111 OSSL_TRACE_BEGIN(TLS) {
115 } OSSL_TRACE_END(TLS);
131 OSSL_TRACE_BEGIN(TLS) {
134 OSSL_TRACE_CANCEL(TLS);
139 } OSSL_TRACE_END(TLS);
179 if (OSSL_TRACE_ENABLED(TLS)) {
201 OSSL_TRACE_BEGIN(TLS) {
206 } OSSL_TRACE_END(TLS);
214 if (OSSL_TRACE_ENABLED(TLS)) {
250 OSSL_TRACE_BEGIN(TLS) {
[all …]
H A DSSL_CIPHER_get_name.pod50 SSLv3 and TLS, it returns the TLS name.
54 it returns "(NONE)". Where both exist, B<stdname> should be the TLS name rather
60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol
72 the SSL/TLS handshake when using the SSL_CIPHER B<c>. Note that this may be
77 If any appropriate key exchange algorithm can be used (as in the case of TLS 1.3
88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive):
99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter
100 is usually retrieved from a TLS packet by using functions like
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protoco
[all...]
H A DSSL_CTX_new.pod14 - create a new SSL_CTX object as framework for TLS/SSL or DTLS enabled
77 configuration and data relevant to SSL/TLS or DTLS session establishment.
108 The SSL/(D)TLS implementation uses the L<X509_STORE_CTX_set_default(3)>
125 These are the general-purpose I<version-flexible> SSL/TLS methods.
143 A TLS/SSL connection established with these methods will only understand the
148 A TLS/SSL connection established with these methods will only understand the
153 A TLS/SSL connection established with these methods will only understand the
158 A TLS/SSL connection established with these methods will only understand the
194 allow newer protocols like TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3.
H A DSSL_CTX_set_ssl_version.pod6 - choose a new TLS/SSL method
20 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects
22 SSL_CTX object is retained, with the exception of the configured TLS ciphers,
30 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl>
33 SSL_get_ssl_method() returns a pointer to the TLS/SSL method
H A DSSL_get_peer_signature_nid.pod6 SSL_get_signature_nid, SSL_get_signature_type_nid - get TLS message signing
21 by the peer to sign TLS messages. It is implemented as a macro.
24 type used by the peer to sign TLS messages. Currently the signature type
37 uses RSA key exchange or is anonymous), the TLS version is below 1.2 or
/freebsd/contrib/libfido2/src/
H A Dlog.c21 #ifndef TLS
22 #define TLS macro
25 static TLS int logging;
26 static TLS fido_log_handler_t *log_handler;
/freebsd/sys/contrib/libsodium/m4/
H A Dax_tls.m411 # Provides a test for the compiler support of thread local storage (TLS)
12 # extensions. Defines TLS if it is found. Currently knows about C++11,
50 AC_MSG_CHECKING([for thread local storage (TLS) class])
71 …[AC_DEFINE_UNQUOTED([TLS],[$ac_cv_tls],[If the compiler supports a TLS storage class define it to …

12345678910>>...13