HomeSort by relevance Sort by last modified time
    Searched full:tlsv1 (Results 1 - 25 of 110) sorted by null

1 2 3 4 5

  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
TlsVersion.java 25 TLS_1_2("TLSv1.2"), // 2008.
26 TLS_1_1("TLSv1.1"), // 2006.
27 TLS_1_0("TLSv1"), // 1999.
39 case "TLSv1.2": return TLS_1_2;
40 case "TLSv1.1": return TLS_1_1;
41 case "TLSv1": return TLS_1_0;
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 2 * TLSv1 client - read handshake message
46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions",
52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header");
62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension");
66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u",
68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data",
87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len)
    [all...]
tlsv1_record.c 2 * TLSv1 Record Protocol
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC"
    [all...]
tlsv1_client.c 60 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
69 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
129 * @conn: TLSv1 client connection data from tlsv1_client_init()
161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data");
199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to
    [all...]
tlsv1_client_write.c 2 * TLSv1 client - write handshake message
66 wpa_printf(MSG_INFO, "TLSv1: No TLS version allowed");
70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)",
77 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
132 * SHA256 (and not the default SHA1) with TLSv1.2.
161 "TLSv1: Add status_request extension for OCSP stapling");
197 "TLSv1: Add status_request_v2 extension for OCSP stapling");
248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate")
    [all...]
tlsv1_server.c 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf);
66 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
126 * @conn: TLSv1 server connection data from tlsv1_server_init()
142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not
    [all...]
tlsv1_server_write.c 2 * TLSv1 server - write handshake message
58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
71 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
173 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
228 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain
    [all...]
tlsv1_cred.h 2 * TLSv1 credentials
tlsv1_server_read.c 2 * TLSv1 server - read handshake message
76 wpa_printf(MSG_DEBUG, "TLSv1: CertificateStatusType %u", status_type);
83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos);
165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len);
204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos);
223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites",
252 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods",
331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello
    [all...]
tlsv1_cred.c 2 * TLSv1 credentials
53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM "
135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM "
141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM "
171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
187 * @cred: TLSv1 credentials from tlsv1_cred_alloc(
    [all...]
tlsv1_common.c 2 * TLSv1 common routines
167 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate",
176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 "
197 wpa_printf(MSG_ERROR, "TLSv1: Failed to import "
440 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos);
442 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature");
455 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature");
462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
485 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-256");
492 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-384")
    [all...]
tlsv1_common.h 2 * TLSv1 common definitions
14 #define TLS_VERSION_1 0x0301 /* TLSv1 */
15 #define TLS_VERSION_1_1 0x0302 /* TLSv1.1 */
16 #define TLS_VERSION_1_2 0x0303 /* TLSv1.2 */
tlsv1_record.h 2 * TLSv1 Record Protocol
tlsv1_server_i.h 2 * TLSv1 server - internal structures
  /external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/
ProtocolVersionTest.java 32 ProtocolVersion.getByName("TLSv1"));
34 ProtocolVersion.getByName("TLSv1")));
51 assertEquals("TLSv1",
61 assertTrue(ProtocolVersion.isSupported("TLSv1"));
69 assertEquals("TLSv1", ProtocolVersion.getByName("TLSv1").name);
74 "SSLv2", "TLSv1", "SSLv3" });
75 assertEquals("Incorrect protocol version", "TLSv1", ver.name);
  /external/tlsdate/
TLSDATEPOOL 22 Currently, the default protocol is TLSv1 unless otherwise specified. Fields may
23 include sslv2, sslv3, tlsv1, tlsv1.1, tlsv1.2, xmpp, pop3, imap and other
  /external/curl/docs/libcurl/opts/
CURLOPT_SSLVERSION.3 40 TLSv1.x
46 TLSv1.0 (Added in 7.34.0)
48 TLSv1.1 (Added in 7.34.0)
50 TLSv1.2 (Added in 7.34.0)
  /libcore/support/src/test/java/libcore/java/security/
StandardNames.java 234 provide("SSLContext", "TLSv1");
235 provide("SSLContext", "TLSv1.1");
236 provide("SSLContext", "TLSv1.2");
347 unprovide("SSLContext", "TLSv1.1");
348 unprovide("SSLContext", "TLSv1.2");
575 provideSslContextEnabledProtocols("SSL", TLSVersion.SSLv3, TLSVersion.TLSv1);
576 provideSslContextEnabledProtocols("SSLv3", TLSVersion.SSLv3, TLSVersion.TLSv1);
577 provideSslContextEnabledProtocols("TLS", TLSVersion.SSLv3, TLSVersion.TLSv1);
578 provideSslContextEnabledProtocols("TLSv1", TLSVersion.SSLv3, TLSVersion.TLSv1);
    [all...]
  /libcore/support/src/test/java/libcore/tlswire/util/
TlsProtocolVersion.java 27 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0");
28 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1");
29 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
  /libcore/ojluni/src/main/java/sun/security/ssl/
SunJSSE.java 63 "(PKCS12, SunX509 key/trust factories, SSLv3, TLSv1)";
208 put("SSLContext.TLSv1",
210 put("Alg.Alias.SSLContext.TLS", "TLSv1");
212 put("Alg.Alias.SSLContext.SSL", "TLSv1");
213 put("Alg.Alias.SSLContext.SSLv3", "TLSv1");
216 put("SSLContext.TLSv1.1",
218 put("SSLContext.TLSv1.2",
ProtocolVersion.java 67 final static ProtocolVersion TLS10 = new ProtocolVersion(0x0301, "TLSv1");
70 final static ProtocolVersion TLS11 = new ProtocolVersion(0x0302, "TLSv1.1");
73 final static ProtocolVersion TLS12 = new ProtocolVersion(0x0303, "TLSv1.2");
96 // name used in JSSE (e.g. TLSv1 for TLS 1.0)
  /external/wpa_supplicant_8/src/crypto/
crypto.h 174 * This function is only used with internal TLSv1 implementation
187 * This function is only used with internal TLSv1 implementation
206 * This function is only used with internal TLSv1 implementation
229 * This function is only used with internal TLSv1 implementation
245 * This function is only used with internal TLSv1 implementation
260 * This function is only used with internal TLSv1 implementation
271 * This function is only used with internal TLSv1 implementation
291 * This function is only used with internal TLSv1 implementation
308 * This function is only used with internal TLSv1 implementation
326 * This function is only used with internal TLSv1 implementatio
    [all...]
  /docs/source.android.com/src/security/enhancements/
enhancements42.jd 50 Cipher.RSA to use OpenSSL. Added SSL Socket support for TLSv1.1 and TLSv1.2
enhancements50.jd 35 <li><strong>Updated cryptography for HTTPS and TLS/SSL.</strong> TLSv1.2 and
36 TLSv1.1 is now enabled, Forward Secrecy is now preferred, AES-GCM
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
SSLSessionImplTest.java 42 session.protocol = ProtocolVersion.TLSv1;
43 assertEquals("Incorrect protocol", "TLSv1", session.getProtocol());

Completed in 354 milliseconds

1 2 3 4 5