/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
TlsVersion.java | 25 TLS_1_2("TLSv1.2"), // 2008. 26 TLS_1_1("TLSv1.1"), // 2006. 27 TLS_1_0("TLSv1"), // 1999. 39 case "TLSv1.2": return TLS_1_2; 40 case "TLSv1.1": return TLS_1_1; 41 case "TLSv1": return TLS_1_0;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 2 * TLSv1 client - read handshake message 46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions", 52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); 62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); 66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", 68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", 87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len) [all...] |
tlsv1_record.c | 2 * TLSv1 Record Protocol 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC" [all...] |
tlsv1_client.c | 60 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 69 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 129 * @conn: TLSv1 client connection data from tlsv1_client_init() 161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data"); 199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to [all...] |
tlsv1_client_write.c | 2 * TLSv1 client - write handshake message 66 wpa_printf(MSG_INFO, "TLSv1: No TLS version allowed"); 70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)", 77 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 132 * SHA256 (and not the default SHA1) with TLSv1.2. 161 "TLSv1: Add status_request extension for OCSP stapling"); 197 "TLSv1: Add status_request_v2 extension for OCSP stapling"); 248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate") [all...] |
tlsv1_server.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf); 66 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 126 * @conn: TLSv1 server connection data from tlsv1_server_init() 142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not [all...] |
tlsv1_server_write.c | 2 * TLSv1 server - write handshake message 58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 71 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 173 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 228 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain [all...] |
tlsv1_cred.h | 2 * TLSv1 credentials
|
tlsv1_server_read.c | 2 * TLSv1 server - read handshake message 76 wpa_printf(MSG_DEBUG, "TLSv1: CertificateStatusType %u", status_type); 83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos); 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 252 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello [all...] |
tlsv1_cred.c | 2 * TLSv1 credentials 53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " 135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " 141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " 171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", 187 * @cred: TLSv1 credentials from tlsv1_cred_alloc( [all...] |
tlsv1_common.c | 2 * TLSv1 common routines 167 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate", 176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 " 197 wpa_printf(MSG_ERROR, "TLSv1: Failed to import " 440 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 442 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature"); 455 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature"); 462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature", 485 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-256"); 492 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-384") [all...] |
tlsv1_common.h | 2 * TLSv1 common definitions 14 #define TLS_VERSION_1 0x0301 /* TLSv1 */ 15 #define TLS_VERSION_1_1 0x0302 /* TLSv1.1 */ 16 #define TLS_VERSION_1_2 0x0303 /* TLSv1.2 */
|
tlsv1_record.h | 2 * TLSv1 Record Protocol
|
tlsv1_server_i.h | 2 * TLSv1 server - internal structures
|
tlsv1_client_i.h | 2 * TLSv1 client - internal structures
|
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
ProtocolVersionTest.java | 32 ProtocolVersion.getByName("TLSv1")); 34 ProtocolVersion.getByName("TLSv1"))); 51 assertEquals("TLSv1", 61 assertTrue(ProtocolVersion.isSupported("TLSv1")); 69 assertEquals("TLSv1", ProtocolVersion.getByName("TLSv1").name); 74 "SSLv2", "TLSv1", "SSLv3" }); 75 assertEquals("Incorrect protocol version", "TLSv1", ver.name);
|
/external/tlsdate/ |
TLSDATEPOOL | 22 Currently, the default protocol is TLSv1 unless otherwise specified. Fields may 23 include sslv2, sslv3, tlsv1, tlsv1.1, tlsv1.2, xmpp, pop3, imap and other
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_SSLVERSION.3 | 40 TLSv1.x 46 TLSv1.0 (Added in 7.34.0) 48 TLSv1.1 (Added in 7.34.0) 50 TLSv1.2 (Added in 7.34.0)
|
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 234 provide("SSLContext", "TLSv1"); 235 provide("SSLContext", "TLSv1.1"); 236 provide("SSLContext", "TLSv1.2"); 347 unprovide("SSLContext", "TLSv1.1"); 348 unprovide("SSLContext", "TLSv1.2"); 575 provideSslContextEnabledProtocols("SSL", TLSVersion.SSLv3, TLSVersion.TLSv1); 576 provideSslContextEnabledProtocols("SSLv3", TLSVersion.SSLv3, TLSVersion.TLSv1); 577 provideSslContextEnabledProtocols("TLS", TLSVersion.SSLv3, TLSVersion.TLSv1); 578 provideSslContextEnabledProtocols("TLSv1", TLSVersion.SSLv3, TLSVersion.TLSv1); [all...] |
/libcore/support/src/test/java/libcore/tlswire/util/ |
TlsProtocolVersion.java | 27 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0"); 28 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1"); 29 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
|
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 174 * This function is only used with internal TLSv1 implementation 187 * This function is only used with internal TLSv1 implementation 206 * This function is only used with internal TLSv1 implementation 229 * This function is only used with internal TLSv1 implementation 245 * This function is only used with internal TLSv1 implementation 260 * This function is only used with internal TLSv1 implementation 271 * This function is only used with internal TLSv1 implementation 291 * This function is only used with internal TLSv1 implementation 308 * This function is only used with internal TLSv1 implementation 326 * This function is only used with internal TLSv1 implementatio [all...] |
/docs/source.android.com/src/security/enhancements/ |
enhancements42.jd | 50 Cipher.RSA to use OpenSSL. Added SSL Socket support for TLSv1.1 and TLSv1.2
|
enhancements50.jd | 35 <li><strong>Updated cryptography for HTTPS and TLS/SSL.</strong> TLSv1.2 and 36 TLSv1.1 is now enabled, Forward Secrecy is now preferred, AES-GCM
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionImplTest.java | 42 session.protocol = ProtocolVersion.TLSv1; 43 assertEquals("Incorrect protocol", "TLSv1", session.getProtocol());
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLContextImpl.java | 162 public static class TLSv1 extends OpenSSLContextImpl { 163 public TLSv1() {
|