/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 2 * WPA Supplicant / Crypto wrapper for LibTomCrypt (for internal TLSv1) 680 wpa_printf(MSG_ERROR, "TLSv1: Failed to register "
|
tls_internal.c | 9 * integrated TLSv1 implementation.
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLProvider.java | 70 put("SSLContext.TLSv1", classOpenSSLContextImpl + "$TLSv1"); 71 put("SSLContext.TLSv1.1", classOpenSSLContextImpl + "$TLSv11"); 72 put("SSLContext.TLSv1.2", tls12SSLContext);
|
SslWrapper.java | 364 // with TLSv1 and SSLv3).
|
/external/curl/lib/vtls/ |
gskit.c | 378 /* Try to set-up TLSv1.1 and TLSv2.1 ciphers. */ 385 failf(data, "TLSv1.1-only ciphers are not yet supported"); 396 failf(data, "TLSv1.2-only ciphers are not yet supported"); 402 /* Try to set-up TLSv1.0 ciphers. If not successful, concatenate them to [all...] |
openssl.c | [all...] |
axtls.c | 159 /* axTLS only supports TLSv1 */ 202 * 3) set protocol priority. axTLS is TLSv1 only, so can probably ignore
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
SSLServerSocket.java | 281 * enabled protocol versions. For example, enabling TLSv1.2 and TLSv1 282 * will result in connections only being able to use TLSv1.
|
SSLEngine.java | 389 * <td>TLSv1</td> 394 * <td>TLSv1.1</td> 399 * <td>TLSv1.2</td> [all...] |
/external/curl/src/ |
tool_getparam.c | 190 {"1", "tlsv1", FALSE}, 191 {"10", "tlsv1.0", FALSE}, 192 {"11", "tlsv1.1", FALSE}, 193 {"12", "tlsv1.2", FALSE}, 194 {"13", "tlsv1.3", FALSE}, 248 {"E9", "proxy-tlsv1", FALSE}, [all...] |
/external/boringssl/src/ssl/ |
ssl_cipher.cc | 620 /* Legacy protocol minimum version aliases. "TLSv1" is intentionally the 623 {"TLSv1", ~0u, ~0u, ~SSL_eNULL, ~0u, SSL3_VERSION}, 624 {"TLSv1.2", ~0u, ~0u, ~SSL_eNULL, ~0u, TLS1_2_VERSION}, [all...] |
ssl_test.cc | 264 // TLSv1.2 matches everything added in TLS 1.2. 266 "AES128-SHA:AES128-SHA256:!TLSv1.2", 275 "AES128-SHA:AES128-SHA256:!TLSv1.2+SSLv3", 318 "TLSv1", 319 "TLSv1.2", [all...] |
/libcore/ojluni/src/main/java/sun/security/util/ |
KeyUtil.java | 227 if (clientVersion > 0x0301 || // 0x0301: TLSv1
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 263 String protocol = "TLSv1.2";
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 2 * TLSv1 client - OCSP 691 wpa_hexdump(MSG_MSGDUMP, "TLSv1: OCSPResponse", resp, len);
|
/external/okhttp/ |
CHANGELOG.md | 390 * **TLS configuration updated.** OkHttp now explicitly enables TLSv1.2, 391 TLSv1.1 and TLSv1.0 where they are supported. It will continue to perform [all...] |
/libcore/tools/docs/crypto/data/ |
crypto_support.json | 873 "name": "TLSv1", 877 "name": "TLSv1.1", 881 "name": "TLSv1.2", [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ssl.py | 78 PROTOCOL_TLSv1: "TLSv1",
|
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 308 String protocol = "TLSv1.2";
|
/external/nist-sip/java/gov/nist/javax/sip/ |
SipStackImpl.java | 401 * The default is "SSLv3, SSLv2Hello, TLSv1". 402 * Some servers do not support SSLv2Hello, so override to "SSLv3, TLSv1". 484 "TLSv1" [all...] |
/external/wpa_supplicant_8/hostapd/ |
defconfig | 267 # internal = Internal TLSv1 implementation (experimental)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README | 101 - TLSv1 108 TLSv1/X.509/ASN.1/RSA/bignum parts are about 25 kB on x86) 172 - internal TLSv1 implementation 307 TLSv1 implementation can be used for TLS functionality. [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUSocketFactory.java | 104 SSLContext tlsContext = SSLContext.getInstance("TLSv1");
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
ssl.py | 78 PROTOCOL_TLSv1: "TLSv1",
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
ssl.py | 78 PROTOCOL_TLSv1: "TLSv1",
|