/external/curl/docs/cmdline-opts/ |
tlsv1.d | 2 Long: tlsv1 6 Mutexed: tlsv1.1 tlsv1.2 9 Help: Use TLSv1.0 or greater 12 You can use options --tlsv1.0, --tlsv1.1, --tlsv1.2, and --tlsv1.3 to control
|
sslv2.d | 6 Mutexed: sslv3 tlsv1 tlsv1.1 tlsv1.2
|
sslv3.d | 6 Mutexed: sslv2 tlsv1 tlsv1.1 tlsv1.2
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
TlsVersion.java | 25 TLS_1_2("TLSv1.2"), // 2008. 26 TLS_1_1("TLSv1.1"), // 2006. 27 TLS_1_0("TLSv1"), // 1999. 39 case "TLSv1.2": return TLS_1_2; 40 case "TLSv1.1": return TLS_1_1; 41 case "TLSv1": return TLS_1_0;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 2 * TLSv1 client - read handshake message 46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions", 52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); 62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); 66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", 68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", 87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len) [all...] |
tlsv1_record.c | 2 * TLSv1 Record Protocol 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC" [all...] |
tlsv1_client.c | 60 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 69 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 129 * @conn: TLSv1 client connection data from tlsv1_client_init() 161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data"); 199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to [all...] |
tlsv1_client_write.c | 2 * TLSv1 client - write handshake message 66 wpa_printf(MSG_INFO, "TLSv1: No TLS version allowed"); 70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)", 77 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 132 * SHA256 (and not the default SHA1) with TLSv1.2. 161 "TLSv1: Add status_request extension for OCSP stapling"); 197 "TLSv1: Add status_request_v2 extension for OCSP stapling"); 248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate") [all...] |
tlsv1_server.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf); 66 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 126 * @conn: TLSv1 server connection data from tlsv1_server_init() 142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not [all...] |
tlsv1_server_write.c | 2 * TLSv1 server - write handshake message 58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 71 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 173 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 228 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain [all...] |
tlsv1_cred.h | 2 * TLSv1 credentials
|
tlsv1_server_read.c | 2 * TLSv1 server - read handshake message 76 wpa_printf(MSG_DEBUG, "TLSv1: CertificateStatusType %u", status_type); 83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos); 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 252 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello [all...] |
tlsv1_cred.c | 2 * TLSv1 credentials 53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " 135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " 141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " 171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", 187 * @cred: TLSv1 credentials from tlsv1_cred_alloc( [all...] |
tlsv1_common.c | 2 * TLSv1 common routines 167 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate", 176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 " 197 wpa_printf(MSG_ERROR, "TLSv1: Failed to import " 440 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 442 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature"); 455 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature"); 462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature", 485 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithm = SHA-256"); 492 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithm = SHA-384") [all...] |
tlsv1_common.h | 2 * TLSv1 common definitions 14 #define TLS_VERSION_1 0x0301 /* TLSv1 */ 15 #define TLS_VERSION_1_1 0x0302 /* TLSv1.1 */ 16 #define TLS_VERSION_1_2 0x0303 /* TLSv1.2 */
|
/external/minijail/ |
get_googletest.sh | 5 wget -q -nc --secure-protocol=TLSv1 "https://github.com/google/googletest/archive/release-${PV}.tar.gz" -O "googletest-release-${PV}.tar.gz"
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_PROXY_SSLVERSION.3 | 41 TLSv1.x 47 TLSv1.0 (Added in 7.34.0) 49 TLSv1.1 (Added in 7.34.0) 51 TLSv1.2 (Added in 7.34.0) 53 TLSv1.3 (Added in 7.52.0)
|
CURLOPT_SSLVERSION.3 | 40 TLSv1.x 46 TLSv1.0 (Added in 7.34.0) 48 TLSv1.1 (Added in 7.34.0) 50 TLSv1.2 (Added in 7.34.0) 52 TLSv1.3 (Added in 7.52.0)
|
/external/jacoco/.travis/ |
settings.xml | 14 <https.protocols>TLSv1</https.protocols>
|
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 264 provide("SSLContext", "TLSv1"); 265 provide("SSLContext", "TLSv1.1"); 266 provide("SSLContext", "TLSv1.2"); 381 unprovide("SSLContext", "TLSv1.1"); 382 unprovide("SSLContext", "TLSv1.2"); 633 provideSslContextEnabledProtocols("SSL", TLSVersion.SSLv3, TLSVersion.TLSv1); 634 provideSslContextEnabledProtocols("SSLv3", TLSVersion.SSLv3, TLSVersion.TLSv1); 635 provideSslContextEnabledProtocols("TLS", TLSVersion.SSLv3, TLSVersion.TLSv1); 636 provideSslContextEnabledProtocols("TLSv1", TLSVersion.SSLv3, TLSVersion.TLSv1); [all...] |
/external/conscrypt/testing/src/main/java/libcore/tlswire/util/ |
TlsProtocolVersion.java | 24 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0"); 25 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1"); 26 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
|
/libcore/support/src/test/java/libcore/tlswire/util/ |
TlsProtocolVersion.java | 27 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0"); 28 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1"); 29 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
|
/docs/source.android.com/zh-cn/security/enhancements/ |
enhancements42.html | 43 <li><strong>??</strong> - ??? SecureRandom ? Cipher.RSA ?????????? OpenSSL???? OpenSSL 1.0.1 ? TLSv1.1 ? TLSv1.2 ??????????</li>
|
enhancements50.html | 32 </li><li><strong>????? HTTPS ? TLS/SSL ????</strong>?????? TLSv1.2 ? TLSv1.1???????????? AES-GCM??????????MD5?3DES ????????????????????? <a href="https://developer.android.com/reference/javax/net/ssl/SSLSocket.html">https://developer.android.com/reference/javax/net/ssl/SSLSocket.html</a>?
|
/external/conscrypt/libcore-stub/src/main/java/libcore/java/security/ |
StandardNames.java | 239 provide("SSLContext", "TLSv1"); 240 provide("SSLContext", "TLSv1.1"); 241 provide("SSLContext", "TLSv1.2"); 355 unprovide("SSLContext", "TLSv1.1"); 356 unprovide("SSLContext", "TLSv1.2"); 581 provideSslContextEnabledProtocols("TLS", TLSVersion.TLSv1, TLSVersion.TLSv12); 582 provideSslContextEnabledProtocols("TLSv1", TLSVersion.TLSv1, TLSVersion.TLSv12); 583 provideSslContextEnabledProtocols("TLSv1.1", TLSVersion.TLSv1, TLSVersion.TLSv12) [all...] |