HomeSort by relevance Sort by last modified time
    Searched full:tlsv1 (Results 1 - 25 of 115) sorted by null

1 2 3 4 5

  /external/curl/docs/cmdline-opts/
tlsv1.d 2 Long: tlsv1
6 Mutexed: tlsv1.1 tlsv1.2
9 Help: Use TLSv1.0 or greater
12 You can use options --tlsv1.0, --tlsv1.1, --tlsv1.2, and --tlsv1.3 to control
sslv2.d 6 Mutexed: sslv3 tlsv1 tlsv1.1 tlsv1.2
sslv3.d 6 Mutexed: sslv2 tlsv1 tlsv1.1 tlsv1.2
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
TlsVersion.java 25 TLS_1_2("TLSv1.2"), // 2008.
26 TLS_1_1("TLSv1.1"), // 2006.
27 TLS_1_0("TLSv1"), // 1999.
39 case "TLSv1.2": return TLS_1_2;
40 case "TLSv1.1": return TLS_1_1;
41 case "TLSv1": return TLS_1_0;
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 2 * TLSv1 client - read handshake message
46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions",
52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header");
62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension");
66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u",
68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data",
87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len)
    [all...]
tlsv1_record.c 2 * TLSv1 Record Protocol
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC"
    [all...]
tlsv1_client.c 60 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
69 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
129 * @conn: TLSv1 client connection data from tlsv1_client_init()
161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data");
199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to
    [all...]
tlsv1_client_write.c 2 * TLSv1 client - write handshake message
66 wpa_printf(MSG_INFO, "TLSv1: No TLS version allowed");
70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)",
77 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
132 * SHA256 (and not the default SHA1) with TLSv1.2.
161 "TLSv1: Add status_request extension for OCSP stapling");
197 "TLSv1: Add status_request_v2 extension for OCSP stapling");
248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate")
    [all...]
tlsv1_server.c 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf);
66 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
126 * @conn: TLSv1 server connection data from tlsv1_server_init()
142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not
    [all...]
tlsv1_server_write.c 2 * TLSv1 server - write handshake message
58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
71 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
173 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
228 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain
    [all...]
tlsv1_cred.h 2 * TLSv1 credentials
tlsv1_server_read.c 2 * TLSv1 server - read handshake message
76 wpa_printf(MSG_DEBUG, "TLSv1: CertificateStatusType %u", status_type);
83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos);
165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len);
204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos);
223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites",
252 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods",
331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello
    [all...]
tlsv1_cred.c 2 * TLSv1 credentials
53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM "
135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM "
141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM "
171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
187 * @cred: TLSv1 credentials from tlsv1_cred_alloc(
    [all...]
tlsv1_common.c 2 * TLSv1 common routines
167 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate",
176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 "
197 wpa_printf(MSG_ERROR, "TLSv1: Failed to import "
440 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos);
442 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature");
455 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature");
462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
485 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithm = SHA-256");
492 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithm = SHA-384")
    [all...]
tlsv1_common.h 2 * TLSv1 common definitions
14 #define TLS_VERSION_1 0x0301 /* TLSv1 */
15 #define TLS_VERSION_1_1 0x0302 /* TLSv1.1 */
16 #define TLS_VERSION_1_2 0x0303 /* TLSv1.2 */
  /external/minijail/
get_googletest.sh 5 wget -q -nc --secure-protocol=TLSv1 "https://github.com/google/googletest/archive/release-${PV}.tar.gz" -O "googletest-release-${PV}.tar.gz"
  /external/curl/docs/libcurl/opts/
CURLOPT_PROXY_SSLVERSION.3 41 TLSv1.x
47 TLSv1.0 (Added in 7.34.0)
49 TLSv1.1 (Added in 7.34.0)
51 TLSv1.2 (Added in 7.34.0)
53 TLSv1.3 (Added in 7.52.0)
CURLOPT_SSLVERSION.3 40 TLSv1.x
46 TLSv1.0 (Added in 7.34.0)
48 TLSv1.1 (Added in 7.34.0)
50 TLSv1.2 (Added in 7.34.0)
52 TLSv1.3 (Added in 7.52.0)
  /external/jacoco/.travis/
settings.xml 14 <https.protocols>TLSv1</https.protocols>
  /libcore/support/src/test/java/libcore/java/security/
StandardNames.java 264 provide("SSLContext", "TLSv1");
265 provide("SSLContext", "TLSv1.1");
266 provide("SSLContext", "TLSv1.2");
381 unprovide("SSLContext", "TLSv1.1");
382 unprovide("SSLContext", "TLSv1.2");
633 provideSslContextEnabledProtocols("SSL", TLSVersion.SSLv3, TLSVersion.TLSv1);
634 provideSslContextEnabledProtocols("SSLv3", TLSVersion.SSLv3, TLSVersion.TLSv1);
635 provideSslContextEnabledProtocols("TLS", TLSVersion.SSLv3, TLSVersion.TLSv1);
636 provideSslContextEnabledProtocols("TLSv1", TLSVersion.SSLv3, TLSVersion.TLSv1);
    [all...]
  /external/conscrypt/testing/src/main/java/libcore/tlswire/util/
TlsProtocolVersion.java 24 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0");
25 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1");
26 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
  /libcore/support/src/test/java/libcore/tlswire/util/
TlsProtocolVersion.java 27 public static final TlsProtocolVersion TLSv1_0 = new TlsProtocolVersion(3, 1, "TLSv1.0");
28 public static final TlsProtocolVersion TLSv1_1 = new TlsProtocolVersion(3, 2, "TLSv1.1");
29 public static final TlsProtocolVersion TLSv1_2 = new TlsProtocolVersion(3, 3, "TLSv1.2");
  /docs/source.android.com/zh-cn/security/enhancements/
enhancements42.html 43 <li><strong>??</strong> - ??? SecureRandom ? Cipher.RSA ?????????? OpenSSL???? OpenSSL 1.0.1 ? TLSv1.1 ? TLSv1.2 ??????????</li>
enhancements50.html 32 </li><li><strong>????? HTTPS ? TLS/SSL ????</strong>?????? TLSv1.2 ? TLSv1.1???????????? AES-GCM??????????MD5?3DES ????????????????????? <a href="https://developer.android.com/reference/javax/net/ssl/SSLSocket.html">https://developer.android.com/reference/javax/net/ssl/SSLSocket.html</a>?
  /external/conscrypt/libcore-stub/src/main/java/libcore/java/security/
StandardNames.java 239 provide("SSLContext", "TLSv1");
240 provide("SSLContext", "TLSv1.1");
241 provide("SSLContext", "TLSv1.2");
355 unprovide("SSLContext", "TLSv1.1");
356 unprovide("SSLContext", "TLSv1.2");
581 provideSslContextEnabledProtocols("TLS", TLSVersion.TLSv1, TLSVersion.TLSv12);
582 provideSslContextEnabledProtocols("TLSv1", TLSVersion.TLSv1, TLSVersion.TLSv12);
583 provideSslContextEnabledProtocols("TLSv1.1", TLSVersion.TLSv1, TLSVersion.TLSv12)
    [all...]

Completed in 1560 milliseconds

1 2 3 4 5