/third_party/nghttp2/src/ |
H A D | shrpx_connection.cc | 68 tls{DefaultMemchunks(mcpool), DefaultPeekMemchunks(mcpool), 100 if (tls.ssl) { in disconnect() 102 SSL_set_shutdown(tls.ssl, in disconnect() 103 SSL_get_shutdown(tls.ssl) | SSL_RECEIVED_SHUTDOWN); in disconnect() 106 if (tls.cached_session) { in disconnect() 107 SSL_SESSION_free(tls.cached_session); in disconnect() 108 tls.cached_session = nullptr; in disconnect() 111 if (tls.cached_session_lookup_req) { in disconnect() 112 tls.cached_session_lookup_req->canceled = true; in disconnect() 113 tls in disconnect() [all...] |
H A D | shrpx_tls_test.cc | 39 auto tree = std::make_unique<tls::CertLookupTree>(); in test_shrpx_tls_create_lookup_tree() 88 tree = std::make_unique<tls::CertLookupTree>(); in test_shrpx_tls_create_lookup_tree() 126 auto nghttp2_tls_ctx_data = std::make_unique<tls::TLSContextData>(); in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 137 auto examples_tls_ctx_data = std::make_unique<tls::TLSContextData>(); in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 144 tls::CertLookupTree tree; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 147 rv = tls::cert_lookup_tree_add_ssl_ctx(&tree, indexed_ssl_ctx, in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 152 rv = tls::cert_lookup_tree_add_ssl_ctx(&tree, indexed_ssl_ctx, in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 167 return tls::tls_hostname_match(StringRef{pattern, N}, StringRef{hostname, M}); in tls_hostname_match_wrapper() 235 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() 248 tls in test_shrpx_tls_verify_numeric_hostname() [all...] |
H A D | shrpx_live_check.cc | 108 readcb, timeoutcb, this, get_config()->tls.dyn_rec.warmup_threshold, 109 get_config()->tls.dyn_rec.idle_timeout, Proto::NONE), 205 if (!dns_query_ && addr_->tls) { in initiate_connection() 208 auto ssl = tls::create_ssl(ssl_ctx_); in initiate_connection() 215 tls::setup_downstream_http1_alpn(ssl); in initiate_connection() 218 tls::setup_downstream_http2_alpn(ssl); in initiate_connection() 225 conn_.tls.client_session_cache = &addr_->tls_session_cache; in initiate_connection() 299 if (addr_->tls) { in initiate_connection() 303 SSL_set_tlsext_host_name(conn_.tls.ssl, sni_name.c_str()); in initiate_connection() 306 auto session = tls in initiate_connection() [all...] |
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-server.c | 85 SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context, in lws_tls_server_client_cert_verify_config() 89 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, in lws_tls_server_client_cert_verify_config() 114 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 213 m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert); 236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 265 ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, 273 ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx, 293 ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p, 302 vhost->tls [all...] |
H A D | openssl-client.c | 35 #include "private-lib-tls-openssl.h" 73 xs = SSL_CTX_get_cert_store(SSL_get_SSL_CTX(wsi->tls.ssl)); 116 wsi->tls.use_ssl & LCCSCF_ALLOW_SELFSIGNED) { in OpenSSL_client_verify_callback() 123 wsi->tls.use_ssl & LCCSCF_ALLOW_INSECURE) { in OpenSSL_client_verify_callback() 129 wsi->tls.use_ssl & LCCSCF_ALLOW_EXPIRED) { in OpenSSL_client_verify_callback() 162 wsi->tls.kid_chain.count != in OpenSSL_client_verify_callback() 163 LWS_ARRAY_SIZE(wsi->tls.kid_chain.akid); n++) { in OpenSSL_client_verify_callback() 170 &wsi->tls.kid_chain.skid[ in OpenSSL_client_verify_callback() 171 wsi->tls.kid_chain.count]); in OpenSSL_client_verify_callback() 177 &wsi->tls in OpenSSL_client_verify_callback() [all...] |
H A D | openssl-ssl.c | 26 #include "private-lib-tls-openssl.h" 40 SSL *s = wsi->tls.ssl; in lws_openssl_describe_cipher() 55 if (!wsi->tls.ssl) in lws_ssl_get_error() 58 m = SSL_get_error(wsi->tls.ssl, n); in lws_ssl_get_error() 59 lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m, LWS_ERRNO); in lws_ssl_get_error() 140 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx() 143 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx() 146 SSL_CTX_free(vhost->tls in lws_ssl_destroy_client_ctx() [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-ssl.c | 26 #include "private-lib-tls-mbedtls.h" 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 51 if (!wsi->tls.ssl) in lws_ssl_capable_read() 55 n = SSL_read(wsi->tls in lws_ssl_capable_read() [all...] |
H A D | mbedtls-client.c | 26 #include "private-lib-tls-mbedtls.h" 75 const char *alpn_comma = wsi->a.context->tls.alpn_default; in lws_ssl_client_bio_create() 102 wsi->tls.ssl = SSL_new(wsi->a.vhost->tls.ssl_client_ctx); in lws_ssl_client_bio_create() 103 if (!wsi->tls.ssl) { in lws_ssl_client_bio_create() 113 if (wsi->a.vhost->tls.ssl_info_event_mask) in lws_ssl_client_bio_create() 114 SSL_set_info_callback(wsi->tls.ssl, lws_ssl_info_callback); in lws_ssl_client_bio_create() 116 if (!(wsi->tls.use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)) { in lws_ssl_client_bio_create() 117 X509_VERIFY_PARAM *param = SSL_get0_param(wsi->tls.ssl); in lws_ssl_client_bio_create() 126 if (wsi->a.vhost->tls in lws_ssl_client_bio_create() [all...] |
H A D | mbedtls-server.c | 47 SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, NULL); in lws_tls_server_client_cert_verify_config() 70 vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl)) in lws_mbedtls_sni_cb() 91 if (!vhost->tls.ssl_ctx) { in lws_mbedtls_sni_cb() 99 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_mbedtls_sni_cb() 156 err = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, (int)flen, p); in lws_tls_server_certs_load() 171 err = SSL_CTX_use_PrivateKey_ASN1(0, vhost->tls.ssl_ctx, p, (long)flen); in lws_tls_server_certs_load() 179 vhost->tls.skipped_certs = 0; in lws_tls_server_certs_load() 193 vhost->tls.ssl_ctx = SSL_CTX_new(method, &vhost->context->mcdc); /* create context */ in lws_tls_server_vhost_backend_init() 194 if (!vhost->tls.ssl_ctx) { in lws_tls_server_vhost_backend_init() 199 if (!vhost->tls in lws_tls_server_vhost_backend_init() [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-passphrase.js | 28 const tls = require('tls'); 44 const server = tls.Server({ 55 tls.connect({ 63 tls.connect({ 70 tls.connect({ 79 tls.connect({ 87 tls.connect({ 94 tls.connect({ 103 tls [all...] |
H A D | test-tls-onread-static-buffer.js | 7 const tls = require('tls'); 20 tls.createServer(options, common.mustCall(function(socket) { 27 tls.connect({ 45 tls.createServer(options, common.mustCall(function(socket) { 52 tls.connect({ 73 tls.createServer(options, common.mustCall(function(socket) { 82 tls.connect({ 105 tls.createServer(options, common.mustCall(function(socket) { 114 tls [all...] |
H A D | test-tls-no-cert-required.js | 28 const tls = require('tls'); 30 // Omitting the cert or pfx option to tls.createServer() should not throw. 33 tls.createServer({ ciphers: 'AECDH-NULL-SHA' }) 36 tls.createServer(assert.fail) 39 tls.createServer({}) 43 () => tls.createServer('this is not valid'), 52 tls.createServer()
|
H A D | test-tls-client-renegotiation-limit.js | 31 const tls = require('tls'); 35 tls.DEFAULT_MAX_VERSION = 'TLSv1.2'; 44 tls.CLIENT_RENEG_LIMIT = LIMITS[n++]; 56 const server = tls.createServer(options, (conn) => { 71 const client = tls.connect(options, spam); 76 assert.strictEqual(renegs, tls.CLIENT_RENEG_LIMIT + 1); 95 assert.ok(renegs <= tls.CLIENT_RENEG_LIMIT);
|
H A D | test-tls-honorcipherorder.js | 12 const tls = require('tls'); 30 const server = tls.createServer(soptions, mustCall(function(clearTextStream) { 44 const savedDefaults = tls.DEFAULT_CIPHERS; 45 tls.DEFAULT_CIPHERS = defaultCiphers || savedDefaults; 46 const client = tls.connect(port, localhost, coptions, mustCall(function() { 55 tls.DEFAULT_CIPHERS = savedDefaults; 82 // tls.DEFAULT_CIPHERS. All ciphers of the server are included in the 85 test(true, tls.DEFAULT_CIPHERS, 'AES256-SHA256'); 89 // Ensure that `tls [all...] |
H A D | test-crypto.js | 36 const tls = require('tls'); 45 const credentials = tls.createSecureContext(); 62 tls.createSecureContext({ pfx: certPfx, passphrase: 'sample' }); 65 tls.createSecureContext({ pfx: certPfx }); 75 tls.createSecureContext({ pfx: certPfx, passphrase: 'test' }); 85 tls.createSecureContext({ pfx: 'sample', passphrase: 'test' }); 139 const tlsCiphers = tls.getCiphers(); 140 assert(tls.getCiphers().includes('aes256-sha')); 141 assert(tls [all...] |
H A D | test-tls-connect-abort-controller.js | 6 const tls = require('tls'); 15 const server = tls.createServer(serverOptions); 38 const socket = tls.connect(connectOptions(signal)); 48 const socket = tls.connect(connectOptions(signal)); 56 const socket = tls.connect(connectOptions(signal)); 66 const socket = new tls.TLSSocket(undefined, connectOptions(signal)); 74 const socket = new tls.TLSSocket(undefined, connectOptions(signal)); 83 const socket = new tls.TLSSocket(undefined, connectOptions(signal));
|
/third_party/glfw/src/ |
H A D | win32_thread.c | 39 GLFWbool _glfwPlatformCreateTls(_GLFWtls* tls) in _glfwPlatformCreateTls() argument 41 assert(tls->win32.allocated == GLFW_FALSE); in _glfwPlatformCreateTls() 43 tls->win32.index = TlsAlloc(); in _glfwPlatformCreateTls() 44 if (tls->win32.index == TLS_OUT_OF_INDEXES) in _glfwPlatformCreateTls() 50 tls->win32.allocated = GLFW_TRUE; in _glfwPlatformCreateTls() 54 void _glfwPlatformDestroyTls(_GLFWtls* tls) in _glfwPlatformDestroyTls() argument 56 if (tls->win32.allocated) in _glfwPlatformDestroyTls() 57 TlsFree(tls->win32.index); in _glfwPlatformDestroyTls() 58 memset(tls, 0, sizeof(_GLFWtls)); in _glfwPlatformDestroyTls() 61 void* _glfwPlatformGetTls(_GLFWtls* tls) in _glfwPlatformGetTls() argument 67 _glfwPlatformSetTls(_GLFWtls* tls, void* value) _glfwPlatformSetTls() argument [all...] |
H A D | posix_thread.c | 40 GLFWbool _glfwPlatformCreateTls(_GLFWtls* tls) in _glfwPlatformCreateTls() argument 42 assert(tls->posix.allocated == GLFW_FALSE); in _glfwPlatformCreateTls() 44 if (pthread_key_create(&tls->posix.key, NULL) != 0) in _glfwPlatformCreateTls() 51 tls->posix.allocated = GLFW_TRUE; in _glfwPlatformCreateTls() 55 void _glfwPlatformDestroyTls(_GLFWtls* tls) in _glfwPlatformDestroyTls() argument 57 if (tls->posix.allocated) in _glfwPlatformDestroyTls() 58 pthread_key_delete(tls->posix.key); in _glfwPlatformDestroyTls() 59 memset(tls, 0, sizeof(_GLFWtls)); in _glfwPlatformDestroyTls() 62 void* _glfwPlatformGetTls(_GLFWtls* tls) in _glfwPlatformGetTls() argument 64 assert(tls in _glfwPlatformGetTls() 68 _glfwPlatformSetTls(_GLFWtls* tls, void* value) _glfwPlatformSetTls() argument [all...] |
/third_party/libcoap/src/ |
H A D | coap_dtls.c | 25 session->tls = coap_dtls_new_client_session(session); in coap_dtls_establish() 29 session->tls = coap_dtls_new_server_session(session); in coap_dtls_establish() 32 if (!session->tls) { in coap_dtls_establish() 41 if (session->tls) { in coap_dtls_close() 43 session->tls = NULL; in coap_dtls_close() 54 session->tls = coap_tls_new_client_session(session); in coap_tls_establish() 58 session->tls = coap_tls_new_server_session(session); in coap_tls_establish() 61 if (!session->tls) { in coap_tls_establish() 70 if (session->tls) { in coap_tls_close() 72 session->tls in coap_tls_close() [all...] |
/third_party/libwebsockets/lib/tls/ |
H A D | tls-server.c | 53 vhost->tls.use_ssl = 0; in lws_context_init_server_ssl() 71 vhost->tls.use_ssl = lws_check_opt(vhost->options, in lws_context_init_server_ssl() 74 if (vhost->tls.use_ssl && info->ssl_cipher_list) in lws_context_init_server_ssl() 79 vhost->name, vhost->tls.use_ssl ? "" : "non-"); in lws_context_init_server_ssl() 95 vhost->tls.allow_non_ssl_on_ssl_port = 1; in lws_context_init_server_ssl() 101 if (vhost->tls.use_ssl) { in lws_context_init_server_ssl() 109 vhost->tls.ssl_ctx, vhost, 0)) in lws_context_init_server_ssl() 113 if (vhost->tls.use_ssl) in lws_context_init_server_ssl() 142 if (wsi->tls.ssl) in lws_server_socket_service_ssl() 188 if (wsi->a.vhost->tls in lws_server_socket_service_ssl() [all...] |
H A D | tls-network.c | 28 * fakes POLLIN on all tls guys with buffered rx 30 * returns nonzero if any tls guys had POLLIN faked 39 lws_dll2_get_head(&pt->tls.dll_pending_tls_owner)) { in lws_tls_fake_POLLIN_for_buffered() 41 tls.dll_pending_tls); in lws_tls_fake_POLLIN_for_buffered() 59 lws_dll2_remove(&wsi->tls.dll_pending_tls); in __lws_ssl_remove_wsi_from_buffered_list() 81 if (v->tls.ssl_ctx && !v->tls.skipped_certs) { in lws_tls_check_cert_lifetime() 155 vhost->tls.skipped_certs = 1; in lws_tls_generic_cert_checks() 183 if (v->tls.alloc_cert_path && v->tls in lws_tls_cert_updated() [all...] |
/third_party/toybox/toys/pending/ |
H A D | wget.c | 17 * TLS 1.0: https://tls-v1-0.badssl.com:1010/ 18 * TLS 1.1: https://tls-v1-1.badssl.com:1011/ 19 * TLS 1.2: https://tls-v1-2.badssl.com:1012/ 64 #include <tls.h> 89 struct tls *tls; 142 if ((TT.tls = tls_client()) == NULL) in wget_connect() 143 error_exit("tls_client: %s", tls_error(TT.tls)); in wget_connect() 150 if (tls_configure(TT.tls, cfg) != 0) in wget_connect() 151 error_exit("tls_configure: %s", tls_error(TT.tls)); in wget_connect() [all...] |
/third_party/rust/crates/rustix/src/ |
H A D | runtime.rs | 42 backend::runtime::syscalls::tls::set_thread_area(u_info) in set_thread_area() 49 backend::runtime::syscalls::tls::arm_set_tls(data) in arm_set_tls() 56 backend::runtime::syscalls::tls::set_fs(data) in set_fs() 62 backend::runtime::syscalls::tls::set_tid_address(data) in set_tid_address() 79 backend::runtime::syscalls::tls::set_thread_name(name) in set_thread_name() 84 pub use backend::runtime::tls::UserDesc; 94 backend::runtime::syscalls::tls::exit_thread(status) in exit_thread() 125 backend::runtime::tls::startup_tls_info() in startup_tls_info() 143 pub use backend::runtime::tls::StartupTlsInfo;
|
/third_party/node/test/internet/ |
H A D | test-tls-add-ca-cert.js | 12 const tls = require('tls'); 31 tls.connect(opts, common.mustCall(end)); 35 tls.connect(opts, fail).on('error', common.mustCall((err) => { 44 opts.secureContext = tls.createSecureContext(); 45 tls.connect(opts, common.mustCall(end)); 50 tls.connect(opts, common.mustCall(end));
|
/third_party/pulseaudio/src/tests/ |
H A D | thread-test.c | 34 static pa_tls *tls = NULL; variable 47 pa_tls_set(tls, data); in thread_func() 49 pa_log_info("thread_func() for %s starting...", (char*) pa_tls_get(tls)); in thread_func() 56 pa_log_info("%s waiting ...", (char*) pa_tls_get(tls)); in thread_func() 78 pa_log_info("%s got number %i", (char*) pa_tls_get(tls), k); in thread_func() 91 pa_log_info("thread_func() for %s done...", (char*) pa_tls_get(tls)); in thread_func() 104 tls = pa_tls_new(pa_xfree); in START_TEST() 143 pa_tls_free(tls); in START_TEST()
|