Searched full:secure (Results 1 – 19 of 19) sorted by relevance
/net-tools-3.4.0/mbedtls-2.4.0/ |
D | .travis.yml | 26 …secure: "barHldniAfXyoWOD/vcO+E6/Xm4fmcaUoC9BeKW+LwsHqlDMLvugaJnmLXkSpkbYhVL61Hzf3bo0KPJn88AFc5Rkf…
|
D | CMakeLists.txt | 9 option(UNSAFE_BUILD "Allow unsafe builds. These builds ARE NOT SECURE." OFF)
|
D | ChangeLog | 1308 * Secure renegotiation extension should only be sent in case client 1309 supports secure renegotiation 1441 * Added Secure Renegotiation (RFC 5746)
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/ |
D | ssl-opt.sh | 1286 -s "server hello, secure renegotiation extension" \ 1299 -s "server hello, secure renegotiation extension" \ 1312 -s "server hello, secure renegotiation extension" \ 1325 -s "server hello, secure renegotiation extension" \ 1338 -s "server hello, secure renegotiation extension" \ 1353 -s "server hello, secure renegotiation extension" \ 1369 -s "server hello, secure renegotiation extension" \ 1386 -s "server hello, secure renegotiation extension" \ 1402 -s "server hello, secure renegotiation extension" \ 1417 -s "server hello, secure renegotiation extension" \ [all …]
|
/net-tools-3.4.0/mbedtls-2.4.0/configs/ |
D | config-ccm-psk-tls1_2.h | 25 * - fully modern and secure (provided the pre-shared keys have high entropy)
|
/net-tools-3.4.0/ |
D | README NAT.md | 70 # $RANDOM is adequate enough for testing purposes, not secure though,
|
/net-tools-3.4.0/libcoap/src/ |
D | uri.c | 47 int secure = 0, res = 0; in coap_split_uri() local 74 /* There might be an additional 's', indicating the secure version: */ in coap_split_uri() 75 if (len && (secure = tolower(*p) == 's')) { in coap_split_uri()
|
/net-tools-3.4.0/libcoap/examples/ |
D | coap-client.txt.in | 27 coap-client was built with support for secure communication). The URI's
|
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/ |
D | ssl.h | 225 * Length of the verify data for secure renegotiation 889 * Secure renegotiation 893 secure renegotiation */ 2121 * secure renegotiation, but does not allow renegotiation 2122 * to take place if not secure. 2123 * (Interoperable and secure option) 2129 * (Most interoperable and least secure option) 2132 * if peer does not support secure renegotiation. Results 2135 * (Most secure option, interoperability issues)
|
/net-tools-3.4.0/mbedtls-2.4.0/yotta/data/ |
D | README.md | 5 **Note:** The current release is beta, and implements no secure source of random numbers, weakening…
|
/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | sha256.c | 22 * The SHA-256 Secure Hash Standard was published by NIST in 2002.
|
D | sha512.c | 22 * The SHA-512 Secure Hash Standard was published by NIST in 2002.
|
D | ssl_ciphersuites.c | 48 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
|
D | ssl_cli.c | 141 * Secure renegotiation in ssl_write_renegotiation_ext() 1832 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) );
|
D | ecjpake.c | 935 /* For tests we don't need a secure RNG;
|
D | ssl_srv.c | 1763 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) ); 1987 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, secure renegotiation extension" ) );
|
D | ssl_tls.c | 4393 * avoid "triple handshake" attack: https://secure-resumption.com/ in mbedtls_ssl_parse_certificate()
|
/net-tools-3.4.0/tinydtls-0.8.2/ |
D | dtls.h | 486 * simple secure UDP echo server. The application is responsible for the
|
D | configure | 4933 # Create a (secure) tmp directory for tmp files.
|