Home
last modified time | relevance | path

Searched full:secure (Results 1 – 19 of 19) sorted by relevance

/net-tools-3.7.0/mbedtls-2.4.0/
D.travis.yml26secure: "barHldniAfXyoWOD/vcO+E6/Xm4fmcaUoC9BeKW+LwsHqlDMLvugaJnmLXkSpkbYhVL61Hzf3bo0KPJn88AFc5Rkf…
DCMakeLists.txt9 option(UNSAFE_BUILD "Allow unsafe builds. These builds ARE NOT SECURE." OFF)
DChangeLog1308 * Secure renegotiation extension should only be sent in case client
1309 supports secure renegotiation
1441 * Added Secure Renegotiation (RFC 5746)
/net-tools-3.7.0/mbedtls-2.4.0/tests/
Dssl-opt.sh1286 -s "server hello, secure renegotiation extension" \
1299 -s "server hello, secure renegotiation extension" \
1312 -s "server hello, secure renegotiation extension" \
1325 -s "server hello, secure renegotiation extension" \
1338 -s "server hello, secure renegotiation extension" \
1353 -s "server hello, secure renegotiation extension" \
1369 -s "server hello, secure renegotiation extension" \
1386 -s "server hello, secure renegotiation extension" \
1402 -s "server hello, secure renegotiation extension" \
1417 -s "server hello, secure renegotiation extension" \
[all …]
/net-tools-3.7.0/mbedtls-2.4.0/configs/
Dconfig-ccm-psk-tls1_2.h25 * - fully modern and secure (provided the pre-shared keys have high entropy)
/net-tools-3.7.0/
DREADME NAT.md70 # $RANDOM is adequate enough for testing purposes, not secure though,
/net-tools-3.7.0/libcoap/src/
Duri.c47 int secure = 0, res = 0; in coap_split_uri() local
74 /* There might be an additional 's', indicating the secure version: */ in coap_split_uri()
75 if (len && (secure = tolower(*p) == 's')) { in coap_split_uri()
/net-tools-3.7.0/libcoap/examples/
Dcoap-client.txt.in27 coap-client was built with support for secure communication). The URI's
/net-tools-3.7.0/mbedtls-2.4.0/include/mbedtls/
Dssl.h225 * Length of the verify data for secure renegotiation
889 * Secure renegotiation
893 secure renegotiation */
2121 * secure renegotiation, but does not allow renegotiation
2122 * to take place if not secure.
2123 * (Interoperable and secure option)
2129 * (Most interoperable and least secure option)
2132 * if peer does not support secure renegotiation. Results
2135 * (Most secure option, interoperability issues)
/net-tools-3.7.0/mbedtls-2.4.0/yotta/data/
DREADME.md5 **Note:** The current release is beta, and implements no secure source of random numbers, weakening…
/net-tools-3.7.0/mbedtls-2.4.0/library/
Dsha256.c22 * The SHA-256 Secure Hash Standard was published by NIST in 2002.
Dsha512.c22 * The SHA-512 Secure Hash Standard was published by NIST in 2002.
Dssl_ciphersuites.c48 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
Dssl_cli.c141 * Secure renegotiation in ssl_write_renegotiation_ext()
1832 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) );
Decjpake.c935 /* For tests we don't need a secure RNG;
Dssl_srv.c1763 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) );
1987 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, secure renegotiation extension" ) );
Dssl_tls.c4393 * avoid "triple handshake" attack: https://secure-resumption.com/ in mbedtls_ssl_parse_certificate()
/net-tools-3.7.0/tinydtls-0.8.2/
Ddtls.h486 * simple secure UDP echo server. The application is responsible for the
Dconfigure4933 # Create a (secure) tmp directory for tmp files.