/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/ |
H A D | MySSLContextSpi.java | 24 import javax.net.ssl.KeyManager; 25 import javax.net.ssl.SSLContextSpi; 26 import javax.net.ssl.SSLEngine; 27 import javax.net.ssl.SSLEngineResult; 28 import javax.net.ssl.SSLException; 29 import javax.net.ssl.SSLParameters; 30 import javax.net.ssl.SSLSession; 31 import javax.net.ssl.SSLSessionContext; 32 import javax.net.ssl.SSLServerSocketFactory; 33 import javax.net.ssl [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 23 #include <openssl/ssl.h> 69 SSL *ssl; member in struct:tls_connection 319 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 386 if (!SSL_use_certificate(ssl, cert)) { 400 if (!SSL_use_RSAPrivateKey(ssl, rsa)) 419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) argument 486 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 494 static void ssl_info_cb(const SSL *ssl, int where, int ret) argument 510 str, SSL_state_string_long(ssl)); 520 SSL_get_app_data((SSL *) ssl); 681 SSL_CTX *ssl; local 737 SSL_CTX *ssl = ssl_ctx; local 869 SSL_CTX *ssl = ssl_ctx; local 1025 SSL *ssl; local 1427 tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, const char *passwd) argument 1502 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 1532 tls_read_pkcs12_blob(SSL_CTX *ssl_ctx, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 2038 SSL *ssl; local [all...] |
/external/chromium/chrome/browser/ |
H A D | page_info_window.h | 20 const NavigationEntry::SSLStatus& ssl,
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.provider.filetransfer.httpclient.ssl_1.0.0.v20100529-0735.jar | ... provider/filetransfer/httpclient/ org/eclipse/ecf/internal/provider/filetransfer/httpclient/ssl/ org/eclipse/ecf/internal/provider/filetransfer/httpclient/ssl/SSLSocketFactoryModifier. |
H A D | org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar | ... eclipse/ecf/ org/eclipse/ecf/internal/ org/eclipse/ecf/internal/ssl/ org/eclipse/ecf/internal/ssl/ECFCertificateException.class ECFCertificateException. ... |
/external/openssl/include/openssl/ |
H A D | tls1.h | 0 /* ssl/tls1.h */ 298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ 299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ 302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 304 #define SSL_set_tlsext_status_type(ssl, type) \ 305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 307 #define SSL_get_tlsext_status_exts(ssl, arg) \ 308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 310 #define SSL_set_tlsext_status_exts(ssl, ar [all...] |
H A D | srtp.h | 0 /* ssl/tls1.h */ 137 STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl); variable
|
/external/openssl/ssl/ |
H A D | tls1.h | 0 /* ssl/tls1.h */ 298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ 299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ 302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 304 #define SSL_set_tlsext_status_type(ssl, type) \ 305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 307 #define SSL_get_tlsext_status_exts(ssl, arg) \ 308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 310 #define SSL_set_tlsext_status_exts(ssl, ar [all...] |
H A D | ssl_rsa.c | 0 /* ssl/ssl_rsa.c */ 69 int SSL_use_certificate(SSL *ssl, X509 *x) argument 76 if (!ssl_cert_inst(&ssl->cert)) 81 return(ssl_set_cert(ssl->cert,x)); 85 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) argument 112 x=PEM_read_bio_X509(in,NULL,ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_userdata); 126 ret=SSL_use_certificate(ssl,x); 134 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) argument 146 ret=SSL_use_certificate(ssl, 152 SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 229 SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) argument 276 SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len) argument 295 SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey) argument 314 SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) argument 361 SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len) argument 700 SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain) argument [all...] |
H A D | srtp.h | 0 /* ssl/tls1.h */ 137 STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl); variable
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
H A D | HttpsURLConnectionTest.java | 19 package org.apache.harmony.xnet.tests.javax.net.ssl; 25 import javax.net.ssl.HostnameVerifier; 26 import javax.net.ssl.HttpsURLConnection; 27 import javax.net.ssl.SSLPeerUnverifiedException; 28 import javax.net.ssl.SSLSocketFactory; 113 * @see javax.net.ssl.HttpsURLConnection#getCipherSuite() 121 * @see javax.net.ssl.HttpsURLConnection#getLocalCertificates() 129 * @see javax.net.ssl.HttpsURLConnection#getServerCertificates()
|
H A D | HandshakeCompletedEventTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 24 import javax.net.ssl.HandshakeCompletedEvent; 25 import javax.net.ssl.SSLPeerUnverifiedException; 26 import javax.net.ssl.SSLSession; 27 import javax.net.ssl.SSLSocket; 28 import javax.net.ssl.SSLSocketFactory;
|
H A D | SSLHandshakeExceptionTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 20 import javax.net.ssl.SSLHandshakeException;
|
H A D | SSLKeyExceptionTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 20 import javax.net.ssl.SSLKeyException;
|
H A D | SSLPeerUnverifiedExceptionTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 20 import javax.net.ssl.SSLPeerUnverifiedException;
|
H A D | SSLProtocolExceptionTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 20 import javax.net.ssl.SSLProtocolException;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 27 struct eap_ssl_data ssl; member in struct:eap_tls_data 68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 83 eap_server_tls_ssl_deinit(sm, &data->ssl); 115 if (data->ssl.state == FRAG_ACK) { 119 if (data->ssl.state == WAIT_FRAG_ACK) { 120 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 138 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 141 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 172 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 21 struct eap_ssl_data ssl; member in struct:eap_tls_data 62 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 77 eap_server_tls_ssl_deinit(sm, &data->ssl); 109 if (data->ssl.state == FRAG_ACK) { 113 if (data->ssl.state == WAIT_FRAG_ACK) { 114 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 123 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 132 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 135 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 166 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 21 struct eap_ssl_data ssl; member in struct:eap_tls_data 62 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 77 eap_server_tls_ssl_deinit(sm, &data->ssl); 109 if (data->ssl.state == FRAG_ACK) { 113 if (data->ssl.state == WAIT_FRAG_ACK) { 114 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 123 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 132 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 135 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 166 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 21 struct eap_ssl_data ssl; member in struct:eap_tls_data 62 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 77 eap_server_tls_ssl_deinit(sm, &data->ssl); 109 if (data->ssl.state == FRAG_ACK) { 113 if (data->ssl.state == WAIT_FRAG_ACK) { 114 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 123 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 132 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 135 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 166 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | basicpacketsocketfactory.h | 50 bool listen, bool ssl); 53 const ProxyInfo& proxy_info, const std::string& user_agent, bool ssl);
|
/external/openssl/apps/ |
H A D | ciphers.c | 67 #include <openssl/ssl.h> 92 SSL *ssl=NULL; local 172 ssl=SSL_new(ctx); 173 if (ssl == NULL) goto err; 180 p=SSL_get_cipher_list(ssl,i); 189 sk=SSL_get_ciphers(ssl); 226 if (ssl != NULL) SSL_free(ssl);
|
/external/chromium/chrome/browser/ui/views/location_bar/ |
H A D | click_handler.cc | 34 tab->ShowPageInfo(nav_entry->url(), nav_entry->ssl(), true);
|
/external/nist-sip/java/gov/nist/javax/sip/ |
H A D | ClientTransactionExt.java | 6 import javax.net.ssl.SSLPeerUnverifiedException;
|
H A D | TransactionExt.java | 6 import javax.net.ssl.SSLPeerUnverifiedException;
|