/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | Platform.java | 38 import javax.net.ssl.SSLEngine; 39 import javax.net.ssl.SSLParameters; 40 import javax.net.ssl.X509TrustManager;
|
/external/mockwebserver/src/main/java/com/google/mockwebserver/ |
H A D | RecordedRequest.java | 26 import javax.net.ssl.SSLPeerUnverifiedException; 27 import javax.net.ssl.SSLSession; 28 import javax.net.ssl.SSLSocket;
|
/external/okhttp/android/test/java/com/squareup/okhttp/internal/ |
H A D | PlatformTest.java | 28 import javax.net.ssl.HandshakeCompletedListener; 29 import javax.net.ssl.SSLSession; 30 import javax.net.ssl.SSLSocket;
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 33 import javax.net.ssl.KeyManagerFactory; 34 import javax.net.ssl.SSLContext; 35 import javax.net.ssl.TrustManagerFactory;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 29 import javax.net.ssl.HostnameVerifier; 30 import javax.net.ssl.SSLException; 31 import javax.net.ssl.SSLSession;
|
/external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/ |
H A D | SampleServer.java | 16 import javax.net.ssl.KeyManagerFactory; 17 import javax.net.ssl.SSLContext; 18 import javax.net.ssl.TrustManagerFactory;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | ServerHandshakeImplTest.java | 25 import javax.net.ssl.KeyManagerFactory; 26 import javax.net.ssl.TrustManagerFactory;
|
H A D | SSLSessionContextImplTest.java | 23 import javax.net.ssl.SSLSession;
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_sess.c | 160 SSL_SESSION *SSL_get_session(const SSL *ssl) argument 163 return(ssl->session); 166 SSL_SESSION *SSL_get1_session(SSL *ssl) argument 171 * somebody doesn't free ssl->session between when we check it's 174 sess = ssl->session; 235 static int def_generate_session_id(const SSL *ssl, unsigned char *id, argument 242 while(SSL_has_matching_session_id(ssl, id, *id_len) && 998 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1003 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) 1020 SSL_SESSION *(*cb)(struct ssl_st *ssl, 997 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1019 SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy)) argument 1032 SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val)) argument 1043 SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey)) argument 1054 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, uint8_t *cookie, size_t *cookie_len)) argument 1060 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, const uint8_t *cookie, size_t cookie_len)) argument 1066 SSL_CTX_set_channel_id_cb(SSL_CTX *ctx, void (*cb)(SSL *ssl, EVP_PKEY **pkey)) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | testrelayserver.h | 84 bool ssl = (socket == ssl_int_socket_.get() || local 89 (!ssl) ? raw_socket :
|
/external/okhttp/benchmarks/src/main/java/com/squareup/okhttp/benchmarks/ |
H A D | ApacheHttpClient.java | 24 import javax.net.ssl.SSLContext; 31 import org.apache.http.conn.ssl.SSLSocketFactory;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
H A D | Address.java | 23 import javax.net.ssl.HostnameVerifier; 24 import javax.net.ssl.SSLSocketFactory;
|
H A D | Handshake.java | 25 import javax.net.ssl.SSLPeerUnverifiedException; 26 import javax.net.ssl.SSLSession; 33 * javax.net.ssl.SSLSocketFactory} to set policy for new handshakes.
|
/external/openssl/ssl/ |
H A D | ssl_sess.c | 0 /* ssl/ssl_sess.c */ 150 SSL_SESSION *SSL_get_session(const SSL *ssl) argument 153 return(ssl->session); 156 SSL_SESSION *SSL_get1_session(SSL *ssl) argument 161 * somebody doesn't free ssl->session between when we check it's 164 sess = ssl->session; 249 static int def_generate_session_id(const SSL *ssl, unsigned char *id, argument 256 while(SSL_has_matching_session_id(ssl, id, *id_len) && 1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSIO 1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1112 SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy)) argument 1125 SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val)) argument 1136 SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey)) argument 1147 SSL_CTX_set_channel_id_cb(SSL_CTX *ctx, void (*cb)(SSL *ssl, EVP_PKEY **pkey)) argument 1177 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 1183 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument [all...] |
H A D | t1_enc.c | 0 /* ssl/t1_enc.c */ 978 int tls1_mac(SSL *ssl, unsigned char *md, int send) argument 987 int stream_mac = (send?(ssl->mac_flags & SSL_MAC_FLAG_WRITE_MAC_STREAM):(ssl->mac_flags&SSL_MAC_FLAG_READ_MAC_STREAM)); 992 rec= &(ssl->s3->wrec); 993 seq= &(ssl->s3->write_sequence[0]); 994 hash=ssl->write_hash; 998 rec= &(ssl->s3->rrec); 999 seq= &(ssl->s3->read_sequence[0]); 1000 hash=ssl [all...] |
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_openssl.cc | 13 #include <openssl/ssl.h> 33 #include "net/ssl/openssl_ssl_util.h" 34 #include "net/ssl/ssl_cert_request_info.h" 35 #include "net/ssl/ssl_connection_status_flags.h" 36 #include "net/ssl/ssl_info.h" 43 #include "net/ssl/openssl_client_key_store.h" 45 #include "net/ssl/openssl_platform_key.h" 96 int GetNetSSLVersion(SSL* ssl) { argument 97 switch (SSL_version(ssl)) { 151 SSLClientSocketOpenSSL* GetClientSocketFromSSL(const SSL* ssl) { argument 159 SetClientSocketForSSL(SSL* ssl, SSLClientSocketOpenSSL* socket) argument 197 GetSessionCacheKey(const SSL* ssl) argument 205 ClientCertRequestCallback(SSL* ssl, void* arg) argument 212 SSL* ssl = reinterpret_cast<SSL*>(X509_STORE_CTX_get_ex_data( local 220 SelectNextProtoCallback(SSL* ssl, unsigned char** out, unsigned char* outlen, const unsigned char* in, unsigned int inlen, void* arg) argument [all...] |
/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/ |
H A D | TestWebServer.java | 46 import javax.net.ssl.HostnameVerifier; 47 import javax.net.ssl.HttpsURLConnection; 48 import javax.net.ssl.KeyManager; 49 import javax.net.ssl.KeyManagerFactory; 50 import javax.net.ssl.SSLContext; 51 import javax.net.ssl.SSLSession; 52 import javax.net.ssl.X509TrustManager; 103 * @param ssl True if the server should be using secure sockets. 106 public TestWebServer(boolean ssl) throws Exception { argument 107 mSsl = ssl; 545 ServerThread(TestWebServer server, boolean ssl) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 190 eap_peer_tls_ssl_deinit(sm, &data->ssl); 270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 753 eap_peer_tls_reset_input(&data->ssl); 774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret, 1002 if (tls_connection_established(sm->ssl_ctx, data->ssl [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 190 eap_peer_tls_ssl_deinit(sm, &data->ssl); 270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 753 eap_peer_tls_reset_input(&data->ssl); 774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret, 1002 if (tls_connection_established(sm->ssl_ctx, data->ssl [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 190 eap_peer_tls_ssl_deinit(sm, &data->ssl); 270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 753 eap_peer_tls_reset_input(&data->ssl); 774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret, 1002 if (tls_connection_established(sm->ssl_ctx, data->ssl [all...] |
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
H A D | KeyManagerFactoryImplTest.java | 24 import javax.net.ssl.KeyManager; 43 String def_keystore = System.getProperty("javax.net.ssl.keyStore"); 45 System.setProperty("javax.net.ssl.keyStore", "abc"); 51 System.clearProperty("javax.net.ssl.keyStore"); 53 System.setProperty("javax.net.ssl.keyStore", def_keystore);
|
/external/apache-harmony/x-net/src/test/impl/java.injected/javax/net/ssl/ |
H A D | DefaultSSLServerSocketFactoryTest.java | 19 package javax.net.ssl;
|
H A D | DefaultSSLSocketFactoryTest.java | 19 package javax.net.ssl;
|
H A D | SSLServerSocketFactoryTest.java | 22 package javax.net.ssl; 44 String defaultName = Security.getProperty("ssl.ServerSocketFactory.provider");
|
H A D | SSLSocketFactoryTest.java | 22 package javax.net.ssl; 44 String defaultName = Security.getProperty("ssl.SocketFactory.provider");
|