Searched refs:ssl (Results 151 - 175 of 421) sorted by relevance

1234567891011>>

/external/conscrypt/src/platform/java/org/conscrypt/
H A DPlatform.java38 import javax.net.ssl.SSLEngine;
39 import javax.net.ssl.SSLParameters;
40 import javax.net.ssl.X509TrustManager;
/external/mockwebserver/src/main/java/com/google/mockwebserver/
H A DRecordedRequest.java26 import javax.net.ssl.SSLPeerUnverifiedException;
27 import javax.net.ssl.SSLSession;
28 import javax.net.ssl.SSLSocket;
/external/okhttp/android/test/java/com/squareup/okhttp/internal/
H A DPlatformTest.java28 import javax.net.ssl.HandshakeCompletedListener;
29 import javax.net.ssl.SSLSession;
30 import javax.net.ssl.SSLSocket;
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java33 import javax.net.ssl.KeyManagerFactory;
34 import javax.net.ssl.SSLContext;
35 import javax.net.ssl.TrustManagerFactory;
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
H A DOkHostnameVerifier.java29 import javax.net.ssl.HostnameVerifier;
30 import javax.net.ssl.SSLException;
31 import javax.net.ssl.SSLSession;
/external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/
H A DSampleServer.java16 import javax.net.ssl.KeyManagerFactory;
17 import javax.net.ssl.SSLContext;
18 import javax.net.ssl.TrustManagerFactory;
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DServerHandshakeImplTest.java25 import javax.net.ssl.KeyManagerFactory;
26 import javax.net.ssl.TrustManagerFactory;
H A DSSLSessionContextImplTest.java23 import javax.net.ssl.SSLSession;
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_sess.c160 SSL_SESSION *SSL_get_session(const SSL *ssl) argument
163 return(ssl->session);
166 SSL_SESSION *SSL_get1_session(SSL *ssl) argument
171 * somebody doesn't free ssl->session between when we check it's
174 sess = ssl->session;
235 static int def_generate_session_id(const SSL *ssl, unsigned char *id, argument
242 while(SSL_has_matching_session_id(ssl, id, *id_len) &&
998 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess))
1003 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess)
1020 SSL_SESSION *(*cb)(struct ssl_st *ssl,
997 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument
1019 SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy)) argument
1032 SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val)) argument
1043 SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey)) argument
1054 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, uint8_t *cookie, size_t *cookie_len)) argument
1060 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, const uint8_t *cookie, size_t cookie_len)) argument
1066 SSL_CTX_set_channel_id_cb(SSL_CTX *ctx, void (*cb)(SSL *ssl, EVP_PKEY **pkey)) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dtestrelayserver.h84 bool ssl = (socket == ssl_int_socket_.get() || local
89 (!ssl) ? raw_socket :
/external/okhttp/benchmarks/src/main/java/com/squareup/okhttp/benchmarks/
H A DApacheHttpClient.java24 import javax.net.ssl.SSLContext;
31 import org.apache.http.conn.ssl.SSLSocketFactory;
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
H A DAddress.java23 import javax.net.ssl.HostnameVerifier;
24 import javax.net.ssl.SSLSocketFactory;
H A DHandshake.java25 import javax.net.ssl.SSLPeerUnverifiedException;
26 import javax.net.ssl.SSLSession;
33 * javax.net.ssl.SSLSocketFactory} to set policy for new handshakes.
/external/openssl/ssl/
H A Dssl_sess.c0 /* ssl/ssl_sess.c */
150 SSL_SESSION *SSL_get_session(const SSL *ssl) argument
153 return(ssl->session);
156 SSL_SESSION *SSL_get1_session(SSL *ssl) argument
161 * somebody doesn't free ssl->session between when we check it's
164 sess = ssl->session;
249 static int def_generate_session_id(const SSL *ssl, unsigned char *id, argument
256 while(SSL_has_matching_session_id(ssl, id, *id_len) &&
1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess))
1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSIO
1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument
1112 SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy)) argument
1125 SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val)) argument
1136 SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey)) argument
1147 SSL_CTX_set_channel_id_cb(SSL_CTX *ctx, void (*cb)(SSL *ssl, EVP_PKEY **pkey)) argument
1177 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument
1183 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument
[all...]
H A Dt1_enc.c0 /* ssl/t1_enc.c */
978 int tls1_mac(SSL *ssl, unsigned char *md, int send) argument
987 int stream_mac = (send?(ssl->mac_flags & SSL_MAC_FLAG_WRITE_MAC_STREAM):(ssl->mac_flags&SSL_MAC_FLAG_READ_MAC_STREAM));
992 rec= &(ssl->s3->wrec);
993 seq= &(ssl->s3->write_sequence[0]);
994 hash=ssl->write_hash;
998 rec= &(ssl->s3->rrec);
999 seq= &(ssl->s3->read_sequence[0]);
1000 hash=ssl
[all...]
/external/chromium_org/net/socket/
H A Dssl_client_socket_openssl.cc13 #include <openssl/ssl.h>
33 #include "net/ssl/openssl_ssl_util.h"
34 #include "net/ssl/ssl_cert_request_info.h"
35 #include "net/ssl/ssl_connection_status_flags.h"
36 #include "net/ssl/ssl_info.h"
43 #include "net/ssl/openssl_client_key_store.h"
45 #include "net/ssl/openssl_platform_key.h"
96 int GetNetSSLVersion(SSL* ssl) { argument
97 switch (SSL_version(ssl)) {
151 SSLClientSocketOpenSSL* GetClientSocketFromSSL(const SSL* ssl) { argument
159 SetClientSocketForSSL(SSL* ssl, SSLClientSocketOpenSSL* socket) argument
197 GetSessionCacheKey(const SSL* ssl) argument
205 ClientCertRequestCallback(SSL* ssl, void* arg) argument
212 SSL* ssl = reinterpret_cast<SSL*>(X509_STORE_CTX_get_ex_data( local
220 SelectNextProtoCallback(SSL* ssl, unsigned char** out, unsigned char* outlen, const unsigned char* in, unsigned int inlen, void* arg) argument
[all...]
/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/
H A DTestWebServer.java46 import javax.net.ssl.HostnameVerifier;
47 import javax.net.ssl.HttpsURLConnection;
48 import javax.net.ssl.KeyManager;
49 import javax.net.ssl.KeyManagerFactory;
50 import javax.net.ssl.SSLContext;
51 import javax.net.ssl.SSLSession;
52 import javax.net.ssl.X509TrustManager;
103 * @param ssl True if the server should be using secure sockets.
106 public TestWebServer(boolean ssl) throws Exception { argument
107 mSsl = ssl;
545 ServerThread(TestWebServer server, boolean ssl) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_peap.c33 struct eap_ssl_data ssl; member in struct:eap_peap_data
163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) {
190 eap_peer_tls_ssl_deinit(sm, &data->ssl);
270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) {
753 eap_peer_tls_reset_input(&data->ssl);
774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret,
1002 if (tls_connection_established(sm->ssl_ctx, data->ssl
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_peap.c33 struct eap_ssl_data ssl; member in struct:eap_peap_data
163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) {
190 eap_peer_tls_ssl_deinit(sm, &data->ssl);
270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) {
753 eap_peer_tls_reset_input(&data->ssl);
774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret,
1002 if (tls_connection_established(sm->ssl_ctx, data->ssl
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_peap.c33 struct eap_ssl_data ssl; member in struct:eap_peap_data
163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) {
190 eap_peer_tls_ssl_deinit(sm, &data->ssl);
270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) {
753 eap_peer_tls_reset_input(&data->ssl);
774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
972 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret,
1002 if (tls_connection_established(sm->ssl_ctx, data->ssl
[all...]
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/
H A DKeyManagerFactoryImplTest.java24 import javax.net.ssl.KeyManager;
43 String def_keystore = System.getProperty("javax.net.ssl.keyStore");
45 System.setProperty("javax.net.ssl.keyStore", "abc");
51 System.clearProperty("javax.net.ssl.keyStore");
53 System.setProperty("javax.net.ssl.keyStore", def_keystore);
/external/apache-harmony/x-net/src/test/impl/java.injected/javax/net/ssl/
H A DDefaultSSLServerSocketFactoryTest.java19 package javax.net.ssl;
H A DDefaultSSLSocketFactoryTest.java19 package javax.net.ssl;
H A DSSLServerSocketFactoryTest.java22 package javax.net.ssl;
44 String defaultName = Security.getProperty("ssl.ServerSocketFactory.provider");
H A DSSLSocketFactoryTest.java22 package javax.net.ssl;
44 String defaultName = Security.getProperty("ssl.SocketFactory.provider");

Completed in 1745 milliseconds

1234567891011>>