HomeSort by relevance Sort by last modified time
    Searched refs:nss (Results 1 - 18 of 18) sorted by null

  /external/chromium/crypto/
scoped_nss_types.h 9 #include <nss.h>
32 // Define some convenient scopers around NSS pointers.
hmac_nss.cc 7 #include <nss.h>
59 key_item.data = const_cast<unsigned char*>(key); // NSS API isn't const.
symmetric_key_nss.cc 7 #include <nss.h>
99 // The exact value of the |origin| argument doesn't matter to NSS as long as
nss_util.cc 8 #include <nss.h>
34 // USE_NSS means we use NSS for everything crypto-related. If USE_NSS is not
35 // defined, such as on Mac and Windows, we use NSS for SSL only -- we don't
36 // use NSS for crypto or certificate verification, and we don't use the NSS
48 const char kNSSDatabaseName[] = "Real NSS database";
66 result = StringPrintf("NSS error code: %d", PR_GetError());
100 // This callback for NSS forwards all requests to a caller-specified
132 // NSS creates a local cache of the sqlite database if it detects that the
135 // (NSS bug https://bugzilla.mozilla.org/show_bug.cgi?id=578561). So we se
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_nss.c 2 * Crypto wrapper functions for NSS
23 #include <nss/sechash.h>
24 #include <nss/pk11pub.h>
74 wpa_printf(MSG_ERROR, "NSS: PK11_GetBestSlot failed");
84 wpa_printf(MSG_ERROR, "NSS: PK11_ImportSymKey failed");
90 wpa_printf(MSG_ERROR, "NSS: PK11_GenerateNewParam failed");
97 wpa_printf(MSG_ERROR, "NSS: PK11_CreateContextBySymKey("
104 wpa_printf(MSG_ERROR, "NSS: PK11_CipherOp failed");
tls_nss.c 2 * SSL/TLS interface functions for NSS
25 #include <nss/nss.h>
26 #include <nss/nssilckt.h>
27 #include <nss/ssl.h>
28 #include <nss/pk11func.h>
29 #include <nss/secerr.h>
51 wpa_printf(MSG_DEBUG, "NSS: I/O close");
58 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
65 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount)
    [all...]
  /external/chromium/net/socket/
ssl_server_socket_nss.h 12 #include <nss.h>
106 // The NSS SSL state machine
nss_ssl_util.cc 7 #include <nss.h>
37 // SSL_GetNumImplementedCiphers functions when we require NSS 3.12.6.
75 // Initialize the NSS SSL library if it isn't already initialized. This must
76 // be called before any other NSS SSL functions. This function is
77 // thread-safe, and the NSS SSL library will only ever be initialized once.
78 // The NSS SSL library will be properly shut down on program exit.
88 // Map a Chromium net error code to an NSS error code.
89 // See _MD_unix_map_default_error in the NSS source
129 // Maps an NSS error code to a network error code.
214 // to a call to an NSS function. Used instead of SSLErrorParams wit
    [all...]
ssl_client_socket_nss.h 12 #include <nss.h>
41 // An SSL client socket implemented with Mozilla NSS.
102 // Initializes NSS SSL options. Returns a net error code.
143 // Handles an NSS error generated while handshaking or performing IO.
144 // Returns a network error code mapped from the original NSS error.
147 // NSS calls this when checking certificates. We pass 'this' as the first
151 // NSS calls this when client authentication is requested.
165 // NSS calls this when handshake is completed. We pass 'this' as the second
204 // from NSS as an NSS certificate handle (server_cert_nss_), and the
    [all...]
ssl_server_socket_nss.cc 22 #include <nss.h>
98 LOG(ERROR) << "Failed to initialize NSS";
179 // Transport connected, now hook it up to nss
194 return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR/NSS error code.
227 // This will fail if the specified cipher is not implemented by NSS, but
315 // The server's RSA private key must be imported into NSS with the
602 LOG(ERROR) << "handshake failed; NSS error code " << prerr
647 // NSS calls this if an incoming certificate needs to be verified.
657 // Tell NSS to not verify the certificate.
662 // NSS calls this when handshake is completed
    [all...]
ssl_client_socket_nss.cc 54 #include <nss.h>
132 // order to continue working on systems without up-to-date versions of NSS we
213 // This matches our behavior on Mac OS X and that of NSS. It also matches the
252 // chain, as given by the server, from an NSS socket and performs the needed
830 // Initialize the NSS SSL library in a threadsafe way. This also
831 // initializes the NSS base library.
847 // Transport connected, now hook it up to nss
862 return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR/NSS error code.
902 // This will fail if the specified cipher is not implemented by NSS, but
915 #error "You need to install NSS-3.12 or later to build chromium
    [all...]
  /external/chromium/net/http/
des.cc 13 #include <nss.h>
25 // DESSetKeyParity, DESMakeKey, and the Linux (NSS) version of DESEncrypt are
  /external/wpa_supplicant_8/hostapd/
Android.mk 509 ifeq ($(CONFIG_TLS), nss)
Makefile 476 ifeq ($(CONFIG_TLS), nss)
  /external/wpa_supplicant_8/wpa_supplicant/
Makefile 850 ifeq ($(CONFIG_TLS), nss)
1310 ifeq ($(CONFIG_TLS), nss)
    [all...]
  /external/chromium/
Android.mk 149 crypto/third_party/nss/sha512.cc \
  /external/chromium/net/base/
x509_certificate_nss.cc 10 #include <nss.h>
175 // NOTE: Using a NSS library before 3.12.3.1 will crash below. To see the
176 // NSS version currently in use:
177 // 1. use ldd on the chrome executable for NSS's location (ie. libnss3.so*)
213 // http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ckfw/builtins/constants.c&rev=1.13&mark=86,89#79
215 "NSS Builtin Objects");
223 // TODO(wtc): NSS has the CERT_GetOrgName, CERT_GetOrgUnitName, and
225 // general (the first) RDN. NSS doesn't have a function for the street
343 // These CAs have multiple keys, which trigger two bugs in NSS's CRL code.
344 // 1. NSS may use one key to verify a CRL signed with another key
    [all...]
  /external/chromium/net/ocsp/
nss_ocsp.cc 11 #include <nss.h>
534 // NSS calls the functions in the function table to download certificates
536 // set an NSS/NSPR error code when they fail. Otherwise NSS will get the
554 // Work around NSS bugs 524013 and 564334. NSS incorrectly thinks the
899 // This function would be called before NSS initialization.

Completed in 717 milliseconds