/external/chromium_org/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.cc | 40 #include <openssl/ssl.h> 642 SSL_set_bio(ssl_, bio, bio); // the SSL object owns the bio now. 776 // Add the root cert to the SSL context 826 // Get our SSL structure from the store 827 SSL* ssl = reinterpret_cast<SSL*>(X509_STORE_CTX_get_ex_data( local 832 reinterpret_cast<OpenSSLStreamAdapter*>(SSL_get_app_data(ssl)); 895 bool OpenSSLStreamAdapter::SSLPostConnectionCheck(SSL* ssl, [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
SSLEngineTest.java | 17 package libcore.javax.net.ssl; 21 import javax.net.ssl.KeyManager; 22 import javax.net.ssl.SSLContext; 23 import javax.net.ssl.SSLEngine; 24 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 25 import javax.net.ssl.SSLException; 26 import javax.net.ssl.SSLHandshakeException; 27 import javax.net.ssl.SSLParameters; 28 import javax.net.ssl.SSLSession; 411 * (setNeedClientAuth) but the client does not provide one SSL connectio [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
KeyManagerFactory1Test.java | 18 package tests.api.javax.net.ssl; 31 import javax.net.ssl.KeyStoreBuilderParameters; 32 import javax.net.ssl.ManagerFactoryParameters; 33 import javax.net.ssl.KeyManager; 34 import javax.net.ssl.KeyManagerFactory; 35 import javax.net.ssl.KeyManagerFactorySpi; 65 .getProperty("ssl.KeyManagerFactory.algorithm"); 98 * avax.net.ssl.KeyManagerFactory#getAlgorithm() 134 Security.setProperty("ssl.KeyManagerFactory.algorithm", defA); 140 Security.setProperty("ssl.KeyManagerFactory.algorithm", def) [all...] |
SSLContext1Test.java | 18 package tests.api.javax.net.ssl; 30 import javax.net.ssl.KeyManager; 31 import javax.net.ssl.KeyManagerFactory; 32 import javax.net.ssl.SSLContext; 33 import javax.net.ssl.SSLContextSpi; 34 import javax.net.ssl.SSLEngine; 35 import javax.net.ssl.SSLServerSocketFactory; 36 import javax.net.ssl.SSLSessionContext; 37 import javax.net.ssl.SSLSocketFactory; 38 import javax.net.ssl.TrustManager [all...] |
TrustManagerFactory1Test.java | 18 package tests.api.javax.net.ssl; 36 import javax.net.ssl.CertPathTrustManagerParameters; 37 import javax.net.ssl.ManagerFactoryParameters; 38 import javax.net.ssl.TrustManager; 39 import javax.net.ssl.TrustManagerFactory; 40 import javax.net.ssl.TrustManagerFactorySpi; 82 DEFAULT_ALGORITHM = Security.getProperty("ssl.TrustManagerFactory.algorithm"); 156 Security.setProperty("ssl.TrustManagerFactory.algorithm", defA); 162 Security.setProperty("ssl.TrustManagerFactory.algorithm", def); 169 * Assertions: returns security property "ssl.TrustManagerFactory.algorithm" [all...] |
HandshakeCompletedEventTest.java | 18 package tests.api.javax.net.ssl; 29 import javax.net.ssl.HandshakeCompletedEvent; 30 import javax.net.ssl.HandshakeCompletedListener; 31 import javax.net.ssl.KeyManager; 32 import javax.net.ssl.KeyManagerFactory; 33 import javax.net.ssl.SSLContext; 34 import javax.net.ssl.SSLPeerUnverifiedException; 35 import javax.net.ssl.SSLServerSocket; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSocket [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 170 import ssl namespace 640 raise RuntimeError("No SSL support included in this Python") 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 762 """ This is a subclass derived from SMTP that connects over an SSL encrypted 763 socket (to use this class you need a socket module that was compiled with SSL 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 767 certificate chain file for the SSL connection. 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
ftplib.py | 595 import ssl namespace 632 ssl_version = ssl.PROTOCOL_TLSv1 642 if secure and not isinstance(self.sock, ssl.SSLSocket): 647 '''Set up secure control connection by using TLS/SSL.''' 648 if isinstance(self.sock, ssl.SSLSocket): 650 if self.ssl_version == ssl.PROTOCOL_TLSv1: 653 resp = self.voidcmd('AUTH SSL') 654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile, 686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile, 699 # shutdown ssl laye [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_poplib.py | 225 import ssl namespace 234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE, 247 except ssl.SSLError, err: 248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 249 ssl.SSL_ERROR_WANT_WRITE): 251 elif err.args[0] == ssl.SSL_ERROR_EOF:
|
test_ssl.py | 1 # Test the support for SSL and sockets 23 ssl = test_support.import_module("ssl") variable 40 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 56 if hasattr(ssl, 'PROTOCOL_SSLv2'): 58 # implicit SSL context without trying to connect or listen. 69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None) 70 except ssl.SSLError as e [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 170 import ssl namespace 640 raise RuntimeError("No SSL support included in this Python") 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 762 """ This is a subclass derived from SMTP that connects over an SSL encrypted 763 socket (to use this class you need a socket module that was compiled with SSL 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 767 certificate chain file for the SSL connection. 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
ftplib.py | 595 import ssl namespace 632 ssl_version = ssl.PROTOCOL_TLSv1 642 if secure and not isinstance(self.sock, ssl.SSLSocket): 647 '''Set up secure control connection by using TLS/SSL.''' 648 if isinstance(self.sock, ssl.SSLSocket): 650 if self.ssl_version == ssl.PROTOCOL_TLSv1: 653 resp = self.voidcmd('AUTH SSL') 654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile, 686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile, 699 # shutdown ssl laye [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_poplib.py | 225 import ssl namespace 234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE, 247 except ssl.SSLError, err: 248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 249 ssl.SSL_ERROR_WANT_WRITE): 251 elif err.args[0] == ssl.SSL_ERROR_EOF:
|
test_ssl.py | 1 # Test the support for SSL and sockets 23 ssl = test_support.import_module("ssl") variable 40 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 56 if hasattr(ssl, 'PROTOCOL_SSLv2'): 58 # implicit SSL context without trying to connect or listen. 69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None) 70 except ssl.SSLError as e [all...] |
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
SSLEngineTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 23 import javax.net.ssl.SSLEngine; 24 import javax.net.ssl.SSLException; 25 import javax.net.ssl.SSLParameters; 26 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 27 import javax.net.ssl.SSLSession; 28 import javax.net.ssl.SSLEngineResult;
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
standalone.py | 79 Note that when ssl module is used and the key/cert location is incorrect, 163 _TLS_BY_STANDARD_MODULE = 'ssl' 265 global ssl 267 import ssl namespace 276 import OpenSSL.SSL 283 """A wrapper class for OpenSSL.SSL.Connection to 285 - tweak shutdown method since OpenSSL.SSL.Connection.shutdown doesn't 319 except OpenSSL.SSL.SysCallError, (err, message): 362 """Override SocketServer.TCPServer.__init__ to set SSL enabled 433 client_cert_ = ssl.CERT_OPTIONA [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 34 struct eap_ssl_data ssl; member in struct:eap_peap_data 164 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 165 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 182 eap_peer_tls_ssl_deinit(sm, &data->ssl); 262 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 774 eap_peer_tls_reset_input(&data->ssl); 795 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 800 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1016 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 1041 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret [all...] |
eap_ttls.c | 30 struct eap_ssl_data ssl; member in struct:eap_ttls_data 115 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 143 eap_peer_tls_ssl_deinit(sm, &data->ssl); 217 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 229 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 246 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 990 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, [all...] |
eap_fast.c | 34 struct eap_ssl_data ssl; member in struct:eap_fast_data 174 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { 175 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 180 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 194 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 234 eap_peer_tls_ssl_deinit(sm, &data->ssl); 267 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 293 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 794 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); 1127 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 28 struct eap_ssl_data ssl; member in struct:eap_ttls_data 305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", 320 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 321 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 337 eap_server_tls_ssl_deinit(sm, &data->ssl); 388 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 429 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 440 if (data->ssl.state == FRAG_ACK) { 445 if (data->ssl.state == WAIT_FRAG_ACK) { 446 return eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TTLS [all...] |
eap_server_fast.c | 32 struct eap_ssl_data ssl; member in struct:eap_fast_data 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 302 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 431 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 432 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 437 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn, 445 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 508 eap_server_tls_ssl_deinit(sm, &data->ssl); 550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 819 encr = eap_server_tls_encrypt(sm, &data->ssl, plain) [all...] |
eap_server_peap.c | 34 struct eap_ssl_data ssl; member in struct:eap_peap_data 182 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 183 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 199 eap_server_tls_ssl_deinit(sm, &data->ssl); 259 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 298 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 454 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 482 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 493 if (data->ssl.state == FRAG_ACK) [all...] |
/external/chromium/chrome/browser/tab_contents/ |
render_view_context_menu.cc | 1389 NavigationEntry::SSLStatus ssl; local [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 61 # Build the appropriate socket wrapper for ssl 63 import ssl # python 2.6 namespace 64 _ssl_wrap_socket = ssl.wrap_socket 67 ssl_sock = socket.ssl(sock, key_file, cert_file) 753 "This class allows communication via SSL." 763 "Connect to a host on a given (SSL) port." [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 61 # Build the appropriate socket wrapper for ssl 63 import ssl # python 2.6 namespace 64 _ssl_wrap_socket = ssl.wrap_socket 67 ssl_sock = socket.ssl(sock, key_file, cert_file) 753 "This class allows communication via SSL." 763 "Connect to a host on a given (SSL) port." [all...] |