/libcore/support/src/test/java/libcore/javax/net/ssl/ |
SSLDefaultConfigurationAsserts.java | 17 package libcore.javax.net.ssl; 24 import javax.net.ssl.SSLContext; 25 import javax.net.ssl.SSLEngine; 26 import javax.net.ssl.SSLParameters; 27 import javax.net.ssl.SSLServerSocket; 28 import javax.net.ssl.SSLServerSocketFactory; 29 import javax.net.ssl.SSLSocket; 30 import javax.net.ssl.SSLSocketFactory; 35 * Assertions about the default configuration of TLS/SSL primitives.
|
TestSSLEnginePair.java | 17 package libcore.javax.net.ssl; 21 import javax.net.ssl.SSLEngine; 22 import javax.net.ssl.SSLEngineResult; 23 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 24 import javax.net.ssl.SSLSession;
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
SSLContext1Test.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 30 import javax.net.ssl.KeyManager; 31 import javax.net.ssl.KeyManagerFactory; 32 import javax.net.ssl.SSLContext; 33 import javax.net.ssl.SSLContextSpi; 34 import javax.net.ssl.SSLEngine; 35 import javax.net.ssl.SSLParameters; 36 import javax.net.ssl.SSLPermission; 37 import javax.net.ssl.SSLSessionContext; 38 import javax.net.ssl.SSLServerSocketFactory [all...] |
SSLSocketTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 25 import javax.net.ssl.SSLParameters; 26 import javax.net.ssl.SSLSession; 27 import javax.net.ssl.SSLSocket; 28 import javax.net.ssl.HandshakeCompletedListener;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
TrustManagerFactorySpiTest.java | 16 package tests.api.javax.net.ssl; 25 import javax.net.ssl.ManagerFactoryParameters; 26 import javax.net.ssl.TrustManager; 27 import javax.net.ssl.TrustManagerFactory; 28 import javax.net.ssl.TrustManagerFactorySpi; 38 * javax.net.ssl.TrustManagerFactorySpi#TrustManagerFactorySpi() 51 * javax.net.ssl.TrustManagerFactorySpi#engineInit(KeyStore ks) 78 * javax.net.ssl.TrustManagerFactorySpi#engineInit(ManagerFactoryParameters spec) 105 * javax.net.ssl.TrustManagerFactorySpi#engineGetTrustManagers()
|
HandshakeCompletedEventTest.java | 18 package tests.api.javax.net.ssl; 29 import javax.net.ssl.HandshakeCompletedEvent; 30 import javax.net.ssl.HandshakeCompletedListener; 31 import javax.net.ssl.KeyManager; 32 import javax.net.ssl.KeyManagerFactory; 33 import javax.net.ssl.SSLContext; 34 import javax.net.ssl.SSLPeerUnverifiedException; 35 import javax.net.ssl.SSLServerSocket; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSocket [all...] |
HttpsURLConnectionTest.java | 19 package tests.api.javax.net.ssl; 28 import javax.net.ssl.HostnameVerifier; 29 import javax.net.ssl.HttpsURLConnection; 30 import javax.net.ssl.SSLPeerUnverifiedException; 31 import javax.net.ssl.SSLSession; 32 import javax.net.ssl.SSLSocketFactory; 47 * javax.net.ssl.HttpsURLConnection#HttpsURLConnection(java_net_URL) 55 * javax.net.ssl.HttpsURLConnection#getCipherSuite() 71 * javax.net.ssl.HttpsURLConnection#getLocalCertificates() 91 * javax.net.ssl.HttpsURLConnection#getDefaultHostnameVerifier( [all...] |
SSLSessionTest.java | 18 package tests.api.javax.net.ssl; 30 import javax.net.ssl.KeyManager; 31 import javax.net.ssl.KeyManagerFactory; 32 import javax.net.ssl.SSLContext; 33 import javax.net.ssl.SSLServerSocket; 34 import javax.net.ssl.SSLSession; 35 import javax.net.ssl.SSLSessionBindingEvent; 36 import javax.net.ssl.SSLSessionBindingListener; 37 import javax.net.ssl.SSLSocket; 38 import javax.net.ssl.TrustManager [all...] |
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
mySSLSession.java | 10 import javax.net.ssl.SSLPeerUnverifiedException; 11 import javax.net.ssl.SSLSessionBindingEvent; 12 import javax.net.ssl.SSLSessionBindingListener; 13 import javax.net.ssl.SSLSessionContext; 17 import javax.net.ssl.SSLSession;
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
EmailClientConnectionManager.java | 37 import javax.net.ssl.KeyManager; 41 * {@link android.security.KeyChain} for SSL connections. 66 boolean ssl = hostAuth.shouldUseSsl(); 72 ssl ? STANDARD_PORT : port)); 76 ssl ? port : STANDARD_SSL_PORT)); 80 ssl ? port : STANDARD_SSL_PORT)); 86 * Ensures that a client SSL certificate is known to be used for the specified connection 144 * Builds a unique scheme name for an SSL connection that uses a client user certificate. 155 * a client SSL certificate by any servers
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 22 struct eap_ssl_data ssl; member in struct:eap_tls_data 50 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { 51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 87 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, 89 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 114 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, 116 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 142 eap_peer_tls_ssl_deinit(sm, &data->ssl); 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 209 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_lib.c | 1 /*! \file ssl/ssl_lib.c 2 * \brief Version independent SSL functions. 7 * This package is an SSL implementation written 9 * The implementation was written so as to conform with Netscapes SSL. 14 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 167 (int (*)(SSL *,int))ssl_undefined_function, 168 (int (*)(SSL *, unsigned char *, int))ssl_undefined_function, 170 (int (*)(SSL *, unsigned char *, unsigned char *, int))ssl_undefined_function, 171 (int (*)(SSL*, int))ssl_undefined_function [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/conn/ssl/AbstractVerifier.java $ 32 package org.apache.http.conn.ssl; 50 import javax.net.ssl.DistinguishedNameParser; 51 import javax.net.ssl.SSLException; 52 import javax.net.ssl.SSLSession; 53 import javax.net.ssl.SSLSocket; 86 public final void verify(String host, SSLSocket ssl) 92 SSLSession session = ssl.getSession();
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_imaplib.py | 17 import ssl namespace 19 ssl = None variable 37 if ssl: 43 connstream = ssl.wrap_socket(newsocket, 72 # between naked sockets and SSL sockets. 174 @unittest.skipUnless(ssl, "SSL not available") 210 @unittest.skipUnless(ssl, "SSL not available") 224 if ssl [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_imaplib.py | 17 import ssl namespace 19 ssl = None variable 37 if ssl: 43 connstream = ssl.wrap_socket(newsocket, 72 # between naked sockets and SSL sockets. 174 @unittest.skipUnless(ssl, "SSL not available") 210 @unittest.skipUnless(ssl, "SSL not available") 224 if ssl [all...] |
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainTestActivity.java | 37 import javax.net.ssl.HttpsURLConnection; 38 import javax.net.ssl.KeyManager; 39 import javax.net.ssl.KeyManagerFactory; 40 import javax.net.ssl.SSLContext; 41 import javax.net.ssl.SSLSocketFactory; 42 import javax.net.ssl.TrustManager; 43 import javax.net.ssl.X509ExtendedKeyManager; 44 import javax.net.ssl.X509TrustManager; 46 import libcore.javax.net.ssl.TestSSLContext; 195 SSLContext serverContext = SSLContext.getInstance("SSL"); [all...] |
/external/ksoap2/ksoap2-j2se/src/main/java/org/ksoap2/transport/ |
HttpsServiceConnectionSE.java | 14 import javax.net.ssl.HostnameVerifier; 15 import javax.net.ssl.SSLSocketFactory; 16 import javax.net.ssl.HttpsURLConnection; 28 * @see "http://stackoverflow.com/questions/2820284/ssl-on-android-strange-issue" 29 * @see "http://stackoverflow.com/questions/2899079/custom-ssl-handling-stopped-working-on-android-2-2-froyo" 35 * SSL for the versions only e.g. with an approach like this.
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
PSKKeyManagerProxy.java | 17 package libcore.javax.net.ssl; 24 import javax.net.ssl.KeyManager; 25 import javax.net.ssl.SSLEngine;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
NativeCrypto.java | 40 import javax.net.ssl.SSLException; 592 // --- SSL handling -------------------------------------------------------- 624 * SSL). So we simply allow TLS_EMPTY_RENEGOTIATION_INFO_SCSV to [all...] |
ServerSessionContext.java | 19 import javax.net.ssl.SSLSession; 23 * sessions using the ID provided by an SSL client.
|
/external/apache-harmony/x-net/src/test/impl/java.injected/javax/net/ssl/ |
HttpsURLConnection_ImplTest.java | 18 package javax.net.ssl; 62 * @see javax.net.ssl.HttpsURLConnection#getCipherSuite() 70 * @see javax.net.ssl.HttpsURLConnection#getLocalCertificates() 78 * @see javax.net.ssl.HttpsURLConnection#getServerCertificates()
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
MyKeyManagerFactorySpi.java | 22 package javax.net.ssl;
|
MyTrustManagerFactorySpi.java | 22 package javax.net.ssl;
|
/external/chromium_org/net/base/ |
keygen_handler_openssl.cc | 7 #include <openssl/ssl.h>
|
/frameworks/base/core/java/android/net/ |
PskKeyManager.java | 22 import javax.net.ssl.SSLEngine; 29 * <p>TLS-PSK is a set of TLS/SSL cipher suites which rely on a symmetric pre-shared key (PSK) to 30 * secure the TLS/SSL connection and mutually authenticate its peers. These cipher suites may be 37 * <p>When a TLS-PSK cipher suite is used, both peers have to use the same key for the TLS/SSL 54 * <p>The high-level flow leading to peers choosing a key during TLS/SSL handshake is as follows: 103 // TLS/SSL JSSE provider (currently Conscrypt) cannot depend on Android framework classes.
|