HomeSort by relevance Sort by last modified time
    Searched refs:nss (Results 1 - 25 of 32) sorted by null

1 2

  /external/chromium_org/crypto/
scoped_nss_types.h 9 #include <nss.h>
31 // Define some convenient scopers around NSS pointers.
hmac_nss.cc 7 #include <nss.h>
59 key_item.data = const_cast<unsigned char*>(key); // NSS API isn't const.
symmetric_key_nss.cc 7 #include <nss.h>
25 // algorithms available in NSS but not BoringSSL and vice
54 // algorithms available in NSS but not BoringSSL and vice
102 // algorithms available in NSS but not BoringSSL and vice
121 // The exact value of the |origin| argument doesn't matter to NSS as long as
nss_util.cc 8 #include <nss.h>
46 // USE_NSS means we use NSS for everything crypto-related. If USE_NSS is not
47 // defined, such as on Mac and Windows, we use NSS for SSL only -- we don't
48 // use NSS for crypto or certificate verification, and we don't use the NSS
78 result = base::StringPrintf("NSS error code: %d", PR_GetError());
118 // This callback for NSS forwards all requests to a caller-specified
138 // NSS creates a local cache of the sqlite database if it detects that the
141 // (NSS bug https://bugzilla.mozilla.org/show_bug.cgi?id=578561). So we set
142 // the NSS environment variable NSS_SDB_USE_CACHE to "yes" to override NSS'
    [all...]
  /external/chromium_org/net/third_party/nss/patches/
applypatches.sh 6 # Run this script in the nss/lib/ssl directory in a NSS source tree.
8 # Point patches_dir to the src/net/third_party/nss/patches directory in a
10 patches_dir=/Users/wtc/chrome1/src/net/third_party/nss/patches
  /external/wpa_supplicant_8/src/crypto/
crypto_nss.c 2 * Crypto wrapper functions for NSS
17 #include <nss/sechash.h>
18 #include <nss/pk11pub.h>
68 wpa_printf(MSG_ERROR, "NSS: PK11_GetBestSlot failed");
78 wpa_printf(MSG_ERROR, "NSS: PK11_ImportSymKey failed");
84 wpa_printf(MSG_ERROR, "NSS: PK11_GenerateNewParam failed");
91 wpa_printf(MSG_ERROR, "NSS: PK11_CreateContextBySymKey("
98 wpa_printf(MSG_ERROR, "NSS: PK11_CipherOp failed");
tls_nss.c 2 * SSL/TLS interface functions for NSS
19 #include <nss/nss.h>
20 #include <nss/nssilckt.h>
21 #include <nss/ssl.h>
22 #include <nss/pk11func.h>
23 #include <nss/secerr.h>
45 wpa_printf(MSG_DEBUG, "NSS: I/O close");
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount)
    [all...]
  /external/chromium_org/net/cert/
jwk_serializer_nss.cc 9 #include <nss.h>
28 // NSS gives the length as the bit length.
59 // anything, so the DER type isn't implied, and NSS includes it.)
102 // this is an OID is already clear, and NSS omits it here.)
ct_log_verifier_nss.cc 9 #include <nss.h>
x509_util_ios.cc 9 #include <nss.h>
24 // Creates an NSS certificate handle from |data|, which is |length| bytes in
test_root_certs_unittest.cc 18 #include <nss.h>
74 LOG(INFO) << "Skipping test for NSS 3.14.2 - NSS 3.15";
x509_certificate_ios.cc 13 #include <nss.h>
x509_certificate_nss.cc 10 #include <nss.h>
x509_util_nss.cc 11 #include <nss.h>
29 #include "crypto/third_party/nss/chromium-nss.h"
149 // The logic of this method references SignCert() in NSS utility certutil:
373 // Starting in NSS 3.15, CERTGetNameFunc takes a const CERTName* argument.
381 // TODO(wtc): NSS has the CERT_GetOrgName, CERT_GetOrgUnitName, and
383 // general (the first) RDN. NSS doesn't have a function for the street
cert_verify_proc_nss.cc 11 #include <nss.h>
168 // Because of an NSS bug, CERT_PKIXVerifyCert may chain a self-signed
235 // http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ckfw/builtins/constants.c&rev=1.13&mark=86,89#79
237 "NSS Builtin Objects");
495 // error reporting (NSS bug 528743), so we don't use it by default.
499 // SEC_ERROR_BAD_SIGNATURE error (NSS bug 524013), so we also retry with
533 // certificate policy (NSS bug 552775). So we retry with the certificate
591 // The certificate policy is unknown to NSS. We need to create a dynamic
597 // NSS doesn't allow us to pass an empty description, so I use a hardcoded,
746 // it to an NSS CERTCertificate
    [all...]
  /external/chromium_org/net/socket/
ssl_client_socket_nss.h 11 #include <nss.h>
48 // An SSL client socket implemented with Mozilla NSS.
58 // Because calls to NSS may block, such as due to needing to access slow
60 // NSS may optionally be run on a dedicated thread. If synchronous/blocking
118 // Helper class to handle marshalling any NSS interaction to and from the
119 // NSS and network task runners. Not every call needs to happen on the Core
133 // Initializes NSS SSL options. Returns a net error code.
164 // The task runner used to perform NSS operations.
196 // The NSS SSL state machine. This is owned by |core_|.
ssl_server_socket_nss.h 11 #include <nss.h>
124 // The NSS SSL state machine
nss_ssl_util.cc 7 #include <nss.h>
144 // Calculate the order of ciphers that we'll use for NSS sockets. (Note
151 // preference is inheriented from NSS. */
217 // Initialize the NSS SSL library if it isn't already initialized. This must
218 // be called before any other NSS SSL functions. This function is
219 // thread-safe, and the NSS SSL library will only ever be initialized once.
220 // The NSS SSL library will be properly shut down on program exit.
234 // Map a Chromium net error code to an NSS error code.
235 // See _MD_unix_map_default_error in the NSS source
277 // Maps an NSS error code to a network error code
    [all...]
ssl_server_socket_nss.cc 22 #include <nss.h>
128 LOG(ERROR) << "Failed to initialize NSS";
311 // Transport connected, now hook it up to nss
325 return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR/NSS error code.
372 // This will fail if the specified cipher is not implemented by NSS, but
458 // The server's RSA private key must be imported into NSS with the
773 LOG(ERROR) << "handshake failed; NSS error code " << prerr
806 // NSS calls this if an incoming certificate needs to be verified.
816 // Tell NSS to not verify the certificate.
821 // NSS calls this when handshake is completed
    [all...]
  /external/chromium_org/net/http/
des.cc 13 #include <nss.h>
25 // DESSetKeyParity, DESMakeKey, and the Linux (NSS) version of DESEncrypt are
  /external/chromium_org/net/ssl/
client_cert_store_nss.cc 7 #include <nss.h>
  /hardware/libhardware_legacy/include/hardware_legacy/
link_layer_stats.h 85 u32 nss :2; // 0:1x1, 1:2x2, 3:3x3, 4:4x4 member in struct:__anon41478
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
802.11.h     [all...]
  /hardware/qcom/wlan/qcwcn/wifi_hal/
llstats.cpp 228 stats->rate.nss = nla_get_u8(tb_vendor[QCA_WLAN_VENDOR_ATTR_LL_STATS_RATE_NSS]);
242 ALOGI("STATS PEER_ALL : nss %u", stats->rate.nss);
    [all...]
  /external/chromium_org/content/child/webcrypto/test/
test_helpers.cc 29 #include <nss.h>
110 LOG(WARNING) << "RSA key import is not supported by this version of NSS. "

Completed in 5370 milliseconds

1 2