OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:nss
(Results
1 - 25
of
32
) sorted by null
1
2
/external/chromium_org/crypto/
scoped_nss_types.h
9
#include <
nss
.h>
31
// Define some convenient scopers around
NSS
pointers.
hmac_nss.cc
7
#include <
nss
.h>
59
key_item.data = const_cast<unsigned char*>(key); //
NSS
API isn't const.
symmetric_key_nss.cc
7
#include <
nss
.h>
25
// algorithms available in
NSS
but not BoringSSL and vice
54
// algorithms available in
NSS
but not BoringSSL and vice
102
// algorithms available in
NSS
but not BoringSSL and vice
121
// The exact value of the |origin| argument doesn't matter to
NSS
as long as
nss_util.cc
8
#include <
nss
.h>
46
// USE_NSS means we use
NSS
for everything crypto-related. If USE_NSS is not
47
// defined, such as on Mac and Windows, we use
NSS
for SSL only -- we don't
48
// use
NSS
for crypto or certificate verification, and we don't use the
NSS
78
result = base::StringPrintf("
NSS
error code: %d", PR_GetError());
118
// This callback for
NSS
forwards all requests to a caller-specified
138
//
NSS
creates a local cache of the sqlite database if it detects that the
141
// (
NSS
bug https://bugzilla.mozilla.org/show_bug.cgi?id=578561). So we set
142
// the
NSS
environment variable NSS_SDB_USE_CACHE to "yes" to override NSS'
[
all
...]
/external/chromium_org/net/third_party/nss/patches/
applypatches.sh
6
# Run this script in the
nss
/lib/ssl directory in a
NSS
source tree.
8
# Point patches_dir to the src/net/third_party/
nss
/patches directory in a
10
patches_dir=/Users/wtc/chrome1/src/net/third_party/
nss
/patches
/external/wpa_supplicant_8/src/crypto/
crypto_nss.c
2
* Crypto wrapper functions for
NSS
17
#include <
nss
/sechash.h>
18
#include <
nss
/pk11pub.h>
68
wpa_printf(MSG_ERROR, "
NSS
: PK11_GetBestSlot failed");
78
wpa_printf(MSG_ERROR, "
NSS
: PK11_ImportSymKey failed");
84
wpa_printf(MSG_ERROR, "
NSS
: PK11_GenerateNewParam failed");
91
wpa_printf(MSG_ERROR, "
NSS
: PK11_CreateContextBySymKey("
98
wpa_printf(MSG_ERROR, "
NSS
: PK11_CipherOp failed");
tls_nss.c
2
* SSL/TLS interface functions for
NSS
19
#include <
nss
/
nss
.h>
20
#include <
nss
/nssilckt.h>
21
#include <
nss
/ssl.h>
22
#include <
nss
/pk11func.h>
23
#include <
nss
/secerr.h>
45
wpa_printf(MSG_DEBUG, "
NSS
: I/O close");
52
wpa_printf(MSG_DEBUG, "
NSS
: I/O read(%d)", amount);
59
wpa_printf(MSG_DEBUG, "
NSS
: I/O write(%d)", amount)
[
all
...]
/external/chromium_org/net/cert/
jwk_serializer_nss.cc
9
#include <
nss
.h>
28
//
NSS
gives the length as the bit length.
59
// anything, so the DER type isn't implied, and
NSS
includes it.)
102
// this is an OID is already clear, and
NSS
omits it here.)
ct_log_verifier_nss.cc
9
#include <
nss
.h>
x509_util_ios.cc
9
#include <
nss
.h>
24
// Creates an
NSS
certificate handle from |data|, which is |length| bytes in
test_root_certs_unittest.cc
18
#include <
nss
.h>
74
LOG(INFO) << "Skipping test for
NSS
3.14.2 -
NSS
3.15";
x509_certificate_ios.cc
13
#include <
nss
.h>
x509_certificate_nss.cc
10
#include <
nss
.h>
x509_util_nss.cc
11
#include <
nss
.h>
29
#include "crypto/third_party/
nss
/chromium-
nss
.h"
149
// The logic of this method references SignCert() in
NSS
utility certutil:
373
// Starting in
NSS
3.15, CERTGetNameFunc takes a const CERTName* argument.
381
// TODO(wtc):
NSS
has the CERT_GetOrgName, CERT_GetOrgUnitName, and
383
// general (the first) RDN.
NSS
doesn't have a function for the street
cert_verify_proc_nss.cc
11
#include <
nss
.h>
168
// Because of an
NSS
bug, CERT_PKIXVerifyCert may chain a self-signed
235
// http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/
nss
/lib/ckfw/builtins/constants.c&rev=1.13&mark=86,89#79
237
"
NSS
Builtin Objects");
495
// error reporting (
NSS
bug 528743), so we don't use it by default.
499
// SEC_ERROR_BAD_SIGNATURE error (
NSS
bug 524013), so we also retry with
533
// certificate policy (
NSS
bug 552775). So we retry with the certificate
591
// The certificate policy is unknown to
NSS
. We need to create a dynamic
597
//
NSS
doesn't allow us to pass an empty description, so I use a hardcoded,
746
// it to an
NSS
CERTCertificate
[
all
...]
/external/chromium_org/net/socket/
ssl_client_socket_nss.h
11
#include <
nss
.h>
48
// An SSL client socket implemented with Mozilla
NSS
.
58
// Because calls to
NSS
may block, such as due to needing to access slow
60
//
NSS
may optionally be run on a dedicated thread. If synchronous/blocking
118
// Helper class to handle marshalling any
NSS
interaction to and from the
119
//
NSS
and network task runners. Not every call needs to happen on the Core
133
// Initializes
NSS
SSL options. Returns a net error code.
164
// The task runner used to perform
NSS
operations.
196
// The
NSS
SSL state machine. This is owned by |core_|.
ssl_server_socket_nss.h
11
#include <
nss
.h>
124
// The
NSS
SSL state machine
nss_ssl_util.cc
7
#include <
nss
.h>
144
// Calculate the order of ciphers that we'll use for
NSS
sockets. (Note
151
// preference is inheriented from
NSS
. */
217
// Initialize the
NSS
SSL library if it isn't already initialized. This must
218
// be called before any other
NSS
SSL functions. This function is
219
// thread-safe, and the
NSS
SSL library will only ever be initialized once.
220
// The
NSS
SSL library will be properly shut down on program exit.
234
// Map a Chromium net error code to an
NSS
error code.
235
// See _MD_unix_map_default_error in the
NSS
source
277
// Maps an
NSS
error code to a network error code
[
all
...]
ssl_server_socket_nss.cc
22
#include <
nss
.h>
128
LOG(ERROR) << "Failed to initialize
NSS
";
311
// Transport connected, now hook it up to
nss
325
return ERR_OUT_OF_MEMORY; // TODO(port): map NSPR/
NSS
error code.
372
// This will fail if the specified cipher is not implemented by
NSS
, but
458
// The server's RSA private key must be imported into
NSS
with the
773
LOG(ERROR) << "handshake failed;
NSS
error code " << prerr
806
//
NSS
calls this if an incoming certificate needs to be verified.
816
// Tell
NSS
to not verify the certificate.
821
//
NSS
calls this when handshake is completed
[
all
...]
/external/chromium_org/net/http/
des.cc
13
#include <
nss
.h>
25
// DESSetKeyParity, DESMakeKey, and the Linux (
NSS
) version of DESEncrypt are
/external/chromium_org/net/ssl/
client_cert_store_nss.cc
7
#include <
nss
.h>
/hardware/libhardware_legacy/include/hardware_legacy/
link_layer_stats.h
85
u32
nss
:2; // 0:1x1, 1:2x2, 3:3x3, 4:4x4
member in struct:__anon41478
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
802.11.h
[
all
...]
/hardware/qcom/wlan/qcwcn/wifi_hal/
llstats.cpp
228
stats->rate.
nss
= nla_get_u8(tb_vendor[QCA_WLAN_VENDOR_ATTR_LL_STATS_RATE_NSS]);
242
ALOGI("STATS PEER_ALL :
nss
%u", stats->rate.
nss
);
[
all
...]
/external/chromium_org/content/child/webcrypto/test/
test_helpers.cc
29
#include <
nss
.h>
110
LOG(WARNING) << "RSA key import is not supported by this version of
NSS
. "
Completed in 5370 milliseconds
1
2