HomeSort by relevance Sort by last modified time
    Searched defs:ssl (Results 176 - 200 of 268) sorted by null

1 2 3 4 5 6 78 91011

  /frameworks/support/v7/recyclerview/tests/src/android/support/v7/widget/
GridLayoutManagerTest.java 382 GridLayoutManager.SpanSizeLookup ssl = mGlm.mSpanSizeLookup; local
387 ssl.getSpanGroupIndex(position, mGlm.getSpanCount()),
390 ssl.getSpanIndex(position, mGlm.getSpanCount()),
393 ssl.getSpanSize(position),
524 final GridLayoutManager.SpanSizeLookup ssl local
534 ssl.setSpanIndexCacheEnabled(true);
535 assertEquals("reference child non existent", -1, ssl.findReferenceIndexFromCache(2));
536 ssl.getCachedSpanIndex(4, 5);
537 assertEquals("reference child non existent", -1, ssl.findReferenceIndexFromCache(3));
539 assertEquals("reference child itself", -1, ssl.findReferenceIndexFromCache(4))
562 final GridLayoutManager.SpanSizeLookup ssl local
702 final GridLayoutManager.SpanSizeLookup ssl local
726 final GridLayoutManager.SpanSizeLookup ssl = mGlm.getSpanSizeLookup(); local
835 GridLayoutManager.SpanSizeLookup ssl = mGlm.mSpanSizeLookup; local
    [all...]
  /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
SSLContext1Test.java 18 package org.apache.harmony.xnet.tests.javax.net.ssl;
30 import javax.net.ssl.KeyManager;
31 import javax.net.ssl.KeyManagerFactory;
32 import javax.net.ssl.SSLContext;
33 import javax.net.ssl.SSLContextSpi;
34 import javax.net.ssl.SSLEngine;
35 import javax.net.ssl.SSLParameters;
36 import javax.net.ssl.SSLPermission;
37 import javax.net.ssl.SSLSessionContext;
38 import javax.net.ssl.SSLServerSocketFactory
    [all...]
SSLEngineTest.java 18 package org.apache.harmony.xnet.tests.javax.net.ssl;
23 import javax.net.ssl.SSLEngine;
24 import javax.net.ssl.SSLException;
25 import javax.net.ssl.SSLParameters;
26 import javax.net.ssl.SSLEngineResult.HandshakeStatus;
27 import javax.net.ssl.SSLSession;
28 import javax.net.ssl.SSLEngineResult;
  /external/jetty/src/java/org/eclipse/jetty/server/ssl/
SslSelectChannelConnector.java 19 package org.eclipse.jetty.server.ssl;
24 import javax.net.ssl.SSLContext;
25 import javax.net.ssl.SSLEngine;
26 import javax.net.ssl.SSLSession;
27 import javax.net.ssl.SSLSocket;
42 import org.eclipse.jetty.util.ssl.SslContextFactory;
48 * @org.apache.xbean.XBean element="sslConnector" description="Creates an NIO ssl connector"
80 * This allows the required attributes to be set for SSL requests. <br>
117 * @return True if SSL re-negotiation is allowed (default false)
128 * Set if SSL re-negotiation is allowed. CVE-2009-3555 discovere
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
KeyManagerFactory1Test.java 18 package org.apache.harmony.tests.javax.net.ssl;
31 import javax.net.ssl.KeyStoreBuilderParameters;
32 import javax.net.ssl.ManagerFactoryParameters;
33 import javax.net.ssl.KeyManager;
34 import javax.net.ssl.KeyManagerFactory;
35 import javax.net.ssl.KeyManagerFactorySpi;
65 .getProperty("ssl.KeyManagerFactory.algorithm");
98 * avax.net.ssl.KeyManagerFactory#getAlgorithm()
134 Security.setProperty("ssl.KeyManagerFactory.algorithm", defA);
140 Security.setProperty("ssl.KeyManagerFactory.algorithm", def)
    [all...]
SSLContext1Test.java 18 package org.apache.harmony.tests.javax.net.ssl;
30 import javax.net.ssl.KeyManager;
31 import javax.net.ssl.KeyManagerFactory;
32 import javax.net.ssl.SSLContext;
33 import javax.net.ssl.SSLContextSpi;
34 import javax.net.ssl.SSLEngine;
35 import javax.net.ssl.SSLServerSocketFactory;
36 import javax.net.ssl.SSLSessionContext;
37 import javax.net.ssl.SSLSocketFactory;
38 import javax.net.ssl.TrustManager
    [all...]
TrustManagerFactory1Test.java 18 package org.apache.harmony.tests.javax.net.ssl;
36 import javax.net.ssl.CertPathTrustManagerParameters;
37 import javax.net.ssl.ManagerFactoryParameters;
38 import javax.net.ssl.TrustManager;
39 import javax.net.ssl.TrustManagerFactory;
40 import javax.net.ssl.TrustManagerFactorySpi;
82 DEFAULT_ALGORITHM = Security.getProperty("ssl.TrustManagerFactory.algorithm");
156 Security.setProperty("ssl.TrustManagerFactory.algorithm", defA);
162 Security.setProperty("ssl.TrustManagerFactory.algorithm", def);
169 * Assertions: returns security property "ssl.TrustManagerFactory.algorithm"
    [all...]
HandshakeCompletedEventTest.java 18 package org.apache.harmony.tests.javax.net.ssl;
29 import javax.net.ssl.HandshakeCompletedEvent;
30 import javax.net.ssl.HandshakeCompletedListener;
31 import javax.net.ssl.KeyManager;
32 import javax.net.ssl.KeyManagerFactory;
33 import javax.net.ssl.SSLContext;
34 import javax.net.ssl.SSLPeerUnverifiedException;
35 import javax.net.ssl.SSLServerSocket;
36 import javax.net.ssl.SSLSession;
37 import javax.net.ssl.SSLSocket
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
SSLContextTest.java 17 package libcore.javax.net.ssl;
35 import javax.net.ssl.KeyManager;
36 import javax.net.ssl.KeyManagerFactory;
37 import javax.net.ssl.KeyManagerFactorySpi;
38 import javax.net.ssl.ManagerFactoryParameters;
39 import javax.net.ssl.SSLContext;
40 import javax.net.ssl.SSLEngine;
41 import javax.net.ssl.SSLServerSocket;
42 import javax.net.ssl.SSLServerSocketFactory;
43 import javax.net.ssl.SSLSessionContext
    [all...]
DefaultHostnameVerifierTest.java 17 package libcore.javax.net.ssl;
34 import javax.net.ssl.HostnameVerifier;
35 import javax.net.ssl.HttpsURLConnection;
36 import javax.net.ssl.SSLPeerUnverifiedException;
37 import javax.net.ssl.SSLSession;
38 import javax.net.ssl.SSLSessionContext;
    [all...]
SSLEngineTest.java 17 package libcore.javax.net.ssl;
24 import javax.net.ssl.KeyManager;
25 import javax.net.ssl.SSLContext;
26 import javax.net.ssl.SSLEngine;
27 import javax.net.ssl.SSLEngineResult;
28 import javax.net.ssl.SSLEngineResult.HandshakeStatus;
29 import javax.net.ssl.SSLException;
30 import javax.net.ssl.SSLHandshakeException;
31 import javax.net.ssl.SSLParameters;
32 import javax.net.ssl.SSLSession
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
smtplib.py 170 import ssl namespace
640 raise RuntimeError("No SSL support included in this Python")
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
762 """ This is a subclass derived from SMTP that connects over an SSL encrypted
763 socket (to use this class you need a socket module that was compiled with SSL
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
767 certificate chain file for the SSL connection.
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
ftplib.py 595 import ssl namespace
632 ssl_version = ssl.PROTOCOL_TLSv1
642 if secure and not isinstance(self.sock, ssl.SSLSocket):
647 '''Set up secure control connection by using TLS/SSL.'''
648 if isinstance(self.sock, ssl.SSLSocket):
650 if self.ssl_version == ssl.PROTOCOL_TLSv1:
653 resp = self.voidcmd('AUTH SSL')
654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile,
686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile,
699 # shutdown ssl laye
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_poplib.py 225 import ssl namespace
234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE,
247 except ssl.SSLError, err:
248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
249 ssl.SSL_ERROR_WANT_WRITE):
251 elif err.args[0] == ssl.SSL_ERROR_EOF:
test_ssl.py 1 # Test the support for SSL and sockets
23 ssl = test_support.import_module("ssl") variable
40 ssl.sslwrap_simple(socket.socket(socket.AF_INET))
47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock)
56 if hasattr(ssl, 'PROTOCOL_SSLv2'):
58 # implicit SSL context without trying to connect or listen.
69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None)
70 except ssl.SSLError as e
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
smtplib.py 170 import ssl namespace
640 raise RuntimeError("No SSL support included in this Python")
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
762 """ This is a subclass derived from SMTP that connects over an SSL encrypted
763 socket (to use this class you need a socket module that was compiled with SSL
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
767 certificate chain file for the SSL connection.
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
ftplib.py 595 import ssl namespace
632 ssl_version = ssl.PROTOCOL_TLSv1
642 if secure and not isinstance(self.sock, ssl.SSLSocket):
647 '''Set up secure control connection by using TLS/SSL.'''
648 if isinstance(self.sock, ssl.SSLSocket):
650 if self.ssl_version == ssl.PROTOCOL_TLSv1:
653 resp = self.voidcmd('AUTH SSL')
654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile,
686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile,
699 # shutdown ssl laye
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_poplib.py 225 import ssl namespace
234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE,
247 except ssl.SSLError, err:
248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
249 ssl.SSL_ERROR_WANT_WRITE):
251 elif err.args[0] == ssl.SSL_ERROR_EOF:
test_ssl.py 1 # Test the support for SSL and sockets
23 ssl = test_support.import_module("ssl") variable
40 ssl.sslwrap_simple(socket.socket(socket.AF_INET))
47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock)
56 if hasattr(ssl, 'PROTOCOL_SSLv2'):
58 # implicit SSL context without trying to connect or listen.
69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None)
70 except ssl.SSLError as e
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 33 struct eap_ssl_data ssl; member in struct:eap_peap_data
163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) {
164 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL.");
190 eap_peer_tls_ssl_deinit(sm, &data->ssl);
270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) {
753 eap_peer_tls_reset_input(&data->ssl);
774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
973 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret
    [all...]
eap_fast.c 34 struct eap_ssl_data ssl; member in struct:eap_fast_data
176 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) {
177 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");
182 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,
196 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) {
244 eap_peer_tls_ssl_deinit(sm, &data->ssl);
279 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion",
306 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,
811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len);
1147 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST
    [all...]
eap_ttls.c 30 struct eap_ssl_data ssl; member in struct:eap_ttls_data
115 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) {
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
152 eap_peer_tls_ssl_deinit(sm, &data->ssl);
226 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
242 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
259 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len);
993 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 33 struct eap_ssl_data ssl; member in struct:eap_peap_data
154 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
155 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL.");
171 eap_server_tls_ssl_deinit(sm, &data->ssl);
229 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf);
268 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf);
301 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
424 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf);
452 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf);
463 if (data->ssl.state == FRAG_ACK)
    [all...]
eap_server_ttls.c 28 struct eap_ssl_data ssl; member in struct:eap_ttls_data
305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge",
320 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
321 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
337 eap_server_tls_ssl_deinit(sm, &data->ssl);
388 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf);
429 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf);
440 if (data->ssl.state == FRAG_ACK) {
445 if (data->ssl.state == WAIT_FRAG_ACK) {
446 return eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TTLS
    [all...]
eap_server_fast.c 32 struct eap_ssl_data ssl; member in struct:eap_fast_data
276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion",
302 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,
431 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
432 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");
437 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn,
445 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,
508 eap_server_tls_ssl_deinit(sm, &data->ssl);
550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
819 encr = eap_server_tls_encrypt(sm, &data->ssl, plain)
    [all...]

Completed in 882 milliseconds

1 2 3 4 5 6 78 91011