/frameworks/support/v7/recyclerview/tests/src/android/support/v7/widget/ |
GridLayoutManagerTest.java | 382 GridLayoutManager.SpanSizeLookup ssl = mGlm.mSpanSizeLookup; local 387 ssl.getSpanGroupIndex(position, mGlm.getSpanCount()), 390 ssl.getSpanIndex(position, mGlm.getSpanCount()), 393 ssl.getSpanSize(position), 524 final GridLayoutManager.SpanSizeLookup ssl local 534 ssl.setSpanIndexCacheEnabled(true); 535 assertEquals("reference child non existent", -1, ssl.findReferenceIndexFromCache(2)); 536 ssl.getCachedSpanIndex(4, 5); 537 assertEquals("reference child non existent", -1, ssl.findReferenceIndexFromCache(3)); 539 assertEquals("reference child itself", -1, ssl.findReferenceIndexFromCache(4)) 562 final GridLayoutManager.SpanSizeLookup ssl local 702 final GridLayoutManager.SpanSizeLookup ssl local 726 final GridLayoutManager.SpanSizeLookup ssl = mGlm.getSpanSizeLookup(); local 835 GridLayoutManager.SpanSizeLookup ssl = mGlm.mSpanSizeLookup; local [all...] |
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
SSLContext1Test.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 30 import javax.net.ssl.KeyManager; 31 import javax.net.ssl.KeyManagerFactory; 32 import javax.net.ssl.SSLContext; 33 import javax.net.ssl.SSLContextSpi; 34 import javax.net.ssl.SSLEngine; 35 import javax.net.ssl.SSLParameters; 36 import javax.net.ssl.SSLPermission; 37 import javax.net.ssl.SSLSessionContext; 38 import javax.net.ssl.SSLServerSocketFactory [all...] |
SSLEngineTest.java | 18 package org.apache.harmony.xnet.tests.javax.net.ssl; 23 import javax.net.ssl.SSLEngine; 24 import javax.net.ssl.SSLException; 25 import javax.net.ssl.SSLParameters; 26 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 27 import javax.net.ssl.SSLSession; 28 import javax.net.ssl.SSLEngineResult;
|
/external/jetty/src/java/org/eclipse/jetty/server/ssl/ |
SslSelectChannelConnector.java | 19 package org.eclipse.jetty.server.ssl; 24 import javax.net.ssl.SSLContext; 25 import javax.net.ssl.SSLEngine; 26 import javax.net.ssl.SSLSession; 27 import javax.net.ssl.SSLSocket; 42 import org.eclipse.jetty.util.ssl.SslContextFactory; 48 * @org.apache.xbean.XBean element="sslConnector" description="Creates an NIO ssl connector" 80 * This allows the required attributes to be set for SSL requests. <br> 117 * @return True if SSL re-negotiation is allowed (default false) 128 * Set if SSL re-negotiation is allowed. CVE-2009-3555 discovere [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
KeyManagerFactory1Test.java | 18 package org.apache.harmony.tests.javax.net.ssl; 31 import javax.net.ssl.KeyStoreBuilderParameters; 32 import javax.net.ssl.ManagerFactoryParameters; 33 import javax.net.ssl.KeyManager; 34 import javax.net.ssl.KeyManagerFactory; 35 import javax.net.ssl.KeyManagerFactorySpi; 65 .getProperty("ssl.KeyManagerFactory.algorithm"); 98 * avax.net.ssl.KeyManagerFactory#getAlgorithm() 134 Security.setProperty("ssl.KeyManagerFactory.algorithm", defA); 140 Security.setProperty("ssl.KeyManagerFactory.algorithm", def) [all...] |
SSLContext1Test.java | 18 package org.apache.harmony.tests.javax.net.ssl; 30 import javax.net.ssl.KeyManager; 31 import javax.net.ssl.KeyManagerFactory; 32 import javax.net.ssl.SSLContext; 33 import javax.net.ssl.SSLContextSpi; 34 import javax.net.ssl.SSLEngine; 35 import javax.net.ssl.SSLServerSocketFactory; 36 import javax.net.ssl.SSLSessionContext; 37 import javax.net.ssl.SSLSocketFactory; 38 import javax.net.ssl.TrustManager [all...] |
TrustManagerFactory1Test.java | 18 package org.apache.harmony.tests.javax.net.ssl; 36 import javax.net.ssl.CertPathTrustManagerParameters; 37 import javax.net.ssl.ManagerFactoryParameters; 38 import javax.net.ssl.TrustManager; 39 import javax.net.ssl.TrustManagerFactory; 40 import javax.net.ssl.TrustManagerFactorySpi; 82 DEFAULT_ALGORITHM = Security.getProperty("ssl.TrustManagerFactory.algorithm"); 156 Security.setProperty("ssl.TrustManagerFactory.algorithm", defA); 162 Security.setProperty("ssl.TrustManagerFactory.algorithm", def); 169 * Assertions: returns security property "ssl.TrustManagerFactory.algorithm" [all...] |
HandshakeCompletedEventTest.java | 18 package org.apache.harmony.tests.javax.net.ssl; 29 import javax.net.ssl.HandshakeCompletedEvent; 30 import javax.net.ssl.HandshakeCompletedListener; 31 import javax.net.ssl.KeyManager; 32 import javax.net.ssl.KeyManagerFactory; 33 import javax.net.ssl.SSLContext; 34 import javax.net.ssl.SSLPeerUnverifiedException; 35 import javax.net.ssl.SSLServerSocket; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSocket [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
SSLContextTest.java | 17 package libcore.javax.net.ssl; 35 import javax.net.ssl.KeyManager; 36 import javax.net.ssl.KeyManagerFactory; 37 import javax.net.ssl.KeyManagerFactorySpi; 38 import javax.net.ssl.ManagerFactoryParameters; 39 import javax.net.ssl.SSLContext; 40 import javax.net.ssl.SSLEngine; 41 import javax.net.ssl.SSLServerSocket; 42 import javax.net.ssl.SSLServerSocketFactory; 43 import javax.net.ssl.SSLSessionContext [all...] |
DefaultHostnameVerifierTest.java | 17 package libcore.javax.net.ssl; 34 import javax.net.ssl.HostnameVerifier; 35 import javax.net.ssl.HttpsURLConnection; 36 import javax.net.ssl.SSLPeerUnverifiedException; 37 import javax.net.ssl.SSLSession; 38 import javax.net.ssl.SSLSessionContext; [all...] |
SSLEngineTest.java | 17 package libcore.javax.net.ssl; 24 import javax.net.ssl.KeyManager; 25 import javax.net.ssl.SSLContext; 26 import javax.net.ssl.SSLEngine; 27 import javax.net.ssl.SSLEngineResult; 28 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 29 import javax.net.ssl.SSLException; 30 import javax.net.ssl.SSLHandshakeException; 31 import javax.net.ssl.SSLParameters; 32 import javax.net.ssl.SSLSession [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 170 import ssl namespace 640 raise RuntimeError("No SSL support included in this Python") 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 762 """ This is a subclass derived from SMTP that connects over an SSL encrypted 763 socket (to use this class you need a socket module that was compiled with SSL 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 767 certificate chain file for the SSL connection. 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
ftplib.py | 595 import ssl namespace 632 ssl_version = ssl.PROTOCOL_TLSv1 642 if secure and not isinstance(self.sock, ssl.SSLSocket): 647 '''Set up secure control connection by using TLS/SSL.''' 648 if isinstance(self.sock, ssl.SSLSocket): 650 if self.ssl_version == ssl.PROTOCOL_TLSv1: 653 resp = self.voidcmd('AUTH SSL') 654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile, 686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile, 699 # shutdown ssl laye [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_poplib.py | 225 import ssl namespace 234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE, 247 except ssl.SSLError, err: 248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 249 ssl.SSL_ERROR_WANT_WRITE): 251 elif err.args[0] == ssl.SSL_ERROR_EOF:
|
test_ssl.py | 1 # Test the support for SSL and sockets 23 ssl = test_support.import_module("ssl") variable 40 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 56 if hasattr(ssl, 'PROTOCOL_SSLv2'): 58 # implicit SSL context without trying to connect or listen. 69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None) 70 except ssl.SSLError as e [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 170 import ssl namespace 640 raise RuntimeError("No SSL support included in this Python") 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 762 """ This is a subclass derived from SMTP that connects over an SSL encrypted 763 socket (to use this class you need a socket module that was compiled with SSL 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 767 certificate chain file for the SSL connection. 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
ftplib.py | 595 import ssl namespace 632 ssl_version = ssl.PROTOCOL_TLSv1 642 if secure and not isinstance(self.sock, ssl.SSLSocket): 647 '''Set up secure control connection by using TLS/SSL.''' 648 if isinstance(self.sock, ssl.SSLSocket): 650 if self.ssl_version == ssl.PROTOCOL_TLSv1: 653 resp = self.voidcmd('AUTH SSL') 654 self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile, 686 conn = ssl.wrap_socket(conn, self.keyfile, self.certfile, 699 # shutdown ssl laye [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_poplib.py | 225 import ssl namespace 234 self.socket = ssl.wrap_socket(self.socket, certfile=CERTFILE, 247 except ssl.SSLError, err: 248 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 249 ssl.SSL_ERROR_WANT_WRITE): 251 elif err.args[0] == ssl.SSL_ERROR_EOF:
|
test_ssl.py | 1 # Test the support for SSL and sockets 23 ssl = test_support.import_module("ssl") variable 40 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 47 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 56 if hasattr(ssl, 'PROTOCOL_SSLv2'): 58 # implicit SSL context without trying to connect or listen. 69 ssl.CERT_NONE, ssl.PROTOCOL_SSLv2, None, None) 70 except ssl.SSLError as e [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 164 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 190 eap_peer_tls_ssl_deinit(sm, &data->ssl); 270 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 753 eap_peer_tls_reset_input(&data->ssl); 774 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 947 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 973 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret [all...] |
eap_fast.c | 34 struct eap_ssl_data ssl; member in struct:eap_fast_data 176 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { 177 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 182 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 196 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 244 eap_peer_tls_ssl_deinit(sm, &data->ssl); 279 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 306 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); 1147 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST [all...] |
eap_ttls.c | 30 struct eap_ssl_data ssl; member in struct:eap_ttls_data 115 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 152 eap_peer_tls_ssl_deinit(sm, &data->ssl); 226 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 242 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 259 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 993 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 154 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 155 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 171 eap_server_tls_ssl_deinit(sm, &data->ssl); 229 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 268 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 301 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 424 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 452 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 463 if (data->ssl.state == FRAG_ACK) [all...] |
eap_server_ttls.c | 28 struct eap_ssl_data ssl; member in struct:eap_ttls_data 305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", 320 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 321 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 337 eap_server_tls_ssl_deinit(sm, &data->ssl); 388 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 429 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 440 if (data->ssl.state == FRAG_ACK) { 445 if (data->ssl.state == WAIT_FRAG_ACK) { 446 return eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TTLS [all...] |
eap_server_fast.c | 32 struct eap_ssl_data ssl; member in struct:eap_fast_data 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 302 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 431 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 432 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 437 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn, 445 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 508 eap_server_tls_ssl_deinit(sm, &data->ssl); 550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 819 encr = eap_server_tls_encrypt(sm, &data->ssl, plain) [all...] |