/external/webrtc/webrtc/base/ |
openssl.h | 14 #include <openssl/ssl.h> 17 #error OpenSSL is older than 1.0.0, which is the minimum supported version.
|
/external/boringssl/ |
flavor.mk | 2 # they can detect whether BoringSSL or OpenSSL is being used.
|
/libcore/benchmarks/src/benchmarks/regression/ |
SignatureBenchmark.java | 54 public enum Implementation { OpenSSL, BouncyCastle }; 95 case OpenSSL: 114 case OpenSSL:
|
KeyPairGeneratorBenchmark.java | 35 public enum Implementation { OpenSSL, BouncyCastle };
|
CipherBenchmark.java | 80 public enum Implementation { OpenSSL, BouncyCastle }; 113 case OpenSSL:
|
/external/boringssl/linux-arm/crypto/sha/ |
sha256-armv4.S | 4 @ Written by Andy Polyakov <appro@openssl.org> for the OpenSSL 5 @ project. The module is, however, dual licensed under OpenSSL and 7 @ details see http://www.openssl.org/~appro/cryptogams/. 41 # include <openssl/arm_arch.h> [all...] |
sha512-armv4.S | 4 @ Written by Andy Polyakov <appro@openssl.org> for the OpenSSL 5 @ project. The module is, however, dual licensed under OpenSSL and 7 @ details see http://www.openssl.org/~appro/cryptogams/. 39 @ not be observed, see http://www.openssl.org/~appro/Snapdragon-S4.html 50 # include <openssl/arm_arch.h> [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
crypt.py | 42 """Import OpenSSL, avoiding the explicit import where possible. 44 Importing OpenSSL 0.14 can take up to 0.5s, which is a large price 56 ImportError if OpenSSL is unavailable. 60 _ = imp.find_module('OpenSSL') 63 import OpenSSL 76 pubkey, OpenSSL.crypto.PKey, The public key to verify with. 91 from OpenSSL import crypto 113 OpenSSL.crypto.Error if the key_pem can't be parsed. 115 from OpenSSL import crypto 130 pkey, OpenSSL.crypto.PKey (or equiv), The private key to sign with [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_crypt.py | 68 if m.startswith('OpenSSL'): 78 import OpenSSL 82 from OpenSSL import crypto
|
/external/curl/packages/vms/ |
build_vms.com | 8 $! If OPENSSL is defined, but SSL$INCLUDE is not, then OpenSSL will be 21 $! Note, you must match the pointer size that the OpenSSL 49 $! Note, you must match the pointer size that the OpenSSL 51 $! correct HP OpenSSL image. 53 $! OSSLOLB Use OpenSSL object libraries (.OLB), even if shared 96 $! Added OSSLOLB option, and support for OpenSSL 102 $! here, eliminating the hard-coded OpenSSL nonsense. 276 $ openssl = 0 550 $ if (f$trnlnm("OPENSSL") .nes. "" [all...] |
gnv_link_curl.com | 96 $! Need to build the module to test the HP OpenSSL version 149 $ curl_ssl_version = "OpenSSL/0.9.6g" 151 $ write sys$output "HP OpenSSL Shared images not found!" 157 $! "OpenSSL 0.9.8w 23 Apr 2012" 201 " HP OpenSSL version of ""''hp_ssl_version'"" is too old for shared libcurl!" 204 $ write sys$output "Unable to get version of HP OpenSSL" 237 "GNV OpenSSL version of ""''gnv_ssl_version'" is too old for shared libcurl!" 252 $ write sys$output "Unable to get version of GNV OpenSSL" 255 $! Need to write a release note section about HP OpenSSL 259 This package is built on with the OpenSSL version listed below and require [all...] |
/external/libweave/third_party/chromium/build/ |
build_config.h | 79 #error Cannot use both OpenSSL and NSS
|
/external/libchrome/build/ |
build_config.h | 101 #error Cannot use both OpenSSL and NSS for certificates
|
/system/extras/perfprofd/quipper/build/ |
build_config.h | 56 #error Cannot use both OpenSSL and NSS
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
signurl.py | 46 # Check for openssl. 48 from OpenSSL.crypto import load_pkcs12 49 from OpenSSL.crypto import sign
|
/external/wpa_supplicant_8/wpa_supplicant/ |
nmake.mak | 14 # Root directory for OpenSSL 15 # (http://www.openssl.org/source/openssl-0.9.8a.tar.gz) 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to 18 # support it (openssl-tls-extensions.patch) 20 # installation package for OpenSSL. 21 OPENSSLDIR=C:\dev\openssl 172 # If using Win32 OpenSSL binary installation from Shining Light Productions,
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt.go | 8 // generate a key from the password was derived by looking at the OpenSSL 45 // block. The ivSize numbers were taken from the OpenSSL source. 81 // the OpenSSL source. 139 // Based on the OpenSSL implementation. The salt is the first 8 bytes
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt.go | 8 // generate a key from the password was derived by looking at the OpenSSL 45 // block. The ivSize numbers were taken from the OpenSSL source. 81 // the OpenSSL source. 139 // Based on the OpenSSL implementation. The salt is the first 8 bytes
|
/cts/tools/utils/ |
certificates.py | 18 from OpenSSL import crypto
|
/external/autotest/client/site_tests/security_RootCA/ |
security_RootCA.py | 19 OPENSSL = '/usr/bin/openssl' 22 # get_cert_by_subject() in crypto/x509/by_dir.c in the OpenSSL 30 """Verifies that the root CAs trusted by both NSS and OpenSSL 41 baselines = {'nss': {}, 'openssl': {}} 44 for i in ['nss', 'openssl']: 99 """Returns the dict of certificate fingerprints observed in OpenSSL.""" 100 fingerprint_cmd = ' '.join([OPENSSL, 'x509', '-fingerprint', 162 Covers both NSS and OpenSSL. 177 seen['openssl'] = openssl_stor [all...] |
/external/boringssl/src/ssl/test/runner/ |
tls.go | 259 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates 260 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys. 261 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client_test.go | 64 var defaultServerCommand = []string{"openssl", "s_server"} 112 // serverPort contains the port that OpenSSL will listen on. OpenSSL 143 // OpenSSL does print an "ACCEPT" banner, but it does so *before* 293 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"}, 303 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"}, 313 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 325 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 335 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 349 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA", "-verify", "1"} [all...] |
tls.go | 251 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates 252 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys. 253 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client_test.go | 64 var defaultServerCommand = []string{"openssl", "s_server"} 112 // serverPort contains the port that OpenSSL will listen on. OpenSSL 143 // OpenSSL does print an "ACCEPT" banner, but it does so *before* 293 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"}, 303 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"}, 313 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 325 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 335 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 349 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA", "-verify", "1"} [all...] |
tls.go | 251 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates 252 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys. 253 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|