HomeSort by relevance Sort by last modified time
    Searched refs:OpenSSL (Results 1 - 25 of 54) sorted by null

1 2 3

  /external/webrtc/webrtc/base/
openssl.h 14 #include <openssl/ssl.h>
17 #error OpenSSL is older than 1.0.0, which is the minimum supported version.
  /external/boringssl/
flavor.mk 2 # they can detect whether BoringSSL or OpenSSL is being used.
  /libcore/benchmarks/src/benchmarks/regression/
SignatureBenchmark.java 54 public enum Implementation { OpenSSL, BouncyCastle };
95 case OpenSSL:
114 case OpenSSL:
KeyPairGeneratorBenchmark.java 35 public enum Implementation { OpenSSL, BouncyCastle };
CipherBenchmark.java 80 public enum Implementation { OpenSSL, BouncyCastle };
113 case OpenSSL:
  /external/boringssl/linux-arm/crypto/sha/
sha256-armv4.S 4 @ Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
5 @ project. The module is, however, dual licensed under OpenSSL and
7 @ details see http://www.openssl.org/~appro/cryptogams/.
41 # include <openssl/arm_arch.h>
    [all...]
sha512-armv4.S 4 @ Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
5 @ project. The module is, however, dual licensed under OpenSSL and
7 @ details see http://www.openssl.org/~appro/cryptogams/.
39 @ not be observed, see http://www.openssl.org/~appro/Snapdragon-S4.html
50 # include <openssl/arm_arch.h>
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
crypt.py 42 """Import OpenSSL, avoiding the explicit import where possible.
44 Importing OpenSSL 0.14 can take up to 0.5s, which is a large price
56 ImportError if OpenSSL is unavailable.
60 _ = imp.find_module('OpenSSL')
63 import OpenSSL
76 pubkey, OpenSSL.crypto.PKey, The public key to verify with.
91 from OpenSSL import crypto
113 OpenSSL.crypto.Error if the key_pem can't be parsed.
115 from OpenSSL import crypto
130 pkey, OpenSSL.crypto.PKey (or equiv), The private key to sign with
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/
test_crypt.py 68 if m.startswith('OpenSSL'):
78 import OpenSSL
82 from OpenSSL import crypto
  /external/curl/packages/vms/
build_vms.com 8 $! If OPENSSL is defined, but SSL$INCLUDE is not, then OpenSSL will be
21 $! Note, you must match the pointer size that the OpenSSL
49 $! Note, you must match the pointer size that the OpenSSL
51 $! correct HP OpenSSL image.
53 $! OSSLOLB Use OpenSSL object libraries (.OLB), even if shared
96 $! Added OSSLOLB option, and support for OpenSSL
102 $! here, eliminating the hard-coded OpenSSL nonsense.
276 $ openssl = 0
550 $ if (f$trnlnm("OPENSSL") .nes. ""
    [all...]
gnv_link_curl.com 96 $! Need to build the module to test the HP OpenSSL version
149 $ curl_ssl_version = "OpenSSL/0.9.6g"
151 $ write sys$output "HP OpenSSL Shared images not found!"
157 $! "OpenSSL 0.9.8w 23 Apr 2012"
201 " HP OpenSSL version of ""''hp_ssl_version'"" is too old for shared libcurl!"
204 $ write sys$output "Unable to get version of HP OpenSSL"
237 "GNV OpenSSL version of ""''gnv_ssl_version'" is too old for shared libcurl!"
252 $ write sys$output "Unable to get version of GNV OpenSSL"
255 $! Need to write a release note section about HP OpenSSL
259 This package is built on with the OpenSSL version listed below and require
    [all...]
  /external/libweave/third_party/chromium/build/
build_config.h 79 #error Cannot use both OpenSSL and NSS
  /external/libchrome/build/
build_config.h 101 #error Cannot use both OpenSSL and NSS for certificates
  /system/extras/perfprofd/quipper/build/
build_config.h 56 #error Cannot use both OpenSSL and NSS
  /external/chromium-trace/catapult/third_party/gsutil/gslib/commands/
signurl.py 46 # Check for openssl.
48 from OpenSSL.crypto import load_pkcs12
49 from OpenSSL.crypto import sign
  /external/wpa_supplicant_8/wpa_supplicant/
nmake.mak 14 # Root directory for OpenSSL
15 # (http://www.openssl.org/source/openssl-0.9.8a.tar.gz)
17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to
18 # support it (openssl-tls-extensions.patch)
20 # installation package for OpenSSL.
21 OPENSSLDIR=C:\dev\openssl
172 # If using Win32 OpenSSL binary installation from Shining Light Productions,
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt.go 8 // generate a key from the password was derived by looking at the OpenSSL
45 // block. The ivSize numbers were taken from the OpenSSL source.
81 // the OpenSSL source.
139 // Based on the OpenSSL implementation. The salt is the first 8 bytes
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt.go 8 // generate a key from the password was derived by looking at the OpenSSL
45 // block. The ivSize numbers were taken from the OpenSSL source.
81 // the OpenSSL source.
139 // Based on the OpenSSL implementation. The salt is the first 8 bytes
  /cts/tools/utils/
certificates.py 18 from OpenSSL import crypto
  /external/autotest/client/site_tests/security_RootCA/
security_RootCA.py 19 OPENSSL = '/usr/bin/openssl'
22 # get_cert_by_subject() in crypto/x509/by_dir.c in the OpenSSL
30 """Verifies that the root CAs trusted by both NSS and OpenSSL
41 baselines = {'nss': {}, 'openssl': {}}
44 for i in ['nss', 'openssl']:
99 """Returns the dict of certificate fingerprints observed in OpenSSL."""
100 fingerprint_cmd = ' '.join([OPENSSL, 'x509', '-fingerprint',
162 Covers both NSS and OpenSSL.
177 seen['openssl'] = openssl_stor
    [all...]
  /external/boringssl/src/ssl/test/runner/
tls.go 259 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
260 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
261 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client_test.go 64 var defaultServerCommand = []string{"openssl", "s_server"}
112 // serverPort contains the port that OpenSSL will listen on. OpenSSL
143 // OpenSSL does print an "ACCEPT" banner, but it does so *before*
293 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"},
303 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"},
313 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
325 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
335 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
349 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA", "-verify", "1"}
    [all...]
tls.go 251 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
252 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
253 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client_test.go 64 var defaultServerCommand = []string{"openssl", "s_server"}
112 // serverPort contains the port that OpenSSL will listen on. OpenSSL
143 // OpenSSL does print an "ACCEPT" banner, but it does so *before*
293 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA"},
303 command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-SHA"},
313 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
325 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
335 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
349 command: []string{"openssl", "s_server", "-cipher", "RC4-SHA", "-verify", "1"}
    [all...]
tls.go 251 // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
252 // PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
253 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.

Completed in 591 milliseconds

1 2 3