/external/conscrypt/common/src/main/java/org/conscrypt/ |
NativeSsl.java | 43 import javax.net.ssl.SSLException; 44 import javax.net.ssl.SSLHandshakeException; 45 import javax.net.ssl.X509KeyManager; 46 import javax.net.ssl.X509TrustManager; 53 * A utility wrapper that abstracts operations on the underlying native SSL instance. 62 private volatile long ssl; field in class:NativeSsl 64 private NativeSsl(long ssl, SSLParametersImpl parameters, 67 this.ssl = ssl; 78 long ssl = NativeCrypto.SSL_new(ctx.sslCtxNativePointer, ctx) local [all...] |
/external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/ |
SSLConfigurationAsserts.java | 16 package org.conscrypt.javax.net.ssl; 27 import javax.net.ssl.SSLContext; 28 import javax.net.ssl.SSLEngine; 29 import javax.net.ssl.SSLParameters; 30 import javax.net.ssl.SSLServerSocket; 31 import javax.net.ssl.SSLServerSocketFactory; 32 import javax.net.ssl.SSLSocket; 33 import javax.net.ssl.SSLSocketFactory; 37 * Assertions about the configuration of TLS/SSL primitives.
|
/external/libevent/ |
bufferevent_openssl.c | 67 #include <openssl/ssl.h> 77 library will happily speak SSL over anything that implements a BIO 270 The implementation comes in two flavors: one that connects its SSL object 272 SSL object connect to a socket directly. The latter should generally be 288 events here as timers only. If we have an SSL, then we use 295 /* The SSL object doing our encryption. */ 296 SSL *ssl; member in struct:bufferevent_openssl 299 know to write data to the SSL. */ 319 /* Treat TCP close before SSL close on SSL >= v3 as clean EOF. * [all...] |
/external/python/cpython2/Lib/test/ |
test_ftplib.py | 14 import ssl 16 ssl = None variable 263 if ssl is not None: 269 """An asyncore.dispatcher subclass supporting TLS/SSL.""" 275 socket = ssl.wrap_socket(self.socket, suppress_ragged_eofs=False, 278 ssl_version=ssl.PROTOCOL_SSLv23) 286 except ssl.SSLError as err: 287 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 288 ssl.SSL_ERROR_WANT_WRITE): 290 elif err.args[0] == ssl.SSL_ERROR_EOF [all...] |
test_urllib2.py | 14 import ssl 16 ssl = None variable 57 @unittest.skipUnless(ssl, "ssl module required") 59 context = ssl.create_default_context() [all...] |
test_ssl.py | 2 # Test the support for SSL and sockets 25 ssl = support.import_module("ssl") variable 27 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES) 29 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL') 30 IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) 91 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 98 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 108 return ssl._OPENSSL_API_VERSION >= (0, 9, 8, 13, 15) 112 return ssl.OPENSSL_VERSION_INFO >= (0, 9, 7, 8, 15 [all...] |
/external/python/cpython3/Lib/test/test_asyncio/ |
test_selector_events.py | 8 import ssl 10 ssl = None variable 73 @unittest.skipIf(ssl is None, 'No ssl module') 86 # to ignore SSL handshake failure 91 self.assertIn("ssl", class_name.lower()) 98 @mock.patch('asyncio.selector_events.ssl', None) 99 @mock.patch('asyncio.sslproto.ssl', None) [all...] |
test_events.py | 14 import ssl 16 ssl = None variable 636 # test SSL cipher 644 # test SSL object 662 self.assertTrue('ssl' in tr.__class__.__name__.lower()) 670 conn_fut = create_connection(ssl=test_utils.dummy_ssl_context()) 674 # ssl.Purpose was introduced in Python 3.4 675 if hasattr(ssl, 'Purpose'): 676 def _dummy_ssl_create_context(purpose=ssl.Purpose.SERVER_AUTH, *, 680 A ssl.create_default_context() replacement that doesn't enabl [all...] |
/external/python/cpython3/Lib/test/ |
test_ftplib.py | 15 import ssl 17 ssl = None variable 302 if ssl is not None: 308 """An asyncore.dispatcher subclass supporting TLS/SSL.""" 314 context = ssl.SSLContext() 327 except ssl.SSLError as err: 328 if err.args[0] in (ssl.SSL_ERROR_WANT_READ, 329 ssl.SSL_ERROR_WANT_WRITE): 331 elif err.args[0] == ssl.SSL_ERROR_EOF: 344 except ssl.SSLError as err [all...] |
test_nntplib.py | 14 import ssl 16 ssl = None variable 296 @unittest.skipUnless(ssl, 'requires SSL support') [all...] |
test_urllib.py | 14 import ssl 16 ssl = None variable 470 @unittest.skipUnless(ssl, "ssl module required") 472 context = ssl.create_default_context() [all...] |
test_ssl.py | 1 # Test the support for SSL and sockets 22 ssl = support.import_module("ssl") variable 31 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES) 33 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL') 34 IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) 84 OP_NO_COMPRESSION = getattr(ssl, "OP_NO_COMPRESSION", 0) 85 OP_SINGLE_DH_USE = getattr(ssl, "OP_SINGLE_DH_USE", 0) 86 OP_SINGLE_ECDH_USE = getattr(ssl, "OP_SINGLE_ECDH_USE", 0) 87 OP_CIPHER_SERVER_PREFERENCE = getattr(ssl, "OP_CIPHER_SERVER_PREFERENCE", 0 [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 34 struct eap_ssl_data ssl; member in struct:eap_fast_data 173 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { 174 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 179 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 193 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 241 eap_peer_tls_ssl_deinit(sm, &data->ssl); 278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 305 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); 1147 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST [all...] |
eap_ttls.c | 30 struct eap_ssl_data ssl; member in struct:eap_ttls_data 159 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { 160 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 196 eap_peer_tls_ssl_deinit(sm, &data->ssl); 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 288 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 306 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 1071 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 32 struct eap_ssl_data ssl; member in struct:eap_fast_data 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 307 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 437 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_FAST)) { 438 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 443 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn, 451 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 513 eap_server_tls_ssl_deinit(sm, &data->ssl); 555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 824 encr = eap_server_tls_encrypt(sm, &data->ssl, plain) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 18 package org.apache.harmony.tests.javax.net.ssl; 29 import javax.net.ssl.HandshakeCompletedEvent; 30 import javax.net.ssl.HandshakeCompletedListener; 31 import javax.net.ssl.KeyManager; 32 import javax.net.ssl.KeyManagerFactory; 33 import javax.net.ssl.SSLContext; 34 import javax.net.ssl.SSLPeerUnverifiedException; 35 import javax.net.ssl.SSLServerSocket; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSocket [all...] |
SSLEngineTest.java | 18 package org.apache.harmony.tests.javax.net.ssl; 31 import javax.net.ssl.SSLContext; 32 import javax.net.ssl.SSLEngine; 33 import javax.net.ssl.SSLEngineResult; 34 import javax.net.ssl.SSLEngineResult.Status; 35 import javax.net.ssl.SSLException; 36 import javax.net.ssl.SSLEngineResult.HandshakeStatus; 39 import libcore.javax.net.ssl.TestSSLContext; 137 * javax.net.ssl.SSLEngine#setEnabledProtocols(String[] protocols) 138 * javax.net.ssl.SSLEngine#getEnabledProtocols( [all...] |
SSLSessionTest.java | 18 package org.apache.harmony.tests.javax.net.ssl; 31 import javax.net.ssl.ExtendedSSLSession; 32 import javax.net.ssl.KeyManager; 33 import javax.net.ssl.KeyManagerFactory; 34 import javax.net.ssl.SSLContext; 35 import javax.net.ssl.SSLServerSocket; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSessionBindingEvent; 38 import javax.net.ssl.SSLSessionBindingListener; 39 import javax.net.ssl.SSLSocket [all...] |
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
SSLConfigurationAsserts.java | 17 package libcore.javax.net.ssl; 26 import javax.net.ssl.SSLContext; 27 import javax.net.ssl.SSLEngine; 28 import javax.net.ssl.SSLParameters; 29 import javax.net.ssl.SSLServerSocket; 30 import javax.net.ssl.SSLServerSocketFactory; 31 import javax.net.ssl.SSLSocket; 32 import javax.net.ssl.SSLSocketFactory; 35 * Assertions about the configuration of TLS/SSL primitives.
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_ssl.c | 0 /* SSL socket module
3 SSL support based on patches by Brian E Gallew and Laszlo Kovacs.
8 This module is imported by ssl.py. It should *not* be used
39 /* these mirror ssl.h */
48 /* start of non ssl.h errorcodes */
88 #include "openssl/ssl.h"
92 /* SSL error object */
97 /* serves as a flag to see whether we've initialized the SSL thread support. */
104 /* SSL socket object */
119 SSL* ssl; member in struct:__anon4715 [all...] |
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 56 #include <openssl/ssl.h> 132 static bool SetTestConfig(SSL *ssl, const TestConfig *config) { 133 return SSL_set_ex_data(ssl, g_config_index, (void *)config) == 1; 136 static const TestConfig *GetTestConfig(const SSL *ssl) { 137 return (const TestConfig *)SSL_get_ex_data(ssl, g_config_index); 140 static bool SetTestState(SSL *ssl, std::unique_ptr<TestState> state) { 142 if (SSL_set_ex_data(ssl, g_state_index, state.get()) == 1) 717 SSL* ssl = (SSL*)X509_STORE_CTX_get_ex_data(store_ctx, local 2252 SSL *ssl = ssl_uniqueptr->get(); local [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/net/ssl/ |
SSLSessionTest.java | 17 package org.conscrypt.javax.net.ssl; 37 import javax.net.ssl.SSLPeerUnverifiedException; 38 import javax.net.ssl.SSLSession; 39 import javax.net.ssl.SSLSocket;
|
/external/curl/lib/ |
url.c | 347 /* Close down all open SSL info and sessions */ 441 /* Set the default size of the SSL session ID cache */ 458 * libcurl 7.10 introduced SSL verification *by default*! This needs to be 461 set->ssl.primary.verifypeer = TRUE; 462 set->ssl.primary.verifyhost = TRUE; 464 set->ssl.authtype = CURL_TLSAUTH_NONE; 468 set->ssl.primary.sessionid = TRUE; /* session ID caching enabled by 470 set->proxy_ssl = set->ssl; 657 /* close the SSL stuff before we close any sockets since they will/may 1793 char *ssl = calloc(4, sslsize); local [all...] |
/external/curl/lib/vtls/ |
nss.c | 24 * Source file for all NSS-specific code for the TLS/SSL layer. No code 35 #include "url.h" /* for the ssl config check function */ 45 #include <ssl.h> 226 /* NSPR I/O layer we use to detect blocking direction during SSL handshake */ 482 static CURLcode nss_load_cert(struct ssl_connect_data *ssl, 492 result = nss_create_object(ssl, CKO_CERTIFICATE, filename, cacert); 623 struct ssl_connect_data *ssl = conn->ssl; local 628 result = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); 673 result = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE) [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 12 #include <openssl/ssl.h> 984 SSL *ssl; local 987 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, 989 ssl_ctx = SSL_get_SSL_CTX(ssl); 1025 res = check_ocsp_resp(ssl_ctx, ssl, cert, ctx->peer_issuer, 1093 static int ocsp_resp_cb(SSL *s, void *arg) 1280 SSL_CTX *ssl = s->ctx; local 1298 SSL_CTX *ssl = sslctx; local [all...] |