Home
last modified time | relevance | path

Searched refs:ssl (Results 1 – 25 of 238) sorted by relevance

12345678910

/external/openssl/
DSsl.mk7 ssl/bio_ssl.c \
8 ssl/d1_both.c \
9 ssl/d1_enc.c \
10 ssl/d1_lib.c \
11 ssl/d1_pkt.c \
12 ssl/d1_srtp.c \
13 ssl/kssl.c \
14 ssl/s23_clnt.c \
15 ssl/s23_lib.c \
16 ssl/s23_meth.c \
[all …]
Dopenssl.config186 ssl/install-ssl.com \
187 ssl/ssl-lib.com \
188 ssl/ssl_task.c \
196 ssl \
217 ssl/s3_clnt.c \
218 ssl/s3_lib.c \
219 ssl/ssl.h \
220 ssl/ssl3.h \
221 ssl/ssl_lib.c \
222 ssl/ssltest.c \
[all …]
/external/openssl/ssl/
Dbio_ssl.c77 SSL *ssl; /* The ssl handle :-) */ member
127 if (bs->ssl != NULL) SSL_shutdown(bs->ssl); in ssl_free()
130 if (a->init && (bs->ssl != NULL)) in ssl_free()
131 SSL_free(bs->ssl); in ssl_free()
144 SSL *ssl; in ssl_read() local
150 ssl=sb->ssl; in ssl_read()
155 if (!SSL_is_init_finished(ssl)) in ssl_read()
168 ret=SSL_read(ssl,out,outl); in ssl_read()
170 switch (SSL_get_error(ssl,ret)) in ssl_read()
181 SSL_renegotiate(ssl); in ssl_read()
[all …]
Dssl.h658 #define SSL_set_options(ssl,op) \ argument
659 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL)
660 #define SSL_clear_options(ssl,op) \ argument
661 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
662 #define SSL_get_options(ssl) \ argument
663 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL)
671 #define SSL_clear_mode(ssl,op) \ argument
672 SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL)
673 #define SSL_set_mode(ssl,op) \ argument
674 SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL)
[all …]
Dtls1.h298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ argument
299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb)
301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ argument
302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg)
304 #define SSL_set_tlsext_status_type(ssl, type) \ argument
305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL)
307 #define SSL_get_tlsext_status_exts(ssl, arg) \ argument
308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
310 #define SSL_set_tlsext_status_exts(ssl, arg) \ argument
311 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
[all …]
Dssl_rsa.c69 int SSL_use_certificate(SSL *ssl, X509 *x) in SSL_use_certificate() argument
76 if (!ssl_cert_inst(&ssl->cert)) in SSL_use_certificate()
81 return(ssl_set_cert(ssl->cert,x)); in SSL_use_certificate()
85 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) in SSL_use_certificate_file() argument
112 …x=PEM_read_bio_X509(in,NULL,ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_us… in SSL_use_certificate_file()
126 ret=SSL_use_certificate(ssl,x); in SSL_use_certificate_file()
134 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) in SSL_use_certificate_ASN1() argument
146 ret=SSL_use_certificate(ssl,x); in SSL_use_certificate_ASN1()
152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument
162 if (!ssl_cert_inst(&ssl->cert)) in SSL_use_RSAPrivateKey()
[all …]
/external/openssl/include/openssl/
Dssl.h658 #define SSL_set_options(ssl,op) \ argument
659 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL)
660 #define SSL_clear_options(ssl,op) \ argument
661 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
662 #define SSL_get_options(ssl) \ argument
663 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL)
671 #define SSL_clear_mode(ssl,op) \ argument
672 SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL)
673 #define SSL_set_mode(ssl,op) \ argument
674 SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL)
[all …]
Dtls1.h298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ argument
299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb)
301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ argument
302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg)
304 #define SSL_set_tlsext_status_type(ssl, type) \ argument
305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL)
307 #define SSL_get_tlsext_status_exts(ssl, arg) \ argument
308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
310 #define SSL_set_tlsext_status_exts(ssl, arg) \ argument
311 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
[all …]
/external/chromium/chrome/browser/
Dpage_info_model.cc28 const NavigationEntry::SSLStatus& ssl, in PageInfoModel() argument
53 int status_with_warnings_removed = ssl.cert_status() & ~cert_warnings; in PageInfoModel()
55 if (ssl.cert_id() && in PageInfoModel()
56 CertStore::GetInstance()->RetrieveCert(ssl.cert_id(), &cert) && in PageInfoModel()
59 int cert_status = ssl.cert_status(); in PageInfoModel()
80 } else if ((ssl.cert_status() & net::CERT_STATUS_IS_EV) != 0) { in PageInfoModel()
110 } else if ((ssl.cert_status() & net::CERT_STATUS_IS_DNSSEC) != 0) { in PageInfoModel()
136 icon_id = ssl.security_style() == SECURITY_STYLE_UNAUTHENTICATED ? in PageInfoModel()
141 SSLErrorInfo::GetErrorsForCertStatus(ssl.cert_id(), ssl.cert_status(), in PageInfoModel()
148 if (ssl.cert_status() & net::CERT_STATUS_NON_UNIQUE_NAME) { in PageInfoModel()
[all …]
/external/openssl/patches/
Djsse.patch1 --- openssl-1.0.0b.orig/ssl/ssl.h 2010-11-30 00:03:46.000000000 +0000
2 +++ openssl-1.0.0b/ssl/ssl.h 2010-11-30 00:03:47.000000000 +0000
29 @@ -1580,6 +1586,8 @@ int SSL_use_PrivateKey(SSL *ssl, EVP_PKE
30 int SSL_use_PrivateKey_ASN1(int pk,SSL *ssl, const unsigned char *d, long len);
31 int SSL_use_certificate(SSL *ssl, X509 *x);
32 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len);
33 +int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain);
34 +STACK_OF(X509) * SSL_get_certificate_chain(SSL *ssl, X509 *x);
37 int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type);
70 --- openssl-1.0.0b.orig/ssl/d1_clnt.c 2010-01-26 19:46:29.000000000 +0000
[all …]
Dhandshake_cutthrough.patch45 diff -uarp openssl-1.0.0.orig/ssl/s3_clnt.c openssl-1.0.0/ssl/s3_clnt.c
46 --- openssl-1.0.0.orig/ssl/s3_clnt.c 2010-02-27 19:24:24.000000000 -0500
47 +++ openssl-1.0.0/ssl/s3_clnt.c 2010-04-21 14:39:49.000000000 -0400
130 diff -uarp openssl-1.0.0.orig/ssl/s3_lib.c openssl-1.0.0/ssl/s3_lib.c
131 -- openssl-1.0.0.orig/ssl/s3_lib.c 2009-10-16 11:24:19.000000000 -0400
132 +++ openssl-1.0.0/ssl/s3_lib.c 2010-04-21 14:39:49.000000000 -0400
157 diff -uarp openssl-1.0.0.orig/ssl/ssl.h openssl-1.0.0/ssl/ssl.h
158 --- openssl-1.0.0.orig/ssl/ssl.h 2010-01-06 12:37:38.000000000 -0500
159 +++ openssl-1.0.0/ssl/ssl.h 2010-04-21 16:57:49.000000000 -0400
183 /* The following 2 states are kept in ssl->rstate when reads fail,
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dtls_openssl.c69 SSL *ssl; member
319 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument
386 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert()
400 if (!SSL_use_RSAPrivateKey(ssl, rsa)) in tls_cryptoapi_cert()
419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) in tls_cryptoapi_ca_cert() argument
486 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument
494 static void ssl_info_cb(const SSL *ssl, int where, int ret) in ssl_info_cb() argument
510 str, SSL_state_string_long(ssl)); in ssl_info_cb()
520 SSL_get_app_data((SSL *) ssl); in ssl_info_cb()
529 SSL_state_string_long(ssl)); in ssl_info_cb()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c65 SSL *ssl; member
323 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument
390 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert()
404 if (!SSL_use_RSAPrivateKey(ssl, rsa)) in tls_cryptoapi_cert()
423 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) in tls_cryptoapi_ca_cert() argument
490 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument
498 static void ssl_info_cb(const SSL *ssl, int where, int ret) in ssl_info_cb() argument
514 str, SSL_state_string_long(ssl)); in ssl_info_cb()
524 SSL_get_app_data((SSL *) ssl); in ssl_info_cb()
533 SSL_state_string_long(ssl)); in ssl_info_cb()
[all …]
/external/chromium/chrome/browser/ssl/
Dssl_policy.cc121 if (!entry->ssl().cert_id()) { in UpdateEntry()
122 entry->ssl().set_security_style(SECURITY_STYLE_UNAUTHENTICATED); in UpdateEntry()
126 if (!(entry->ssl().cert_status() & net::CERT_STATUS_COMMON_NAME_INVALID)) { in UpdateEntry()
130 entry->ssl().set_cert_status(entry->ssl().cert_status() | in UpdateEntry()
137 int cert_errors = entry->ssl().cert_status() & net::CERT_STATUS_ALL_ERRORS; in UpdateEntry()
140 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); in UpdateEntry()
151 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); in UpdateEntry()
152 entry->ssl().set_ran_insecure_content(); in UpdateEntry()
157 entry->ssl().set_displayed_insecure_content(); in UpdateEntry()
215 if (entry->ssl().security_style() != SECURITY_STYLE_UNKNOWN) in InitializeEntryIfNeeded()
[all …]
/external/chromium/net/socket/
Dssl_client_socket_pool_unittest.cc214 SSLSocketDataProvider ssl(false, OK); in TEST_F() local
215 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F()
233 SSLSocketDataProvider ssl(true, OK); in TEST_F() local
234 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F()
256 SSLSocketDataProvider ssl(true, ERR_CERT_COMMON_NAME_INVALID); in TEST_F() local
257 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F()
279 SSLSocketDataProvider ssl(true, ERR_SSL_PROTOCOL_ERROR); in TEST_F() local
280 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F()
303 SSLSocketDataProvider ssl(true, OK); in TEST_F() local
304 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated; in TEST_F()
[all …]
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/
DMySSLContextSpi.java24 import javax.net.ssl.KeyManager;
25 import javax.net.ssl.SSLContextSpi;
26 import javax.net.ssl.SSLEngine;
27 import javax.net.ssl.SSLEngineResult;
28 import javax.net.ssl.SSLException;
29 import javax.net.ssl.SSLParameters;
30 import javax.net.ssl.SSLSession;
31 import javax.net.ssl.SSLSessionContext;
32 import javax.net.ssl.SSLServerSocketFactory;
33 import javax.net.ssl.SSLSocketFactory;
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_tls.c21 struct eap_ssl_data ssl; member
62 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { in eap_tls_init()
77 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset()
109 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq()
113 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq()
114 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, in eap_tls_buildReq()
123 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_buildReq()
132 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); in eap_tls_buildReq()
135 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { in eap_tls_buildReq()
166 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) { in eap_tls_process_msg()
[all …]
Deap_server_peap.c34 struct eap_ssl_data ssl; member
182 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { in eap_peap_init()
199 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset()
259 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_req()
298 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_soh()
331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", in eap_peap_derive_cmk()
454 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); in eap_peap_build_phase2_tlv()
482 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_term()
493 if (data->ssl.state == FRAG_ACK) { in eap_peap_buildReq()
498 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_peap_buildReq()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_tls.c27 struct eap_ssl_data ssl; member
68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { in eap_tls_init()
83 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset()
115 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq()
119 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq()
120 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, in eap_tls_buildReq()
129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_buildReq()
138 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); in eap_tls_buildReq()
141 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { in eap_tls_buildReq()
172 if (data->state == SUCCESS && wpabuf_len(data->ssl.in_buf) == 0) { in eap_tls_process_msg()
[all …]
Deap_peap.c39 struct eap_ssl_data ssl; member
187 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { in eap_peap_init()
204 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset()
263 encr_req = eap_server_tls_encrypt(sm, &data->ssl, req, req_len); in eap_peap_build_phase2_req()
301 encr_req = eap_server_tls_encrypt(sm, &data->ssl, req, req_len); in eap_peap_build_phase2_soh()
334 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", in eap_peap_derive_cmk()
453 encr_req = eap_server_tls_encrypt(sm, &data->ssl, wpabuf_head(buf), in eap_peap_build_phase2_tlv()
481 encr_req = eap_server_tls_encrypt(sm, &data->ssl, (u8 *) hdr, req_len); in eap_peap_build_phase2_term()
492 if (data->ssl.state == FRAG_ACK) { in eap_peap_buildReq()
497 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_peap_buildReq()
[all …]
/external/chromium/chrome/browser/ui/toolbar/
Dtoolbar_model.cc76 const NavigationEntry::SSLStatus& ssl = entry->ssl(); in GetSecurityLevel() local
77 switch (ssl.security_style()) { in GetSecurityLevel()
86 if (ssl.displayed_insecure_content()) in GetSecurityLevel()
88 if (net::IsCertStatusError(ssl.cert_status())) { in GetSecurityLevel()
89 DCHECK_EQ(ssl.cert_status() & net::CERT_STATUS_ALL_ERRORS, in GetSecurityLevel()
93 if ((ssl.cert_status() & net::CERT_STATUS_IS_EV) && in GetSecurityLevel()
94 CertStore::GetInstance()->RetrieveCert(ssl.cert_id(), NULL)) in GetSecurityLevel()
122 GetNavigationController()->GetActiveEntry()->ssl().cert_id(), &cert); in GetEVCertName()
/external/apache-http/src/org/apache/http/conn/ssl/
DX509HostnameVerifier.java32 package org.apache.http.conn.ssl;
34 import javax.net.ssl.HostnameVerifier;
35 import javax.net.ssl.SSLException;
36 import javax.net.ssl.SSLSession;
37 import javax.net.ssl.SSLSocket;
64 void verify(String host, SSLSocket ssl) throws IOException; in verify() argument
DSSLSocketFactory.java32 package org.apache.http.conn.ssl;
39 import javax.net.ssl.HttpsURLConnection;
40 import javax.net.ssl.KeyManager;
41 import javax.net.ssl.KeyManagerFactory;
42 import javax.net.ssl.SSLContext;
43 import javax.net.ssl.SSLSocket;
44 import javax.net.ssl.TrustManager;
45 import javax.net.ssl.TrustManagerFactory;
167 private final javax.net.ssl.SSLSocketFactory socketfactory;
225 public SSLSocketFactory(javax.net.ssl.SSLSocketFactory socketfactory) { in SSLSocketFactory()
/external/openssl/apps/
Dciphers.c92 SSL *ssl=NULL; in MAIN() local
172 ssl=SSL_new(ctx); in MAIN()
173 if (ssl == NULL) goto err; in MAIN()
180 p=SSL_get_cipher_list(ssl,i); in MAIN()
189 sk=SSL_get_ciphers(ssl); in MAIN()
226 if (ssl != NULL) SSL_free(ssl); in MAIN()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_tls.c28 struct eap_ssl_data ssl; member
49 if (eap_peer_tls_ssl_init(sm, &data->ssl, config)) { in eap_tls_init()
76 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_tls_deinit()
127 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_tls_success()
154 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_TLS, ret, in eap_tls_process()
167 res = eap_peer_tls_process_helper(sm, &data->ssl, EAP_TYPE_TLS, 0, id, in eap_tls_process()
174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_process()
189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn); in eap_tls_has_reauth_data()
203 if (eap_peer_tls_reauth_init(sm, &data->ssl)) { in eap_tls_init_for_reauth()
215 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); in eap_tls_get_status()

12345678910