/external/openssl/ |
D | Ssl.mk | 7 ssl/bio_ssl.c \ 8 ssl/d1_both.c \ 9 ssl/d1_enc.c \ 10 ssl/d1_lib.c \ 11 ssl/d1_pkt.c \ 12 ssl/d1_srtp.c \ 13 ssl/kssl.c \ 14 ssl/s23_clnt.c \ 15 ssl/s23_lib.c \ 16 ssl/s23_meth.c \ [all …]
|
D | openssl.config | 186 ssl/install-ssl.com \ 187 ssl/ssl-lib.com \ 188 ssl/ssl_task.c \ 196 ssl \ 217 ssl/s3_clnt.c \ 218 ssl/s3_lib.c \ 219 ssl/ssl.h \ 220 ssl/ssl3.h \ 221 ssl/ssl_lib.c \ 222 ssl/ssltest.c \ [all …]
|
/external/openssl/ssl/ |
D | bio_ssl.c | 77 SSL *ssl; /* The ssl handle :-) */ member 127 if (bs->ssl != NULL) SSL_shutdown(bs->ssl); in ssl_free() 130 if (a->init && (bs->ssl != NULL)) in ssl_free() 131 SSL_free(bs->ssl); in ssl_free() 144 SSL *ssl; in ssl_read() local 150 ssl=sb->ssl; in ssl_read() 155 if (!SSL_is_init_finished(ssl)) in ssl_read() 168 ret=SSL_read(ssl,out,outl); in ssl_read() 170 switch (SSL_get_error(ssl,ret)) in ssl_read() 181 SSL_renegotiate(ssl); in ssl_read() [all …]
|
D | ssl.h | 658 #define SSL_set_options(ssl,op) \ argument 659 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) 660 #define SSL_clear_options(ssl,op) \ argument 661 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) 662 #define SSL_get_options(ssl) \ argument 663 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL) 671 #define SSL_clear_mode(ssl,op) \ argument 672 SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL) 673 #define SSL_set_mode(ssl,op) \ argument 674 SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL) [all …]
|
D | tls1.h | 298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ argument 299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ argument 302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 304 #define SSL_set_tlsext_status_type(ssl, type) \ argument 305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 307 #define SSL_get_tlsext_status_exts(ssl, arg) \ argument 308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 310 #define SSL_set_tlsext_status_exts(ssl, arg) \ argument 311 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) [all …]
|
D | ssl_rsa.c | 69 int SSL_use_certificate(SSL *ssl, X509 *x) in SSL_use_certificate() argument 76 if (!ssl_cert_inst(&ssl->cert)) in SSL_use_certificate() 81 return(ssl_set_cert(ssl->cert,x)); in SSL_use_certificate() 85 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) in SSL_use_certificate_file() argument 112 …x=PEM_read_bio_X509(in,NULL,ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_us… in SSL_use_certificate_file() 126 ret=SSL_use_certificate(ssl,x); in SSL_use_certificate_file() 134 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) in SSL_use_certificate_ASN1() argument 146 ret=SSL_use_certificate(ssl,x); in SSL_use_certificate_ASN1() 152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument 162 if (!ssl_cert_inst(&ssl->cert)) in SSL_use_RSAPrivateKey() [all …]
|
/external/openssl/include/openssl/ |
D | ssl.h | 658 #define SSL_set_options(ssl,op) \ argument 659 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) 660 #define SSL_clear_options(ssl,op) \ argument 661 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) 662 #define SSL_get_options(ssl) \ argument 663 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL) 671 #define SSL_clear_mode(ssl,op) \ argument 672 SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL) 673 #define SSL_set_mode(ssl,op) \ argument 674 SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL) [all …]
|
D | tls1.h | 298 #define SSL_set_tlsext_debug_callback(ssl, cb) \ argument 299 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 301 #define SSL_set_tlsext_debug_arg(ssl, arg) \ argument 302 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 304 #define SSL_set_tlsext_status_type(ssl, type) \ argument 305 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 307 #define SSL_get_tlsext_status_exts(ssl, arg) \ argument 308 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 310 #define SSL_set_tlsext_status_exts(ssl, arg) \ argument 311 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) [all …]
|
/external/chromium/chrome/browser/ |
D | page_info_model.cc | 28 const NavigationEntry::SSLStatus& ssl, in PageInfoModel() argument 53 int status_with_warnings_removed = ssl.cert_status() & ~cert_warnings; in PageInfoModel() 55 if (ssl.cert_id() && in PageInfoModel() 56 CertStore::GetInstance()->RetrieveCert(ssl.cert_id(), &cert) && in PageInfoModel() 59 int cert_status = ssl.cert_status(); in PageInfoModel() 80 } else if ((ssl.cert_status() & net::CERT_STATUS_IS_EV) != 0) { in PageInfoModel() 110 } else if ((ssl.cert_status() & net::CERT_STATUS_IS_DNSSEC) != 0) { in PageInfoModel() 136 icon_id = ssl.security_style() == SECURITY_STYLE_UNAUTHENTICATED ? in PageInfoModel() 141 SSLErrorInfo::GetErrorsForCertStatus(ssl.cert_id(), ssl.cert_status(), in PageInfoModel() 148 if (ssl.cert_status() & net::CERT_STATUS_NON_UNIQUE_NAME) { in PageInfoModel() [all …]
|
/external/openssl/patches/ |
D | jsse.patch | 1 --- openssl-1.0.0b.orig/ssl/ssl.h 2010-11-30 00:03:46.000000000 +0000 2 +++ openssl-1.0.0b/ssl/ssl.h 2010-11-30 00:03:47.000000000 +0000 29 @@ -1580,6 +1586,8 @@ int SSL_use_PrivateKey(SSL *ssl, EVP_PKE 30 int SSL_use_PrivateKey_ASN1(int pk,SSL *ssl, const unsigned char *d, long len); 31 int SSL_use_certificate(SSL *ssl, X509 *x); 32 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len); 33 +int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain); 34 +STACK_OF(X509) * SSL_get_certificate_chain(SSL *ssl, X509 *x); 37 int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type); 70 --- openssl-1.0.0b.orig/ssl/d1_clnt.c 2010-01-26 19:46:29.000000000 +0000 [all …]
|
D | handshake_cutthrough.patch | 45 diff -uarp openssl-1.0.0.orig/ssl/s3_clnt.c openssl-1.0.0/ssl/s3_clnt.c 46 --- openssl-1.0.0.orig/ssl/s3_clnt.c 2010-02-27 19:24:24.000000000 -0500 47 +++ openssl-1.0.0/ssl/s3_clnt.c 2010-04-21 14:39:49.000000000 -0400 130 diff -uarp openssl-1.0.0.orig/ssl/s3_lib.c openssl-1.0.0/ssl/s3_lib.c 131 -- openssl-1.0.0.orig/ssl/s3_lib.c 2009-10-16 11:24:19.000000000 -0400 132 +++ openssl-1.0.0/ssl/s3_lib.c 2010-04-21 14:39:49.000000000 -0400 157 diff -uarp openssl-1.0.0.orig/ssl/ssl.h openssl-1.0.0/ssl/ssl.h 158 --- openssl-1.0.0.orig/ssl/ssl.h 2010-01-06 12:37:38.000000000 -0500 159 +++ openssl-1.0.0/ssl/ssl.h 2010-04-21 16:57:49.000000000 -0400 183 /* The following 2 states are kept in ssl->rstate when reads fail, [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | tls_openssl.c | 69 SSL *ssl; member 319 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument 386 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert() 400 if (!SSL_use_RSAPrivateKey(ssl, rsa)) in tls_cryptoapi_cert() 419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) in tls_cryptoapi_ca_cert() argument 486 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument 494 static void ssl_info_cb(const SSL *ssl, int where, int ret) in ssl_info_cb() argument 510 str, SSL_state_string_long(ssl)); in ssl_info_cb() 520 SSL_get_app_data((SSL *) ssl); in ssl_info_cb() 529 SSL_state_string_long(ssl)); in ssl_info_cb() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 65 SSL *ssl; member 323 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument 390 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert() 404 if (!SSL_use_RSAPrivateKey(ssl, rsa)) in tls_cryptoapi_cert() 423 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) in tls_cryptoapi_ca_cert() argument 490 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument 498 static void ssl_info_cb(const SSL *ssl, int where, int ret) in ssl_info_cb() argument 514 str, SSL_state_string_long(ssl)); in ssl_info_cb() 524 SSL_get_app_data((SSL *) ssl); in ssl_info_cb() 533 SSL_state_string_long(ssl)); in ssl_info_cb() [all …]
|
/external/chromium/chrome/browser/ssl/ |
D | ssl_policy.cc | 121 if (!entry->ssl().cert_id()) { in UpdateEntry() 122 entry->ssl().set_security_style(SECURITY_STYLE_UNAUTHENTICATED); in UpdateEntry() 126 if (!(entry->ssl().cert_status() & net::CERT_STATUS_COMMON_NAME_INVALID)) { in UpdateEntry() 130 entry->ssl().set_cert_status(entry->ssl().cert_status() | in UpdateEntry() 137 int cert_errors = entry->ssl().cert_status() & net::CERT_STATUS_ALL_ERRORS; in UpdateEntry() 140 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); in UpdateEntry() 151 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); in UpdateEntry() 152 entry->ssl().set_ran_insecure_content(); in UpdateEntry() 157 entry->ssl().set_displayed_insecure_content(); in UpdateEntry() 215 if (entry->ssl().security_style() != SECURITY_STYLE_UNKNOWN) in InitializeEntryIfNeeded() [all …]
|
/external/chromium/net/socket/ |
D | ssl_client_socket_pool_unittest.cc | 214 SSLSocketDataProvider ssl(false, OK); in TEST_F() local 215 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F() 233 SSLSocketDataProvider ssl(true, OK); in TEST_F() local 234 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F() 256 SSLSocketDataProvider ssl(true, ERR_CERT_COMMON_NAME_INVALID); in TEST_F() local 257 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F() 279 SSLSocketDataProvider ssl(true, ERR_SSL_PROTOCOL_ERROR); in TEST_F() local 280 socket_factory_.AddSSLSocketDataProvider(&ssl); in TEST_F() 303 SSLSocketDataProvider ssl(true, OK); in TEST_F() local 304 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated; in TEST_F() [all …]
|
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/ |
D | MySSLContextSpi.java | 24 import javax.net.ssl.KeyManager; 25 import javax.net.ssl.SSLContextSpi; 26 import javax.net.ssl.SSLEngine; 27 import javax.net.ssl.SSLEngineResult; 28 import javax.net.ssl.SSLException; 29 import javax.net.ssl.SSLParameters; 30 import javax.net.ssl.SSLSession; 31 import javax.net.ssl.SSLSessionContext; 32 import javax.net.ssl.SSLServerSocketFactory; 33 import javax.net.ssl.SSLSocketFactory; [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls.c | 21 struct eap_ssl_data ssl; member 62 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { in eap_tls_init() 77 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset() 109 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq() 113 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq() 114 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, in eap_tls_buildReq() 123 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_buildReq() 132 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); in eap_tls_buildReq() 135 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { in eap_tls_buildReq() 166 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) { in eap_tls_process_msg() [all …]
|
D | eap_server_peap.c | 34 struct eap_ssl_data ssl; member 182 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { in eap_peap_init() 199 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset() 259 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_req() 298 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_soh() 331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", in eap_peap_derive_cmk() 454 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); in eap_peap_build_phase2_tlv() 482 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_term() 493 if (data->ssl.state == FRAG_ACK) { in eap_peap_buildReq() 498 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_peap_buildReq() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_tls.c | 27 struct eap_ssl_data ssl; member 68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { in eap_tls_init() 83 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset() 115 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq() 119 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq() 120 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, in eap_tls_buildReq() 129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_buildReq() 138 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); in eap_tls_buildReq() 141 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { in eap_tls_buildReq() 172 if (data->state == SUCCESS && wpabuf_len(data->ssl.in_buf) == 0) { in eap_tls_process_msg() [all …]
|
D | eap_peap.c | 39 struct eap_ssl_data ssl; member 187 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { in eap_peap_init() 204 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset() 263 encr_req = eap_server_tls_encrypt(sm, &data->ssl, req, req_len); in eap_peap_build_phase2_req() 301 encr_req = eap_server_tls_encrypt(sm, &data->ssl, req, req_len); in eap_peap_build_phase2_soh() 334 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", in eap_peap_derive_cmk() 453 encr_req = eap_server_tls_encrypt(sm, &data->ssl, wpabuf_head(buf), in eap_peap_build_phase2_tlv() 481 encr_req = eap_server_tls_encrypt(sm, &data->ssl, (u8 *) hdr, req_len); in eap_peap_build_phase2_term() 492 if (data->ssl.state == FRAG_ACK) { in eap_peap_buildReq() 497 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_peap_buildReq() [all …]
|
/external/chromium/chrome/browser/ui/toolbar/ |
D | toolbar_model.cc | 76 const NavigationEntry::SSLStatus& ssl = entry->ssl(); in GetSecurityLevel() local 77 switch (ssl.security_style()) { in GetSecurityLevel() 86 if (ssl.displayed_insecure_content()) in GetSecurityLevel() 88 if (net::IsCertStatusError(ssl.cert_status())) { in GetSecurityLevel() 89 DCHECK_EQ(ssl.cert_status() & net::CERT_STATUS_ALL_ERRORS, in GetSecurityLevel() 93 if ((ssl.cert_status() & net::CERT_STATUS_IS_EV) && in GetSecurityLevel() 94 CertStore::GetInstance()->RetrieveCert(ssl.cert_id(), NULL)) in GetSecurityLevel() 122 GetNavigationController()->GetActiveEntry()->ssl().cert_id(), &cert); in GetEVCertName()
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
D | X509HostnameVerifier.java | 32 package org.apache.http.conn.ssl; 34 import javax.net.ssl.HostnameVerifier; 35 import javax.net.ssl.SSLException; 36 import javax.net.ssl.SSLSession; 37 import javax.net.ssl.SSLSocket; 64 void verify(String host, SSLSocket ssl) throws IOException; in verify() argument
|
D | SSLSocketFactory.java | 32 package org.apache.http.conn.ssl; 39 import javax.net.ssl.HttpsURLConnection; 40 import javax.net.ssl.KeyManager; 41 import javax.net.ssl.KeyManagerFactory; 42 import javax.net.ssl.SSLContext; 43 import javax.net.ssl.SSLSocket; 44 import javax.net.ssl.TrustManager; 45 import javax.net.ssl.TrustManagerFactory; 167 private final javax.net.ssl.SSLSocketFactory socketfactory; 225 public SSLSocketFactory(javax.net.ssl.SSLSocketFactory socketfactory) { in SSLSocketFactory()
|
/external/openssl/apps/ |
D | ciphers.c | 92 SSL *ssl=NULL; in MAIN() local 172 ssl=SSL_new(ctx); in MAIN() 173 if (ssl == NULL) goto err; in MAIN() 180 p=SSL_get_cipher_list(ssl,i); in MAIN() 189 sk=SSL_get_ciphers(ssl); in MAIN() 226 if (ssl != NULL) SSL_free(ssl); in MAIN()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_tls.c | 28 struct eap_ssl_data ssl; member 49 if (eap_peer_tls_ssl_init(sm, &data->ssl, config)) { in eap_tls_init() 76 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_tls_deinit() 127 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_tls_success() 154 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_TLS, ret, in eap_tls_process() 167 res = eap_peer_tls_process_helper(sm, &data->ssl, EAP_TYPE_TLS, 0, id, in eap_tls_process() 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) in eap_tls_process() 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn); in eap_tls_has_reauth_data() 203 if (eap_peer_tls_reauth_init(sm, &data->ssl)) { in eap_tls_init_for_reauth() 215 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); in eap_tls_get_status()
|