/external/chromium/net/third_party/nss/ssl/ |
H A D | sslsecur.c | 59 * Currently, the list of functions called through ss->handshake is: 76 * The ss->handshake function returns SECWouldBlock under these conditions: 87 * - ssl2_HandleMessage() -> ssl2_HandleRequestCertificate() -> ss->getClientAuthData() 89 * - ssl2_HandleServerHelloMessage() -> ss->handleBadCert() 94 * ss->handleBadCert() 99 * ss->getClientAuthData() 111 ssl_Do1stHandshake(sslSocket *ss) argument 117 PORT_Assert(ss->opt.noLocks || ssl_Have1stHandshakeLock(ss) ); 118 PORT_Assert(ss 173 AlwaysBlock(sslSocket *ss) argument 183 ssl_SetAlwaysBlock(sslSocket *ss) argument 194 sslSocket *ss; local 219 sslSocket *ss; local 283 sslSocket *ss; local 338 sslSocket *ss; local 377 sslSocket *ss; local 482 ssl_SaveWriteData(sslSocket *ss, const void *data, unsigned int len) argument 500 ssl_SendSavedWriteData(sslSocket *ss) argument 539 DoRecv(sslSocket *ss, unsigned char *out, int len, int flags) argument 683 sslSocket *ss; local 823 ssl_CreateSecurityInfo(sslSocket *ss) argument 841 ssl_CopySecurityInfo(sslSocket *ss, sslSocket *os) argument 967 ssl_SecureConnect(sslSocket *ss, const PRNetAddr *sa) argument 1023 ssl_SecureClose(sslSocket *ss) argument 1047 ssl_SecureShutdown(sslSocket *ss, int nsprHow) argument 1079 ssl_SecureRecv(sslSocket *ss, unsigned char *buf, int len, int flags) argument 1130 ssl_SecureRead(sslSocket *ss, unsigned char *buf, int len) argument 1137 ssl_SecureSend(sslSocket *ss, const unsigned char *buf, int len, int flags) argument 1219 ssl_SecureWrite(sslSocket *ss, const unsigned char *buf, int len) argument 1227 sslSocket *ss; local 1249 sslSocket * ss = ssl_FindSocket(fd); local 1282 sslSocket *ss; local 1306 sslSocket * ss = ssl_FindSocket(fd); local 1327 sslSocket * ss; local 1360 sslSocket * ss; local 1398 SSL_RestartHandshakeAfterCertReq(sslSocket * ss, CERTCertificate * cert, SECKEYPrivateKey * key, CERTCertificateList *certChain) argument 1428 SSL_RestartHandshakeAfterServerCert(sslSocket *ss) argument [all...] |
H A D | sslauth.c | 48 sslSocket *ss; local 50 ss = ssl_FindSocket(fd); 51 if (!ss) { 56 if (ss->opt.useSecurity && ss->sec.peerCert) { 57 return CERT_DupCertificate(ss->sec.peerCert); 66 sslSocket *ss; local 68 ss = ssl_FindSocket(fd); 69 if (!ss) { 74 if (ss 92 sslSocket *ss; local 178 sslSocket *ss; local 198 sslSocket *ss; local 216 sslSocket *ss; local 239 sslSocket * ss; local [all...] |
H A D | sslgathr.c | 46 static SECStatus ssl2_HandleV3HandshakeRecord(sslSocket *ss); 53 ** and is to be called multiple times until ss->sec.recordLen != 0. 87 ssl2_GatherData(sslSocket *ss, sslGather *gs, int flags) argument 93 PORT_Assert( ss->opt.noLocks || ssl_HaveRecvBufLock(ss) ); 109 PORT_Assert(ss->sec.hash != 0); 115 SSL_GETPID(), ss->fd, gs->state, gs->remainder)); 117 nb = ssl_DefRecv(ss, bp, gs->remainder, flags); 119 PRINT_BUF(60, (ss, "raw gather data:", bp, nb)); 123 SSL_TRC(30, ("%d: SSL[%d]: EOF", SSL_GETPID(), ss 395 ssl2_GatherRecord(sslSocket *ss, int flags) argument 410 ssl2_StartGatherBytes(sslSocket *ss, sslGather *gs, unsigned int count) argument 453 ssl2_HandleV3HandshakeRecord(sslSocket *ss) argument [all...] |
H A D | ssltrace.c | 69 void ssl_PrintBuf(sslSocket *ss, const char *msg, const void *vp, int len) argument 76 if (ss) { 77 SSL_TRACE(("%d: SSL[%d]: %s [Len: %d]", SSL_GETPID(), ss->fd, 107 static void PrintType(sslSocket *ss, char *msg) argument 109 if (ss) { 110 SSL_TRACE(("%d: SSL[%d]: dump-msg: %s", SSL_GETPID(), ss->fd, 117 static void PrintInt(sslSocket *ss, char *msg, unsigned v) argument 119 if (ss) { 120 SSL_TRACE(("%d: SSL[%d]: %s=%u", SSL_GETPID(), ss->fd, 131 static void PrintBuf(sslSocket *ss, cha argument 171 ssl_DumpMsg(sslSocket *ss, unsigned char *bp, unsigned len) argument [all...] |
H A D | sslcon.c | 179 ssl2_ConstructCipherSpecs(sslSocket *ss) argument 189 PORT_Assert( ss->opt.noLocks || ssl_Have1stHandshakeLock(ss) ); 192 PORT_Assert(ss != 0); 193 allowed = !ss->opt.enableSSL2 ? 0 : 194 (ss->allowedByPolicy & ss->chosenPreference & SSL_CB_IMPLEMENTED); 206 ssl3_config_match_init(ss); 209 rv = ssl3_ConstructV2CipherSpecsHack(ss, NULL, &ssl3_count); 222 if (ss 260 ssl2_CheckConfigSanity(sslSocket *ss) argument 404 ssl2_CipherPrefSet(sslSocket *ss, PRInt32 which, PRBool enabled) argument 426 ssl2_CipherPrefGet(sslSocket *ss, PRInt32 which, PRBool *enabled) argument 448 ssl2_InitSocketPolicy(sslSocket *ss) argument 494 ssl2_GetSendBuffer(sslSocket *ss, unsigned int len) argument 528 ssl2_SendErrorMessage(sslSocket *ss, int error) argument 556 ssl2_SendClientFinishedMessage(sslSocket *ss) argument 591 ssl2_SendServerVerifyMessage(sslSocket *ss) argument 626 ssl2_SendServerFinishedMessage(sslSocket *ss) argument 682 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize, PRUint8 *ca, int caLen, PRUint8 *ck, int ckLen, PRUint8 *ek, int ekLen) argument 731 ssl2_SendCertificateRequestMessage(sslSocket *ss) argument 772 ssl2_SendCertificateResponseMessage(sslSocket *ss, SECItem *cert, SECItem *encCode) argument 883 ssl2_SendClear(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 954 ssl2_SendStream(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 1055 ssl2_SendBlock(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 1185 ssl2_UseEncryptedSendFunc(sslSocket *ss) argument 1199 ssl2_UseClearSendFunc(sslSocket *ss) argument 1248 ssl_GatherRecord1stHandshake(sslSocket *ss) argument 1349 ssl2_ProduceKeys(sslSocket * ss, SECItem * readKey, SECItem * writeKey, SECItem * masterKey, PRUint8 * challenge, PRUint8 * nonce, int cipherType) argument 1425 ssl2_CreateSessionCypher(sslSocket *ss, sslSessionID *sid, PRBool isClient) argument 1577 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument 1763 ssl2_QualifyCypherSpecs(sslSocket *ss, PRUint8 * cs, int csLen) argument 1823 ssl2_ChooseSessionCypher(sslSocket *ss, int hc, PRUint8 * hs, int * pKeyLen) argument 1933 ssl2_ClientHandleServerCert(sslSocket *ss, PRUint8 *certData, int certLen) argument 2044 ssl2_ClientSetupSessionCypher(sslSocket *ss, PRUint8 *cs, int csLen) argument 2196 ssl2_ClientRegSessionID(sslSocket *ss, PRUint8 *s) argument 2212 ssl2_TriggerNextMessage(sslSocket *ss) argument 2239 ssl2_TryToFinish(sslSocket *ss) argument 2273 ssl2_SignResponse(sslSocket *ss, SECKEYPrivateKey *key, SECItem *response) argument 2324 ssl2_HandleRequestCertificate(sslSocket *ss) argument 2430 ssl2_HandleClientCertificate(sslSocket * ss, PRUint8 certType, PRUint8 * cd, unsigned int cdLen, PRUint8 * response, unsigned int responseLen) argument 2525 ssl2_HandleMessage(sslSocket *ss) argument 2722 ssl2_HandleVerifyMessage(sslSocket *ss) argument 2771 ssl2_HandleServerHelloMessage(sslSocket *ss) argument 3000 ssl2_BeginClientHandshake(sslSocket *ss) argument 3232 ssl2_HandleClientSessionKeyMessage(sslSocket *ss) argument 3328 ssl2_RestartHandshakeAfterCertReq(sslSocket * ss, CERTCertificate * cert, SECKEYPrivateKey * key) argument 3406 ssl2_RestartHandshakeAfterServerCert(sslSocket *ss) argument 3445 ssl2_HandleClientHelloMessage(sslSocket *ss) argument 3762 ssl2_BeginServerHandshake(sslSocket *ss) argument [all...] |
H A D | ssl3gthr.c | 67 ssl3_GatherData(sslSocket *ss, sslGather *gs, int flags) argument 75 PORT_Assert( ss->opt.noLocks || ssl_HaveRecvBufLock(ss) ); 88 SSL_GETPID(), ss->fd, gs->state, gs->remainder)); 90 nb = ssl_DefRecv(ss, bp, gs->remainder, flags); 93 PRINT_BUF(60, (ss, "raw gather data:", bp, nb)); 96 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd)); 100 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, 138 SSL3_SendAlert(ss, alert_fatal, unexpected_message); 187 ssl3_GatherCompleteHandshake(sslSocket *ss, in argument 229 ssl3_GatherAppDataRecord(sslSocket *ss, int flags) argument [all...] |
H A D | sslsock.c | 207 static SECStatus ssl_MakeLocks(sslSocket *ss); 221 sslSocket *ss; local 233 ss = (sslSocket *)fd->secret; 234 ss->fd = fd; 235 return ss; 247 sslSocket *ss; local 258 ss = (sslSocket *)layer->secret; 259 ss->fd = layer; 260 return ss; 266 sslSocket *ss; local 358 ssl_DestroyLocks(sslSocket *ss) argument 394 ssl_DestroySocketContents(sslSocket *ss) argument 448 ssl_FreeSocket(sslSocket *ss) argument 494 ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled) argument 513 ssl_ChooseOps(sslSocket *ss) argument 520 PrepareSocket(sslSocket *ss) argument 560 sslSocket *ss = ssl_FindSocket(fd); local 749 sslSocket *ss = ssl_FindSocket(fd); local 1122 sslSocket *ss = ssl_FindSocket(fd); local 1146 sslSocket *ss = ssl_FindSocket(fd); local 1228 sslSocket * ss = ssl_FindSocket(model); local 1261 sslSocket *ss = ssl_FindSocket(fd); local 1301 sslSocket *ss = ssl_FindSocket(fd); local 1332 sslSocket *ss; local 1403 sslSocket *ss; local 1431 sslSocket * ss = ssl_GetPrivate(fd); local 1451 sslSocket * ss = ssl_GetPrivate(fd); local 1471 sslSocket * ss = ssl_GetPrivate(fd); local 1499 sslSocket *ss; local 1527 sslSocket *ss; local 1548 sslSocket *ss; local 1568 sslSocket *ss; local 1588 sslSocket *ss; local 1608 sslSocket *ss; local 1621 ssl_GetPeerInfo(sslSocket *ss) argument 1651 sslSocket *ss; local 1664 sslSocket *ss; local 1687 sslSocket *ss; local 1805 ssl_SocketIsBlocking(sslSocket *ss) argument 2161 ssl_MakeLocks(sslSocket *ss) argument 2205 sslSocket *ss; local [all...] |
H A D | ssldef.c | 53 int ssl_DefConnect(sslSocket *ss, const PRNetAddr *sa) argument 55 PRFileDesc *lower = ss->fd->lower; 58 rv = lower->methods->connect(lower, sa, ss->cTimeout); 62 int ssl_DefBind(sslSocket *ss, const PRNetAddr *addr) argument 64 PRFileDesc *lower = ss->fd->lower; 71 int ssl_DefListen(sslSocket *ss, int backlog) argument 73 PRFileDesc *lower = ss->fd->lower; 80 int ssl_DefShutdown(sslSocket *ss, int how) argument 82 PRFileDesc *lower = ss->fd->lower; 89 int ssl_DefRecv(sslSocket *ss, unsigne argument 112 ssl_DefSend(sslSocket *ss, const unsigned char *buf, int len, int flags) argument 146 ssl_DefRead(sslSocket *ss, unsigned char *buf, int len) argument 159 ssl_DefWrite(sslSocket *ss, const unsigned char *buf, int len) argument 184 ssl_DefGetpeername(sslSocket *ss, PRNetAddr *name) argument 193 ssl_DefGetsockname(sslSocket *ss, PRNetAddr *name) argument 202 ssl_DefClose(sslSocket *ss) argument [all...] |
H A D | ssl3con.c | 74 static void ssl3_CleanupPeerCerts(sslSocket *ss); 75 static PK11SymKey *ssl3_GenerateRSAPMS(sslSocket *ss, ssl3CipherSpec *spec, 77 static SECStatus ssl3_DeriveMasterSecret(sslSocket *ss, PK11SymKey *pms); 78 static SECStatus ssl3_DeriveConnectionKeysPKCS11(sslSocket *ss); 79 static SECStatus ssl3_HandshakeFailure( sslSocket *ss); 80 static SECStatus ssl3_InitState( sslSocket *ss); 81 static SECStatus ssl3_SendCertificate( sslSocket *ss); 82 static SECStatus ssl3_SendEmptyCertificate( sslSocket *ss); 83 static SECStatus ssl3_SendCertificateRequest(sslSocket *ss); 84 static SECStatus ssl3_SendNextProto( sslSocket *ss); 199 compressionEnabled(sslSocket *ss, SSLCompressionMethod compression) argument 624 ssl3_config_match_init(sslSocket *ss) argument 742 count_cipher_suites(sslSocket *ss, int policy, PRBool enabled) argument 760 anyRestrictedEnabled(sslSocket *ss) argument 796 ssl3_NegotiateVersion(sslSocket *ss, SSL3ProtocolVersion peerVersion) argument 1211 ssl3_SetupPendingCipherSpec(sslSocket *ss) argument 1432 ssl3_InitPendingContextsBypass(sslSocket *ss) argument 1613 ssl3_InitPendingContextsPKCS11(sslSocket *ss) argument 1763 ssl3_InitPendingCipherSpec(sslSocket *ss, PK11SymKey *pms) argument 2031 ssl3_CompressMACEncryptRecord(sslSocket * ss, SSL3ContentType type, const SSL3Opaque * pIn, PRUint32 contentLen) argument 2181 ssl3_SendRecord( sslSocket * ss, SSL3ContentType type, const SSL3Opaque * pIn, PRInt32 nIn, PRInt32 flags) argument 2303 ssl3_SendApplicationData(sslSocket *ss, const unsigned char *in, PRInt32 len, PRInt32 flags) argument 2392 ssl3_FlushHandshake(sslSocket *ss, PRInt32 flags) argument 2438 ssl3_HandleNoCertificate(sslSocket *ss) argument 2504 SSL3_SendAlert(sslSocket *ss, SSL3AlertLevel level, SSL3AlertDescription desc) argument 2539 ssl3_IllegalParameter(sslSocket *ss) argument 2554 ssl3_HandshakeFailure(sslSocket *ss) argument 2566 ssl3_DecodeError(sslSocket *ss) argument 2580 ssl3_HandleAlert(sslSocket *ss, sslBuffer *buf) argument 2686 ssl3_SendChangeCipherSpecs(sslSocket *ss) argument 2740 ssl3_HandleChangeCipherSpecs(sslSocket *ss, sslBuffer *buf) argument 2800 ssl3_DeriveMasterSecret(sslSocket *ss, PK11SymKey *pms) argument 2965 ssl3_DeriveConnectionKeysPKCS11(sslSocket *ss) argument 3088 ssl3_RestartHandshakeHashes(sslSocket *ss) argument 3112 ssl3_NewHandshakeHashes(sslSocket *ss) argument 3166 ssl3_UpdateHandshakeHashes(sslSocket *ss, unsigned char *b, unsigned int l) argument 3201 ssl3_AppendHandshake(sslSocket *ss, const void *void_src, PRInt32 bytes) argument 3242 ssl3_AppendHandshakeNumber(sslSocket *ss, PRInt32 num, PRInt32 lenSize) argument 3264 ssl3_AppendHandshakeVariable( sslSocket *ss, const SSL3Opaque *src, PRInt32 bytes, PRInt32 lenSize) argument 3284 ssl3_AppendHandshakeHeader(sslSocket *ss, SSL3HandshakeType t, PRUint32 length) argument 3319 ssl3_ConsumeHandshake(sslSocket *ss, void *v, PRInt32 bytes, SSL3Opaque **b, PRUint32 *length) argument 3347 ssl3_ConsumeHandshakeNumber(sslSocket *ss, PRInt32 bytes, SSL3Opaque **b, PRUint32 *length) argument 3385 ssl3_ConsumeHandshakeVariable(sslSocket *ss, SECItem *i, PRInt32 bytes, SSL3Opaque **b, PRUint32 *length) argument 3423 ssl3_ComputeHandshakeHashes(sslSocket * ss, ssl3CipherSpec *spec, SSL3Hashes * hashes, PRUint32 sender) argument 3673 ssl3_StartHandshakeHash(sslSocket *ss, unsigned char * buf, int length) argument 3709 ssl3_SendClientHello(sslSocket *ss) argument 3999 ssl3_HandleHelloRequest(sslSocket *ss) argument 4230 getWrappingKey( sslSocket * ss, PK11SlotInfo * masterSecretSlot, SSL3KEAType exchKeyType, CK_MECHANISM_TYPE masterWrapMech, void * pwArg) argument 4473 sendRSAClientKeyExchange(sslSocket * ss, SECKEYPublicKey * svrPubKey) argument 4558 sendDHClientKeyExchange(sslSocket * ss, SECKEYPublicKey * svrPubKey) argument 4652 ssl3_SendClientKeyExchange(sslSocket *ss) argument 4726 ssl3_SendCertificateVerify(sslSocket *ss) argument 4795 ssl3_HandleServerHello(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 5098 ssl3_HandleServerKeyExchange(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 5328 ssl3_HandleCertificateRequest(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 5540 ssl3_RestartHandshakeAfterCertReq(sslSocket * ss, CERTCertificate * cert, SECKEYPrivateKey * key, CERTCertificateList *certChain) argument 5578 ssl3_HandleServerHelloDone(sslSocket *ss) argument 5660 ssl3_SendHelloRequest(sslSocket *ss) argument 5690 ssl3_NewSessionID(sslSocket *ss, PRBool is_server) argument 5731 ssl3_SendServerHelloSequence(sslSocket *ss) argument 5810 ssl3_HandleClientHello(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 6339 ssl3_HandleV2ClientHello(sslSocket *ss, unsigned char *buffer, int length) argument 6503 ssl3_SendServerHello(sslSocket *ss) argument 6596 ssl3_SendServerKeyExchange(sslSocket *ss) argument 6693 ssl3_SendCertificateRequest(sslSocket *ss) argument 6760 ssl3_SendServerHelloDone(sslSocket *ss) argument 6786 ssl3_HandleCertificateVerify(sslSocket *ss, SSL3Opaque *b, PRUint32 length, SSL3Hashes *hashes) argument 6850 ssl3_GenerateRSAPMS(sslSocket *ss, ssl3CipherSpec *spec, PK11SlotInfo * serverKeySlot) argument 6919 ssl3_HandleRSAClientKeyExchange(sslSocket *ss, SSL3Opaque *b, PRUint32 length, SECKEYPrivateKey *serverKey) argument 7037 ssl3_HandleClientKeyExchange(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 7157 ssl3_SendEmptyCertificate(sslSocket *ss) argument 7169 ssl3_HandleNewSessionTicket(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 7280 ssl3_SendCertificate(sslSocket *ss) argument 7381 ssl3_CleanupPeerCerts(sslSocket *ss) argument 7399 ssl3_HandleCertificate(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 7719 ssl3_RestartHandshakeAfterServerCert(sslSocket *ss) argument 7811 ssl3_SendNextProto(sslSocket *ss) argument 7847 ssl3_SendFinished(sslSocket *ss, PRInt32 flags) argument 7903 ssl3_CacheWrappedMasterSecret(sslSocket *ss, sslSessionID *sid, ssl3CipherSpec *spec, SSL3KEAType effectiveExchKeyType) argument 7987 ssl3_HandleFinished(sslSocket *ss, SSL3Opaque *b, PRUint32 length, const SSL3Hashes *hashes) argument 8165 ssl3_HandleHandshakeMessage(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 8325 ssl3_HandleHandshake(sslSocket *ss, sslBuffer *origBuf) argument 8467 ssl3_HandleRecord(sslSocket *ss, SSL3Ciphertext *cText, sslBuffer *databuf) argument 8719 ssl3_InitCipherSpec(sslSocket *ss, ssl3CipherSpec *spec) argument 8771 ssl3_InitState(sslSocket *ss) argument 8853 ssl3_CreateRSAStepDownKeys(sslSocket *ss) argument 8953 ssl3_CipherPrefSet(sslSocket *ss, ssl3CipherSuite which, PRBool enabled) argument 8966 ssl3_CipherPrefGet(sslSocket *ss, ssl3CipherSuite which, PRBool *enabled) argument 8986 ssl3_InitSocketPolicy(sslSocket *ss) argument 8995 ssl3_ConstructV2CipherSpecsHack(sslSocket *ss, unsigned char *cs, int *size) argument 9038 ssl3_RedoHandshake(sslSocket *ss, PRBool flushCache) argument 9074 ssl3_DestroySSL3Info(sslSocket *ss) argument [all...] |
H A D | sslimpl.h | 212 typedef SECStatus (*sslHandshakeFunc)(sslSocket *ss); 219 typedef PRInt32 (*sslSendFunc)(sslSocket *ss, const unsigned char *buf, 232 typedef PRInt32 (*ssl3HelloExtensionSenderFunc)(sslSocket *ss, PRBool append, 238 typedef SECStatus (* ssl3HelloExtensionHandlerFunc)(sslSocket *ss, 255 ssl3_RegisterServerHelloExtensionSender(sslSocket *ss, PRUint16 ex_type, 259 ssl3_CallHelloExtensionSenders(sslSocket *ss, PRBool append, PRUint32 maxBytes, 535 ** (direct and indirect) is protected by the reader/writer lock ss->specLock. 785 ** This is the "ssl3" struct, as in "ss->ssl3". 891 ** This is "ci", as in "ss->sec.ci". 940 * blown away by SSL_ResetHandshake(). This is "sec" as in "ss [all...] |
H A D | ssl3ext.c | 64 static PRInt32 ssl3_SendServerNameXtn(sslSocket * ss, 66 static SECStatus ssl3_ParseEncryptedSessionTicket(sslSocket *ss, 72 static SECStatus ssl3_GetSessionTicketKeysPKCS11(sslSocket *ss, 141 sslSocket *ss = (sslSocket *)data; local 142 SECKEYPrivateKey *svrPrivKey = ss->serverCerts[kt_rsa].SERVERKEY; 143 SECKEYPublicKey *svrPubKey = ss->serverCerts[kt_rsa].serverKeyPair->pubKey; 147 SSL_GETPID(), ss->fd)); 155 ss->pkcs11PinArg, &key_name[SESS_TICKET_KEY_NAME_PREFIX_LEN], 171 ssl3_GetSessionTicketKeysPKCS11(sslSocket *ss, PK11SymKey **aes_key, argument 175 ssl3_GenerateSessionTicketKeysPKCS11, ss) ! 275 ssl3_ExtensionNegotiated(sslSocket *ss, PRUint16 ex_type) argument 282 ssl3_ClientExtensionAdvertised(sslSocket *ss, PRUint16 ex_type) argument 292 ssl3_SendServerNameXtn( sslSocket * ss, PRBool append, PRUint32 maxBytes) argument 336 ssl3_HandleServerNameXtn(sslSocket * ss, PRUint16 ex_type, SECItem *data) argument 349 ssl3_SendSessionTicketXtn( sslSocket * ss, PRBool append, PRUint32 maxBytes) argument 420 ssl3_ServerHandleNextProtoNegoXtn(sslSocket * ss, PRUint16 ex_type, SECItem *data) argument 453 ssl3_ClientHandleNextProtoNegoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) argument 502 ssl3_ClientSendNextProtoNegoXtn(sslSocket * ss, PRBool append, PRUint32 maxBytes) argument 541 ssl3_SendNewSessionTicket(sslSocket *ss) argument 845 ssl3_ClientHandleSessionTicketXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) argument 857 ssl3_ServerHandleSessionTicketXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) argument 1266 ssl3_ParseEncryptedSessionTicket(sslSocket *ss, SECItem *data, EncryptedSessionTicket *enc_session_ticket) argument 1294 ssl3_HandleHelloExtensions(sslSocket *ss, SSL3Opaque **b, PRUint32 *length) argument 1344 ssl3_RegisterServerHelloExtensionSender(sslSocket *ss, PRUint16 ex_type, ssl3HelloExtensionSenderFunc cb) argument 1370 ssl3_CallHelloExtensionSenders(sslSocket *ss, PRBool append, PRUint32 maxBytes, const ssl3HelloExtensionSender *sender) argument [all...] |
H A D | ssl3ecc.c | 78 (ss->serverCerts[type].serverKeyPair ? \ 79 ss->serverCerts[type].serverKeyPair->pubKey : NULL) 88 static SECStatus ssl3_CreateECDHEphemeralKeys(sslSocket *ss, ECName ec_curve); 299 ssl3_SendECDHClientKeyExchange(sslSocket * ss, SECKEYPublicKey * svrPubKey) argument 308 PORT_Assert( ss->opt.noLocks || ssl_HaveSSL3HandshakeLock(ss) ); 309 PORT_Assert( ss->opt.noLocks || ssl_HaveXmitBufLock(ss)); 311 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); 326 PRINT_BUF(50, (ss, "ECD 386 ssl3_HandleECDHClientKeyExchange(sslSocket *ss, SSL3Opaque *b, PRUint32 length, SECKEYPublicKey *srvrPubKey, SECKEYPrivateKey *srvrPrivKey) argument 458 ssl3_GetCurveNameForServerSocket(sslSocket *ss) argument 576 ssl3_CreateECDHEphemeralKeys(sslSocket *ss, ECName ec_curve) argument 608 ssl3_HandleECDHServerKeyExchange(sslSocket *ss, SSL3Opaque *b, PRUint32 length) argument 744 ssl3_SendECDHServerKeyExchange(sslSocket *ss) argument 933 ssl3_DisableECCSuites(sslSocket * ss, const ssl3CipherSuite * suite) argument 949 ssl3_FilterECCipherSuitesByServerCerts(sslSocket * ss) argument 995 ssl3_IsECCEnabled(sslSocket * ss) argument 1048 ssl3_SendSupportedCurvesXtn( sslSocket * ss, PRBool append, PRUint32 maxBytes) argument 1072 ssl3_SendSupportedPointFormatsXtn( sslSocket * ss, PRBool append, PRUint32 maxBytes) argument 1096 ssl3_HandleSupportedPointFormatsXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) argument 1127 ssl3_GetSvrCertCurveName(sslSocket *ss) argument 1143 ssl3_HandleSupportedCurvesXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) argument [all...] |
/external/libffi/testsuite/libffi.call/ |
H A D | promotion.c | 9 static int promotion(signed char sc, signed short ss, argument 12 int r = (int) sc + (int) ss + (int) uc + (int) us; 25 signed short ss; local 34 values[1] = &ss; 47 for (ss = -30000; ss <= 30000; ss += 10000) 54 CHECK((int)rint == (signed char) sc + (signed short) ss +
|
H A D | negint.c | 26 signed short ss; local 32 values[1] = &ss; 41 ss = -12; 44 checking (si, ss, sc); 48 printf ("%d vs %d\n", (int)rint, checking (si, ss, sc));
|
/external/freetype/src/autofit/ |
H A D | afpic.c | 53 FT_UInt ss; local 66 for ( ss = 0 ; ss < AF_SCRIPT_CLASSES_REC_COUNT ; ss++ ) 68 container->af_script_classes[ss] = &container->af_script_classes_rec[ss]; 73 ss = 0; 74 FT_Init_Class_af_dummy_script_class(&container->af_script_classes_rec[ss++]); 76 FT_Init_Class_af_latin2_script_class(&container->af_script_classes_rec[ss++]); 78 FT_Init_Class_af_latin_script_class(&container->af_script_classes_rec[ss [all...] |
/external/libffi/testsuite/libffi.special/ |
H A D | unwindtest_ffi_call.cc | 24 signed short ss; local 30 values[1] = &ss; 39 ss = -12;
|
/external/openssl/ssl/ |
H A D | ssl_sess.c | 190 SSL_SESSION *ss; local 192 ss=(SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); 193 if (ss == NULL) 198 memset(ss,0,sizeof(SSL_SESSION)); 200 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 201 ss->references=1; 202 ss->timeout=60*5+4; /* 5 minute timeout by default */ 203 ss->time=(unsigned long)time(NULL); 204 ss->prev=NULL; 205 ss 274 SSL_SESSION *ss=NULL; local 695 SSL_SESSION_free(SSL_SESSION *ss) argument [all...] |
/external/ppp/pppd/ |
H A D | chap-new.c | 119 static void chap_generate_challenge(struct chap_server_state *ss); 120 static void chap_handle_response(struct chap_server_state *ss, int code, 173 struct chap_server_state *ss = &server; local 176 ss->flags |= LOWERUP; 177 if (ss->flags & AUTH_STARTED) 178 chap_timeout(ss); 185 struct chap_server_state *ss = &server; local 188 if (ss->flags & TIMEOUT_PENDING) 189 UNTIMEOUT(chap_timeout, ss); 190 ss 201 struct chap_server_state *ss = &server; local 258 struct chap_server_state *ss = arg; local 283 chap_generate_challenge(struct chap_server_state *ss) argument 310 chap_handle_response(struct chap_server_state *ss, int id, unsigned char *pkt, int len) argument 517 struct chap_server_state *ss = &server; local 548 struct chap_server_state *ss = &server; local [all...] |
/external/e2fsprogs/lib/ss/ |
H A D | Makefile.in | 2 # Makefile for lib/ss 9 my_dir = lib/ss 16 LIBDIR= ss 21 ELF_MYDIR = ss 27 BSDLIB_MYDIR = ss 34 # -I.. is so that ss/ss_err.h works 35 # -I$(srcdir)/.. is so that ss/ss.h works 81 HFILES= ss.h ss_internal.h 84 INSTALL_HFILES= ss [all...] |
/external/srec/tools/grxmlcompile/ |
H A D | netw_dump.cpp | 80 std::stringstream ss; local 81 ss << arc[loc]->inputLabel; 82 inLabel = ss.str(); 127 std::stringstream ss; local 128 ss << arc[loc]->outputLabel; 129 outLabel = "(" + ss.str() + ")"; 141 std::stringstream ss; local 142 ss << SCRIPT_LABEL_PREFIX << arc[loc]->outputLabel; 143 outLabel = ss.str(); 165 std::stringstream ss; local 214 std::stringstream ss; local 226 std::stringstream ss; local 246 std::stringstream ss; local 288 std::stringstream ss; local 300 std::stringstream ss; local 323 std::stringstream ss; local [all...] |
/external/qemu/elff/ |
H A D | elf_defs.h | 110 * ss - Beginning of the section that should contain the checking range.
117 is_in_section(const void* rp, size_t rsize, const void* ss, size_t ssize) {
argument 120 return rp >= ss && ss != NULL && (diff_ptr(ss, rend) <= ssize) && rend >= rp;
|
/external/bluetooth/glib/tests/ |
H A D | slice-test.c | 88 guint *ss; local 105 ss = g_new (guint, number_of_blocks); 108 ss[i] = quick_rand32() % prime_size; 111 ps[i] = memchunk_alloc (&memchunks[ss[i]], ss[i]); 116 memchunk_free (memchunks[ss[i]], ps[i]); 120 ss[i] = quick_rand32() % prime_size; 121 ps[i] = memchunk_alloc (&memchunks[ss[i]], ss[i]); 126 memchunk_free (memchunks[ss[ 153 guint *ss; local [all...] |
/external/e2fsprogs/debugfs/ |
H A D | set_fields.c | 186 struct field_set_info *ss; local 224 for (ss = fields ; ss->name ; ss++) { 225 if (ss->flags & FLAG_ARRAY) { 226 if (!idx || (strcmp(ss->name, arg) != 0)) 228 if (ss->max_idx > 0 && array_idx >= ss->max_idx) 231 if (strcmp(ss->name, field) != 0) 234 return ss; 405 struct field_set_info *ss; local 459 static struct field_set_info *ss; local 486 static struct field_set_info *ss; local 520 struct field_set_info *ss; local [all...] |
/external/skia/tests/ |
H A D | StreamTest.cpp | 36 int ss = bstream.read(storage2, s); local 37 REPORTER_ASSERT(reporter, ss > 0 && ss <= s); 38 REPORTER_ASSERT(reporter, bytesRead + ss <= size); 40 memcmp(storage + bytesRead, storage2, ss) == 0); 41 bytesRead += ss;
|
/external/e2fsprogs/tests/ |
H A D | test_config | 18 LD_LIBRARY_PATH=../lib:../lib/ext2fs:../lib/e2p:../lib/et:../lib/ss 19 DYLD_LIBRARY_PATH=../lib:../lib/ext2fs:../lib/e2p:../lib/et:../lib/ss
|