/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslnonce.c | 121 SECITEM_ZfreeItem(&sid->u.ssl2.masterKey, PR_FALSE); 122 SECITEM_ZfreeItem(&sid->u.ssl2.cipherArg, PR_FALSE); 288 sid->u.ssl2.sessionID, sizeof(sid->u.ssl2.sessionID))); 290 sid->u.ssl2.masterKey.data, sid->u.ssl2.masterKey.len)); 292 sid->u.ssl2.cipherArg.data, sid->u.ssl2.cipherArg.len)); 355 zap->u.ssl2.cipherType)); 358 zap->u.ssl2 [all...] |
H A D | sslsnce.c | 117 /*101 */} ssl2; member in union:sidCacheEntryStr::__anon9733 467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) || 468 (from->u.ssl2.cipherArg.len > SSL_MAX_CYPHER_ARG_BYTES)) { 470 myPid, from->u.ssl2.masterKey.len, 471 from->u.ssl2.cipherArg.len)); 476 to->u.ssl2.cipherType = from->u.ssl2.cipherType; 477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len; 478 to->u.ssl2 [all...] |
H A D | sslcon.c | 610 sendLen = 1 + sizeof(sid->u.ssl2.sessionID); 618 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID, 619 sizeof(sid->u.ssl2.sessionID)); 1278 PORT_Assert(sid->u.ssl2.masterKey.data == 0); 1279 PORT_Assert(sid->u.ssl2.cipherArg.data == 0); 1283 sid->u.ssl2.cipherType = cipher; 1284 sid->u.ssl2.masterKey.data = (PRUint8*) PORT_Alloc(keyLen); 1285 if (!sid->u.ssl2.masterKey.data) { 1288 PORT_Memcpy(sid->u.ssl2.masterKey.data, keyData, keyLen); 1289 sid->u.ssl2 [all...] |
H A D | sslinfo.c | 72 memcpy(inf.sessionID, sid->u.ssl2.sessionID,
|
H A D | sslsecur.c | 1533 PORT_Memcpy(item->data, sid->u.ssl2.sessionID, item->len);
|
H A D | sslimpl.h | 388 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3). 398 unsigned int count; /* ssl2 only */ 403 unsigned int recordLen; /* ssl2 only */ 409 unsigned int recordPadding; /* ssl2 only */ 412 unsigned int recordOffset; /* ssl2 only */ 414 int encrypted; /* SSL2 session is now encrypted. ssl2 only */ 666 } ssl2; member in union:sslSessionIDStr::__anon9713 1118 char elements; /* ssl2 only */ 1119 char requiredElements; /* ssl2 only */ 1120 char sentElements; /* ssl2 onl [all...] |
/external/chromium_org/net/socket/ |
H A D | ssl_session_cache_openssl_unittest.cc | 223 // Second call should find the session ID and associate it with |ssl2|. 224 ScopedSSL ssl2(NewSSL(key)); 225 EXPECT_TRUE(cache_.SetSSLSession(ssl2.get())); 227 EXPECT_EQ(session, ssl2.get()->session); 238 ScopedSSL ssl2(NewSSL(key)); 239 EXPECT_TRUE(cache_.SetSSLSessionWithKey(ssl2.get(), key)); 247 ScopedSSL ssl2(NewSSL(common_key)); 255 AddToCache(ssl2.get()); 258 EXPECT_EQ(2, ssl2.get()->session->references); 280 // fail to associate it with |ssl2| [all...] |
H A D | ssl_client_socket_pool_unittest.cc | 271 SSLSocketDataProvider ssl2(ASYNC, ERR_SSL_PROTOCOL_ERROR); 272 ssl2.is_in_session_cache = false; 285 socket_factory_.AddSSLSocketDataProvider(&ssl2); 343 SSLSocketDataProvider ssl2(ASYNC, OK); 344 ssl2.is_in_session_cache = false; 345 ssl2.should_pause_on_connect = true; 350 socket_factory_.AddSSLSocketDataProvider(&ssl2); 416 SSLSocketDataProvider ssl2(ASYNC, OK); 417 ssl2.is_in_session_cache = false; 421 socket_factory_.AddSSLSocketDataProvider(&ssl2); [all...] |
/external/openssl/android.testssl/ |
H A D | testssl | 36 $ssltest -ssl2 $extra || exit 1 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 77 $ssltest -bio_pair -ssl2 $extra || exit 1 80 $ssltest -bio_pair -ssl2 -server_auth $CA $extra || exit 1 84 $ssltest -bio_pair -ssl2 -client_auth $CA $extra || exit 1 87 $ssltest -bio_pair -ssl2 -server_auth -client_auth $CA $extra || exit 1
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | messages.py | 25 self.ssl2 = False 45 self.ssl2 = False 53 self.ssl2 = True 102 def __init__(self, ssl2=False): 104 self.ssl2 = ssl2 137 if self.ssl2:
|
H A D | tlsrecordlayer.py | 767 if recordHeader.ssl2: 793 yield ClientHello(recordHeader.ssl2).parse(p) 839 ssl2 = False 857 ssl2 = False 860 ssl2 = True 868 if ssl2: 923 elif r.ssl2:
|
/external/chromium_org/net/http/ |
H A D | http_network_transaction_unittest.cc | 1356 SSLSocketDataProvider ssl2(ASYNC, OK); 1359 ssl2.SetNextProto(GetParam()); 1362 session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); 3303 SSLSocketDataProvider ssl2(ASYNC, OK); 3304 ssl2.was_npn_negotiated = false; 3305 ssl2.protocol_negotiated = kProtoUnknown; 3306 session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); 3392 SSLSocketDataProvider ssl2(ASYNC, OK); 3393 ssl2.SetNextProto(GetParam()); 3394 ssl2 [all...] |
/external/openssl/ssl/ |
H A D | ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2)
|
H A D | ssl.h | 899 const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */ 1482 #include <openssl/ssl2.h>
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 321 unsigned long algorithm2; /* Extra flags. See SSL2_CF_* in ssl2.h 1450 #include <openssl/ssl2.h>
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 899 const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */ 1482 #include <openssl/ssl2.h>
|