Searched refs:ssl2 (Results 1 - 16 of 16) sorted by relevance

/external/chromium_org/net/third_party/nss/ssl/
H A Dsslnonce.c121 SECITEM_ZfreeItem(&sid->u.ssl2.masterKey, PR_FALSE);
122 SECITEM_ZfreeItem(&sid->u.ssl2.cipherArg, PR_FALSE);
288 sid->u.ssl2.sessionID, sizeof(sid->u.ssl2.sessionID)));
290 sid->u.ssl2.masterKey.data, sid->u.ssl2.masterKey.len));
292 sid->u.ssl2.cipherArg.data, sid->u.ssl2.cipherArg.len));
355 zap->u.ssl2.cipherType));
358 zap->u.ssl2
[all...]
H A Dsslsnce.c117 /*101 */} ssl2; member in union:sidCacheEntryStr::__anon9733
467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) ||
468 (from->u.ssl2.cipherArg.len > SSL_MAX_CYPHER_ARG_BYTES)) {
470 myPid, from->u.ssl2.masterKey.len,
471 from->u.ssl2.cipherArg.len));
476 to->u.ssl2.cipherType = from->u.ssl2.cipherType;
477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len;
478 to->u.ssl2
[all...]
H A Dsslcon.c610 sendLen = 1 + sizeof(sid->u.ssl2.sessionID);
618 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID,
619 sizeof(sid->u.ssl2.sessionID));
1278 PORT_Assert(sid->u.ssl2.masterKey.data == 0);
1279 PORT_Assert(sid->u.ssl2.cipherArg.data == 0);
1283 sid->u.ssl2.cipherType = cipher;
1284 sid->u.ssl2.masterKey.data = (PRUint8*) PORT_Alloc(keyLen);
1285 if (!sid->u.ssl2.masterKey.data) {
1288 PORT_Memcpy(sid->u.ssl2.masterKey.data, keyData, keyLen);
1289 sid->u.ssl2
[all...]
H A Dsslinfo.c72 memcpy(inf.sessionID, sid->u.ssl2.sessionID,
H A Dsslsecur.c1533 PORT_Memcpy(item->data, sid->u.ssl2.sessionID, item->len);
H A Dsslimpl.h388 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3).
398 unsigned int count; /* ssl2 only */
403 unsigned int recordLen; /* ssl2 only */
409 unsigned int recordPadding; /* ssl2 only */
412 unsigned int recordOffset; /* ssl2 only */
414 int encrypted; /* SSL2 session is now encrypted. ssl2 only */
666 } ssl2; member in union:sslSessionIDStr::__anon9713
1118 char elements; /* ssl2 only */
1119 char requiredElements; /* ssl2 only */
1120 char sentElements; /* ssl2 onl
[all...]
/external/chromium_org/net/socket/
H A Dssl_session_cache_openssl_unittest.cc223 // Second call should find the session ID and associate it with |ssl2|.
224 ScopedSSL ssl2(NewSSL(key));
225 EXPECT_TRUE(cache_.SetSSLSession(ssl2.get()));
227 EXPECT_EQ(session, ssl2.get()->session);
238 ScopedSSL ssl2(NewSSL(key));
239 EXPECT_TRUE(cache_.SetSSLSessionWithKey(ssl2.get(), key));
247 ScopedSSL ssl2(NewSSL(common_key));
255 AddToCache(ssl2.get());
258 EXPECT_EQ(2, ssl2.get()->session->references);
280 // fail to associate it with |ssl2|
[all...]
H A Dssl_client_socket_pool_unittest.cc271 SSLSocketDataProvider ssl2(ASYNC, ERR_SSL_PROTOCOL_ERROR);
272 ssl2.is_in_session_cache = false;
285 socket_factory_.AddSSLSocketDataProvider(&ssl2);
343 SSLSocketDataProvider ssl2(ASYNC, OK);
344 ssl2.is_in_session_cache = false;
345 ssl2.should_pause_on_connect = true;
350 socket_factory_.AddSSLSocketDataProvider(&ssl2);
416 SSLSocketDataProvider ssl2(ASYNC, OK);
417 ssl2.is_in_session_cache = false;
421 socket_factory_.AddSSLSocketDataProvider(&ssl2);
[all...]
/external/openssl/android.testssl/
H A Dtestssl36 $ssltest -ssl2 $extra || exit 1
39 $ssltest -ssl2 -server_auth $CA $extra || exit 1
43 $ssltest -ssl2 -client_auth $CA $extra || exit 1
46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1
77 $ssltest -bio_pair -ssl2 $extra || exit 1
80 $ssltest -bio_pair -ssl2 -server_auth $CA $extra || exit 1
84 $ssltest -bio_pair -ssl2 -client_auth $CA $extra || exit 1
87 $ssltest -bio_pair -ssl2 -server_auth -client_auth $CA $extra || exit 1
/external/chromium_org/third_party/tlslite/tlslite/
H A Dmessages.py25 self.ssl2 = False
45 self.ssl2 = False
53 self.ssl2 = True
102 def __init__(self, ssl2=False):
104 self.ssl2 = ssl2
137 if self.ssl2:
H A Dtlsrecordlayer.py767 if recordHeader.ssl2:
793 yield ClientHello(recordHeader.ssl2).parse(p)
839 ssl2 = False
857 ssl2 = False
860 ssl2 = True
868 if ssl2:
923 elif r.ssl2:
/external/chromium_org/net/http/
H A Dhttp_network_transaction_unittest.cc1356 SSLSocketDataProvider ssl2(ASYNC, OK);
1359 ssl2.SetNextProto(GetParam());
1362 session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
3303 SSLSocketDataProvider ssl2(ASYNC, OK);
3304 ssl2.was_npn_negotiated = false;
3305 ssl2.protocol_negotiated = kProtoUnknown;
3306 session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
3392 SSLSocketDataProvider ssl2(ASYNC, OK);
3393 ssl2.SetNextProto(GetParam());
3394 ssl2
[all...]
/external/openssl/ssl/
H A Dssltest.c346 fprintf(stderr," -ssl2 - use SSLv2\n");
508 int tls1=0,ssl2=0,ssl3=0,ret=1; local
662 else if (strcmp(*argv,"-ssl2") == 0)
663 ssl2=1;
799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force)
803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n"
878 if (ssl2)
H A Dssl.h899 const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */
1482 #include <openssl/ssl2.h>
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dssl.h321 unsigned long algorithm2; /* Extra flags. See SSL2_CF_* in ssl2.h
1450 #include <openssl/ssl2.h>
/external/openssl/include/openssl/
H A Dssl.h899 const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */
1482 #include <openssl/ssl2.h>

Completed in 2231 milliseconds