/external/openssl/ssl/ |
t1_lib.c | 306 s2n(TLSEXT_TYPE_server_name,ret); 307 s2n(size_str+5,ret); 310 s2n(size_str+3,ret); 314 s2n(size_str,ret); 332 s2n(TLSEXT_TYPE_renegotiate,ret); 333 s2n(el,ret); 359 s2n(TLSEXT_TYPE_ec_point_formats,ret); 360 s2n(s->tlsext_ecpointformatlist_length + 1,ret); 379 s2n(TLSEXT_TYPE_elliptic_curves,ret); 380 s2n(s->tlsext_ellipticcurvelist_length + 2, ret) [all...] |
s23_clnt.c | 375 s2n(i,d); 382 s2n(0,d); 398 s2n(i,d); 440 s2n(i,p); 496 s2n((int)l,d);
|
s2_clnt.c | 567 s2n(SSL2_VERSION,p); /* version */ 579 s2n(n,p); /* cipher spec num bytes */ 586 s2n(i,p); /* session id length */ 592 s2n(0,p); 596 s2n(SSL2_CHALLENGE_LENGTH,p); /* challenge length */ 683 s2n(clear,p); 701 s2n(enc,p); 704 s2n(karg,p); /* key arg size */ 842 s2n(SSL2_PE_NO_CERTIFICATE,p); 876 s2n(n,p) [all...] |
d1_clnt.c | 684 s2n(i,p); 857 s2n(n,q); 938 s2n(enc_ticket->length,p); 946 s2n(authp->length,p); 957 s2n(0,p);/* null authenticator length */ 986 s2n(outl,p); 1047 s2n(n,p); [all...] |
d1_srvr.c | 1162 s2n(nr[i],p); 1196 s2n(strlen(s->ctx->psk_identity_hint), p); 1231 s2n(u,p); [all...] |
s2_srvr.c | 764 s2n(s->version,p); /* version */ 765 s2n(0,p); /* cert len */ 766 s2n(0,p); /* ciphers len */ 773 s2n(s->version,p); /* version */ 775 s2n(n,p); /* certificate length */ 784 s2n(n,p); /* add cipher length */ 788 s2n(SSL2_CONNECTION_ID_LENGTH,p); /* add conn_id length */
|
s3_clnt.c | 723 s2n(i,p); [all...] |
s3_srvr.c | [all...] |
d1_both.c | 369 s2n (msg_hdr->seq,p); 451 s2n (msg_hdr->seq,p); 976 s2n(s->d1->handshake_write_seq,p); [all...] |
d1_pkt.c | [all...] |
s23_srvr.c | 470 s2n(j,dd);
|
s3_enc.c | 740 s2n(rec->length,p);
|
s3_pkt.c | 821 s2n(wr->length,plen); [all...] |
ssl_locl.h | 242 #define s2n(s,c) ((c[0]=(unsigned char)(((s)>> 8)&0xff), \ macro [all...] |
t1_enc.c | 932 s2n(send?ssl->d1->w_epoch:ssl->d1->r_epoch, p);
|