/external/chromium/net/third_party/nss/ssl/ |
sslsnce.c | 125 /* 32 */ PRUint8 sessionID[SSL3_SESSIONID_BYTES]; 166 PRUint8 sessionID[SSL3_SESSIONID_BYTES]; /* 32 */ 368 PORT_Memcpy(cce.sessionID, sce->sessionID, cce.sessionIDLength); 430 PORT_Memcpy(to->sessionID, from->u.ssl2.sessionID, SSL2_SESSIONID_BYTES); 458 PORT_Memcpy(to->sessionID, from->u.ssl3.sessionID, 509 PORT_Memcpy(to->u.ssl2.sessionID, from->sessionID, SSL2_SESSIONID_BYTES) [all...] |
sslt.h | 149 PRUint8 sessionID [32];
|
sslnonce.c | 354 PRINT_BUF(8, (0, "sessionID:", 355 sid->u.ssl2.sessionID, sizeof(sid->u.ssl2.sessionID))); 364 /* Client generates the SessionID if this was a stateless resume. */ 367 rv = PK11_GenerateRandom(sid->u.ssl3.sessionID, 374 PRINT_BUF(8, (0, "sessionID:", 375 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); 418 PRINT_BUF(8, (0, "sessionID:", 419 zap->u.ssl2.sessionID, sizeof(zap->u.ssl2.sessionID))); [all...] |
sslinfo.c | 106 memcpy(inf.sessionID, sid->u.ssl2.sessionID, 110 sidLen = PR_MIN(sidLen, sizeof inf.sessionID); 112 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen);
|
sslcon.c | 645 sendLen = 1 + sizeof(sid->u.ssl2.sessionID); 653 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID, 654 sizeof(sid->u.ssl2.sessionID)); [all...] |
sslsecur.c | [all...] |
sslimpl.h | 598 /* the V2 code depends upon the size of sessionID. */ 599 unsigned char sessionID[SSL2_SESSIONID_BYTES]; 611 SSL3Opaque sessionID[SSL3_SESSIONID_BYTES]; [all...] |
ssl3con.c | [all...] |