/external/chromium_org/net/third_party/nss/ssl/ |
sslsnce.c | 117 /*101 */} ssl2; member in union:sidCacheEntryStr::__anon12239 467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) || 468 (from->u.ssl2.cipherArg.len > SSL_MAX_CYPHER_ARG_BYTES)) { 470 myPid, from->u.ssl2.masterKey.len, 471 from->u.ssl2.cipherArg.len)); 476 to->u.ssl2.cipherType = from->u.ssl2.cipherType; 477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len; 478 to->u.ssl2.cipherArgLen = from->u.ssl2.cipherArg.len [all...] |
sslimpl.h | 380 * SSL2: recv'd ciphertext records are put here, then decrypted in place. 386 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3). 396 unsigned int count; /* ssl2 only */ 401 unsigned int recordLen; /* ssl2 only */ 407 unsigned int recordPadding; /* ssl2 only */ 410 unsigned int recordOffset; /* ssl2 only */ 412 int encrypted; /* SSL2 session is now encrypted. ssl2 only */ 414 /* These next two values are used by SSL2 and SSL3. 436 ** For SSL2, the plaintext portion is two bytes long. For SSl3 it is 5 657 } ssl2; member in union:sslSessionIDStr::__anon12220 [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |
/external/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |