/external/chromium_org/net/third_party/nss/ssl/ |
sslnonce.c | 123 SECITEM_ZfreeItem(&sid->u.ssl2.masterKey, PR_FALSE); 124 SECITEM_ZfreeItem(&sid->u.ssl2.cipherArg, PR_FALSE); 289 sid->u.ssl2.sessionID, sizeof(sid->u.ssl2.sessionID))); 291 sid->u.ssl2.masterKey.data, sid->u.ssl2.masterKey.len)); 293 sid->u.ssl2.cipherArg.data, sid->u.ssl2.cipherArg.len)); 350 zap->u.ssl2.cipherType)); 353 zap->u.ssl2.sessionID, sizeof(zap->u.ssl2.sessionID))) [all...] |
sslsnce.c | 117 /*101 */} ssl2; member in union:sidCacheEntryStr::__anon12239 467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) || 468 (from->u.ssl2.cipherArg.len > SSL_MAX_CYPHER_ARG_BYTES)) { 470 myPid, from->u.ssl2.masterKey.len, 471 from->u.ssl2.cipherArg.len)); 476 to->u.ssl2.cipherType = from->u.ssl2.cipherType; 477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len; 478 to->u.ssl2.cipherArgLen = from->u.ssl2.cipherArg.len [all...] |
sslcon.c | 2 * SSL v2 handshake functions, and functions common to SSL2 and SSL3. 194 /* fill in cipher specs for SSL2 cipher suites */ 219 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites 232 /* count the SSL2 and SSL3 enabled ciphers. 611 sendLen = 1 + sizeof(sid->u.ssl2.sessionID); 619 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID, 620 sizeof(sid->u.ssl2.sessionID)); [all...] |
sslinfo.c | 50 if (ss->version < SSL_LIBRARY_VERSION_3_0) { /* SSL2 */ 70 if (ss->version < SSL_LIBRARY_VERSION_3_0) { /* SSL2 */ 72 memcpy(inf.sessionID, sid->u.ssl2.sessionID,
|
sslimpl.h | 380 * SSL2: recv'd ciphertext records are put here, then decrypted in place. 386 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3). 396 unsigned int count; /* ssl2 only */ 401 unsigned int recordLen; /* ssl2 only */ 407 unsigned int recordPadding; /* ssl2 only */ 410 unsigned int recordOffset; /* ssl2 only */ 412 int encrypted; /* SSL2 session is now encrypted. ssl2 only */ 414 /* These next two values are used by SSL2 and SSL3. 436 ** For SSL2, the plaintext portion is two bytes long. For SSl3 it is 5 657 } ssl2; member in union:sslSessionIDStr::__anon12220 [all...] |
sslsecur.c | [all...] |
/external/chromium_org/net/socket/ |
ssl_session_cache_openssl_unittest.cc | 221 // Second call should find the session ID and associate it with |ssl2|. 222 ScopedSSL ssl2(NewSSL(key)); 223 EXPECT_TRUE(cache_.SetSSLSession(ssl2.get())); 225 EXPECT_EQ(session, ssl2.get()->session); 236 ScopedSSL ssl2(NewSSL(key)); 237 EXPECT_TRUE(cache_.SetSSLSessionWithKey(ssl2.get(), key)); 245 ScopedSSL ssl2(NewSSL(common_key)); 253 AddToCache(ssl2.get()); 256 EXPECT_EQ(2, ssl2.get()->session->references); 278 // fail to associate it with |ssl2| [all...] |
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
testssl | 36 $ssltest -ssl2 $extra || exit 1 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 77 $ssltest -bio_pair -ssl2 $extra || exit 1 80 $ssltest -bio_pair -ssl2 -server_auth $CA $extra || exit 1 84 $ssltest -bio_pair -ssl2 -client_auth $CA $extra || exit 1 87 $ssltest -bio_pair -ssl2 -server_auth -client_auth $CA $extra || exit 1
|
/external/openssl/android.testssl/ |
testssl | 36 $ssltest -ssl2 $extra || exit 1 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 77 $ssltest -bio_pair -ssl2 $extra || exit 1 80 $ssltest -bio_pair -ssl2 -server_auth $CA $extra || exit 1 84 $ssltest -bio_pair -ssl2 -client_auth $CA $extra || exit 1 87 $ssltest -bio_pair -ssl2 -server_auth -client_auth $CA $extra || exit 1
|
/external/chromium_org/third_party/tlslite/tlslite/ |
TLSRecordLayer.py | 672 if recordHeader.ssl2: 699 yield ClientHello(recordHeader.ssl2).parse(p) 743 ssl2 = False 761 ssl2 = False 764 ssl2 = True 772 if ssl2: 829 elif r.ssl2: [all...] |
messages.py | 28 self.ssl2 = False 48 self.ssl2 = False 56 self.ssl2 = True 123 def __init__(self, ssl2=False): 125 self.ssl2 = ssl2 149 if self.ssl2:
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |
ssl.h | 403 unsigned long algorithm2; /* Extra flags. See SSL2_CF_* in ssl2.h [all...] |
/external/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |
ssl.h | [all...] |
/external/chromium_org/net/http/ |
http_network_transaction_unittest.cc | [all...] |
/external/chromium/net/http/ |
http_network_transaction_unittest.cc | [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl.h | 403 unsigned long algorithm2; /* Extra flags. See SSL2_CF_* in ssl2.h [all...] |
/external/openssl/include/openssl/ |
ssl.h | [all...] |