Home | History | Annotate | Download | only in ssl

Lines Matching refs:ssl2

2  * SSL v2 handshake functions, and functions common to SSL2 and SSL3.
193 /* fill in cipher specs for SSL2 cipher suites */
218 ** (e.g. SSL2 or SSL3) is logically enabled, but all its cipher suites
231 /* count the SSL2 and SSL3 enabled ciphers.
610 sendLen = 1 + sizeof(sid->u.ssl2.sessionID);
618 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID,
619 sizeof(sid->u.ssl2.sessionID));
1177 * For SSL2, this gathers in only the next SSLV2 record.
1220 * version wants to auto-detect SSL2 vs. SSL3 on the initial handshake
1278 PORT_Assert(sid->u.ssl2.masterKey.data == 0);
1279 PORT_Assert(sid->u.ssl2.cipherArg.data == 0);
1283 sid->u.ssl2.cipherType = cipher;
1284 sid->u.ssl2.masterKey.data = (PRUint8*) PORT_Alloc(keyLen);
1285 if (!sid->u.ssl2.masterKey.data) {
1288 PORT_Memcpy(sid->u.ssl2.masterKey.data, keyData, keyLen);
1289 sid->u.ssl2.masterKey.len = keyLen;
1290 sid->u.ssl2.keyBits = keyBits;
1291 sid->u.ssl2.secretKeyBits = secretKeyBits;
1300 sid->u.ssl2.cipherArg.data = (PRUint8*) PORT_Alloc(caLen);
1301 if (!sid->u.ssl2.cipherArg.data) {
1304 sid->u.ssl2.cipherArg.len = caLen;
1305 PORT_Memcpy(sid->u.ssl2.cipherArg.data, ca, caLen);
1399 int cipherType = sid->u.ssl2.cipherType;
1437 rv = ssl2_ProduceKeys(ss, &readKey, &writeKey, &sid->u.ssl2.masterKey,
1467 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg);
1478 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg);
1496 ss->sec.cipherType = sid->u.ssl2.cipherType;
1497 ss->sec.keyBits = sid->u.ssl2.keyBits;
1498 ss->sec.secretKeyBits = sid->u.ssl2.secretKeyBits;
1944 * the rules defined in PKCS #1. SSL2 does this itself to handle the
2170 PORT_Memcpy(sid->u.ssl2.sessionID, s, sizeof(sid->u.ssl2.sessionID));
2905 SSL_DBG(("%d: SSL[%d]: SSL2 bad cert handler returned "
2988 /* count the SSL2 and SSL3 enabled ciphers.
3045 if (ss->cipherSpecs[i] == sid->u.ssl2.cipherType)
3056 sidLen = sizeof(sid->u.ssl2.sessionID);
3057 PRINT_BUF(4, (ss, "client, found session-id:", sid->u.ssl2.sessionID,
3105 /* ensure we don't neogtiate ECC cipher suites with SSL2 hello */
3165 PORT_Memcpy(cp, sid->u.ssl2.sessionID, sidLen);
3374 /* Previously, there was a test here to see if SSL2 was enabled.
3377 ** That test has been removed. If SSL2 has been disabled, there
3378 ** should be no SSL2 ciphers enabled, and consequently, the code
3379 ** below should send the ssl2 error message SSL_PE_NO_CYPHERS.
3380 ** We now believe this is the correct thing to do, even when SSL2
3505 PK11_GenerateRandom(sid->u.ssl2.sessionID+2, SSL2_SESSIONID_BYTES-2);
3508 sid->u.ssl2.sessionID[0] = MSB(pid);
3509 sid->u.ssl2.sessionID[1] = LSB(pid);
3629 /* don't turn on SSL2 if we don't have an RSA key and cert */
3641 /* count the SSL2 and SSL3 enabled ciphers.