/external/chromium_org/net/third_party/nss/ssl/ |
sslsnce.c | 117 /*101 */} ssl2; member in union:sidCacheEntryStr::__anon13738 467 if ((from->u.ssl2.masterKey.len > SSL_MAX_MASTER_KEY_BYTES) || 468 (from->u.ssl2.cipherArg.len > SSL_MAX_CYPHER_ARG_BYTES)) { 470 myPid, from->u.ssl2.masterKey.len, 471 from->u.ssl2.cipherArg.len)); 476 to->u.ssl2.cipherType = from->u.ssl2.cipherType; 477 to->u.ssl2.masterKeyLen = from->u.ssl2.masterKey.len; 478 to->u.ssl2.cipherArgLen = from->u.ssl2.cipherArg.len [all...] |
sslimpl.h | 382 * SSL2: recv'd ciphertext records are put here, then decrypted in place. 388 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3). 398 unsigned int count; /* ssl2 only */ 403 unsigned int recordLen; /* ssl2 only */ 409 unsigned int recordPadding; /* ssl2 only */ 412 unsigned int recordOffset; /* ssl2 only */ 414 int encrypted; /* SSL2 session is now encrypted. ssl2 only */ 416 /* These next two values are used by SSL2 and SSL3. 438 ** For SSL2, the plaintext portion is two bytes long. For SSl3 it is 5 666 } ssl2; member in union:sslSessionIDStr::__anon13718 [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |
/external/openssl/ssl/ |
ssltest.c | 346 fprintf(stderr," -ssl2 - use SSLv2\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 662 else if (strcmp(*argv,"-ssl2") == 0) 663 ssl2=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 878 if (ssl2) [all...] |