/external/chromium_org/net/third_party/nss/patches/ |
nssrwlock.patch | 7 if (sid->u.ssl3.lock) { 8 - PR_RWLock_Rlock(sid->u.ssl3.lock); 9 + NSSRWLock_LockRead(sid->u.ssl3.lock); 17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); 26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); [all...] |
clientauth.patch | 9 + * used, u.ssl3.clAuthValid will be false and this function will always 11 if (!sid || !sid->u.ssl3.clAuthValid) { 16 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); 17 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 18 - keyType = ss->ssl3.clientPrivateKey->keyType; 19 - rv = ssl3_SignHashes(&hashes, ss->ssl3.clientPrivateKey, &buf, isTLS); 23 + if (ss->ssl3.platformClientKey) { 26 + &ss->ssl3.clientCertificate->subjectPublicKeyInfo); 28 + &hashes, ss->ssl3.platformClientKey, &buf, isTLS, keyType); 29 + ssl_FreePlatformKey(ss->ssl3.platformClientKey) [all...] |
channelid.patch | 16 + if (ss->ssl3.channelID != NULL) { 17 + SECKEY_DestroyPrivateKey(ss->ssl3.channelID); 18 + ss->ssl3.channelID = NULL; 20 + if (ss->ssl3.channelIDPub != NULL) { 21 + SECKEY_DestroyPublicKey(ss->ssl3.channelIDPub); 22 + ss->ssl3.channelIDPub = NULL; 39 ss->ssl3.hs.isResuming = PR_FALSE; 40 ss->ssl3.hs.ws = wait_server_cert; 48 + &ss->ssl3.channelIDPub, &ss->ssl3.channelID) [all...] |
restartclientauth.patch | 48 + ss->ssl3.clientCertificate = cert; 49 + ss->ssl3.clientPrivateKey = key; 50 + ss->ssl3.clientCertChain = certChain; 53 + if (ss->ssl3.clientCertificate) { 54 + CERT_DestroyCertificate(ss->ssl3.clientCertificate); 55 + ss->ssl3.clientCertificate = NULL; 57 + if (ss->ssl3.clientPrivateKey) { 58 + SECKEY_DestroyPrivateKey(ss->ssl3.clientPrivateKey); 59 + ss->ssl3.clientPrivateKey = NULL; 61 + if (ss->ssl3.clientCertChain != NULL) [all...] |
sessioncache.patch | 5 ss->ssl3.hs.receivedNewSessionTicket = PR_FALSE; 8 - if (ss->ssl3.hs.cacheSID) { 9 + if (ss->ssl3.hs.cacheSID && ss->sec.isServer) { 12 ss->ssl3.hs.cacheSID = PR_FALSE; 47 + if (ss->ssl3.hs.cacheSID) { 49 + ss->ssl3.hs.cacheSID = PR_FALSE;
|
secretexporterlocks.patch | 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH); 30 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH);
|
cachecerts.patch | 29 ss->ssl3.peerCertChain = NULL; 42 + PORT_Assert(!ss->ssl3.peerCertArena); 43 + PORT_Assert(!ss->ssl3.peerCertChain); 44 + ss->ssl3.peerCertArena = arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); 56 + ss->ssl3.peerCertChain = certs; 71 * ssl3 CertificateStatus message. 77 + ssl3_CopyPeerCertsToSID(ss->ssl3.peerCertChain, ss->sec.ci.sid);
|
tlsunique.patch | 23 + isTLS = (PRBool)(ss->ssl3.cwSpec->version > SSL_LIBRARY_VERSION_3_0); 29 + len = ss->ssl3.hs.finishedBytes; 41 + if (ss->firstHsDone && ss->ssl3.hs.ws != idle_handshake) { 48 + if (ss->ssl3.hs.isResuming) 58 + memcpy(out, &ss->ssl3.hs.finishedMsgs.tFinished[index], len); 60 + memcpy(out, &ss->ssl3.hs.finishedMsgs.sFinished[index], len);
|
signedcertificatetimestamps.patch | 5 sid->u.ssl3.sessionIDLength = sidBytes.len; 6 PORT_Memcpy(sid->u.ssl3.sessionID, sidBytes.data, sidBytes.len); 10 + rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.signedCertTimestamps, 16 ss->ssl3.hs.isResuming = PR_FALSE; 17 ss->ssl3.hs.ws = wait_server_cert; 209 + * (in sec.ci.sid.u.ssl3.signedCertTimestamps). 222 if (sid->u.ssl3.originalHandshakeHash.data) { 223 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE); 225 + if (sid->u.ssl3.signedCertTimestamps.data) { 226 + SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE) [all...] |
ignorechangecipherspec.patch | 11 + SSL_TRC(3, ("%d: SSL3[%d]: discard out of order "
|
fallbackscsv.patch | 29 PRINT_BUF(4, (ss, "client, found session-id:", sid->u.ssl3.sessionID, 31 if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 38 if (ss->ssl3.hs.sendingSCSV) { 55 + if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 62 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
|
/external/chromium_org/net/third_party/nss/ssl/ |
dtlscon.c | 247 if ((message_seq == ss->ssl3.hs.recvMessageSeq) 251 ss->ssl3.hs.msg_type = (SSL3HandshakeType)type; 252 ss->ssl3.hs.msg_len = message_length; 256 dtls_FreeHandshakeMessages(&ss->ssl3.hs.lastMessageFlight); 257 ss->ssl3.hs.recvdHighWater = -1; 262 if (ss->ssl3.hs.rtRetries == 0) { 263 ss->ssl3.hs.rtTimeoutMs = INITIAL_DTLS_TIMEOUT_MS; 266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len); 272 if (message_seq < ss->ssl3.hs.recvMessageSeq) { 275 if (ss->ssl3.hs.rtTimerCb == NULL) [all...] |
ssl3con.c | 3 * SSL3 Protocol 110 /* This list of SSL3 cipher suites is sorted in descending order of 225 /* This list of SSL3 compression methods is sorted in descending order of [all...] |
sslnonce.c | 124 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { 125 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, 128 if (sid->u.ssl3.srvName.data) { 129 SECITEM_FreeItem(&sid->u.ssl3.srvName, PR_FALSE); 131 if (sid->u.ssl3.originalHandshakeHash.data) { 132 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE); 134 if (sid->u.ssl3.signedCertTimestamps.data) { 135 SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE); 138 if (sid->u.ssl3.lock) { 139 NSSRWLock_Destroy(sid->u.ssl3.lock) [all...] |
ssl3gthr.c | 2 * Gather (Read) entire SSL3 records from socket into buffer. 14 * Attempt to read in an entire SSL3 record. 18 * returns 1 if received a complete SSL3 record. 26 * GS_HEADER: waiting for the 5-byte SSL3 record header to come in. 27 * GS_DATA: waiting for the body of the SSL3 record to come in. 32 * (c) data (entire SSL3 record) has been received. 55 SSL_TRC(30, ("%d: SSL3[%d]: gather state %d (need %d more)", 64 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd)); 68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, 96 ** Have received SSL3 record header in gs->hdr [all...] |
notes.txt | 11 hs = ss->ssl3->hs 13 gs->inbuf SSL3 only: incoming (encrypted) ssl records are placed here, 18 SSL3: ssl3_HandleHandshake puts decrypted ssl records here. 20 hs.msg_body (SSL3 only) When an incoming handshake message spans more 24 hs.msgState (SSL3 only) an alternative set of pointers/lengths for gs->buf. 79 SSl3: (in ssl3_SendPlainText) 80 ss->ssl3 (the pointer) 81 ss->ssl3->current_write* (the pointer and the data in the spec 98 SSL3: (in ssl3_HandleRecord ) 99 ssl3->current_read* (the pointer and all data refernced [all...] |
ssl3ext.c | 2 * SSL3 Protocol 523 /* The caller must be holding sid->u.ssl3.lock for reading. We cannot 531 session_ticket = &sid->u.ssl3.locked.sessionTicket; 675 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); 676 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result); 710 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); 711 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED; 713 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name); 846 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) { [all...] |
sslsnce.c | 130 /*104 */} ssl3; member in union:sidCacheEntryStr::__anon13738 380 sce->u.ssl3.certIndex = ndx; 440 sce->u.ssl3.srvNameIndex = ndx; 442 PORT_Memcpy(sce->u.ssl3.srvNameHash, snce.nameHash, SHA256_LENGTH); 502 to->u.ssl3.cipherSuite = from->u.ssl3.cipherSuite; 503 to->u.ssl3.compression = (PRUint16)from->u.ssl3.compression; 504 to->u.ssl3.keys = from->u.ssl3.keys [all...] |
sslinfo.c | 54 } else if (ss->ssl3.initialized) { /* SSL3 and TLS */ 60 inf.cipherSuite = ss->ssl3.hs.cipher_suite; 61 inf.compressionMethod = ss->ssl3.cwSpec->compression_method; 75 unsigned int sidLen = sid->u.ssl3.sessionIDLength; 78 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen); 313 ss->ssl3.initialized) { /* TLS */ 316 crsName = &ss->ssl3.cwSpec->srvVirtName; 379 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH); 381 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH) [all...] |
sslreveal.c | 97 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
|
ssl3ecc.c | 2 * SSL3 Protocol 284 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); 285 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 392 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); 393 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 450 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa) { 454 if (!SSL_IS_CURVE_NEGOTIATED(ss->ssl3.hs.negotiatedECCurves, ec_curve)) { 483 return ssl3_GetCurveWithECKeyStrength(ss->ssl3.hs.negotiatedECCurves, 611 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); 612 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2) [all...] |
/external/chromium_org/third_party/openssl/patches.chromium/ |
0015-export_certificate_types.patch | 15 diff --git android-openssl.orig/include/openssl/ssl3.h android-openssl/include/openssl/ssl3.h 17 --- android-openssl.orig/include/openssl/ssl3.h 18 +++ android-openssl/include/openssl/ssl3.h 42 diff --git android-openssl.orig/ssl/ssl3.h android-openssl/ssl/ssl3.h 44 --- android-openssl.orig/ssl/ssl3.h 45 +++ android-openssl/ssl/ssl3.h
|
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
testssl | 50 $ssltest -ssl3 $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 91 $ssltest -bio_pair -ssl3 $extra || exit 1 94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1 97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1 100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1 132 prot="-ssl3"
|
/external/openssl/android.testssl/ |
testssl | 50 $ssltest -ssl3 $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 91 $ssltest -bio_pair -ssl3 $extra || exit 1 94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1 97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1 100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1 132 prot="-ssl3"
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
README | 8 Enables SSL3+ clients to send application data immediately following the
|