HomeSort by relevance Sort by last modified time
    Searched full:ssl3 (Results 1 - 25 of 104) sorted by null

1 2 3 4 5

  /external/chromium_org/net/third_party/nss/patches/
nssrwlock.patch 7 if (sid->u.ssl3.lock) {
8 - PR_RWLock_Rlock(sid->u.ssl3.lock);
9 + NSSRWLock_LockRead(sid->u.ssl3.lock);
17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE);
26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock);
    [all...]
clientauth.patch 9 + * used, u.ssl3.clAuthValid will be false and this function will always
11 if (!sid || !sid->u.ssl3.clAuthValid) {
16 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0);
17 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2);
18 - keyType = ss->ssl3.clientPrivateKey->keyType;
19 - rv = ssl3_SignHashes(&hashes, ss->ssl3.clientPrivateKey, &buf, isTLS);
23 + if (ss->ssl3.platformClientKey) {
26 + &ss->ssl3.clientCertificate->subjectPublicKeyInfo);
28 + &hashes, ss->ssl3.platformClientKey, &buf, isTLS, keyType);
29 + ssl_FreePlatformKey(ss->ssl3.platformClientKey)
    [all...]
channelid.patch 16 + if (ss->ssl3.channelID != NULL) {
17 + SECKEY_DestroyPrivateKey(ss->ssl3.channelID);
18 + ss->ssl3.channelID = NULL;
20 + if (ss->ssl3.channelIDPub != NULL) {
21 + SECKEY_DestroyPublicKey(ss->ssl3.channelIDPub);
22 + ss->ssl3.channelIDPub = NULL;
39 ss->ssl3.hs.isResuming = PR_FALSE;
40 ss->ssl3.hs.ws = wait_server_cert;
48 + &ss->ssl3.channelIDPub, &ss->ssl3.channelID)
    [all...]
restartclientauth.patch 48 + ss->ssl3.clientCertificate = cert;
49 + ss->ssl3.clientPrivateKey = key;
50 + ss->ssl3.clientCertChain = certChain;
53 + if (ss->ssl3.clientCertificate) {
54 + CERT_DestroyCertificate(ss->ssl3.clientCertificate);
55 + ss->ssl3.clientCertificate = NULL;
57 + if (ss->ssl3.clientPrivateKey) {
58 + SECKEY_DestroyPrivateKey(ss->ssl3.clientPrivateKey);
59 + ss->ssl3.clientPrivateKey = NULL;
61 + if (ss->ssl3.clientCertChain != NULL)
    [all...]
sessioncache.patch 5 ss->ssl3.hs.receivedNewSessionTicket = PR_FALSE;
8 - if (ss->ssl3.hs.cacheSID) {
9 + if (ss->ssl3.hs.cacheSID && ss->sec.isServer) {
12 ss->ssl3.hs.cacheSID = PR_FALSE;
47 + if (ss->ssl3.hs.cacheSID) {
49 + ss->ssl3.hs.cacheSID = PR_FALSE;
secretexporterlocks.patch 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
30 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH);
cachecerts.patch 29 ss->ssl3.peerCertChain = NULL;
42 + PORT_Assert(!ss->ssl3.peerCertArena);
43 + PORT_Assert(!ss->ssl3.peerCertChain);
44 + ss->ssl3.peerCertArena = arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE);
56 + ss->ssl3.peerCertChain = certs;
71 * ssl3 CertificateStatus message.
77 + ssl3_CopyPeerCertsToSID(ss->ssl3.peerCertChain, ss->sec.ci.sid);
tlsunique.patch 23 + isTLS = (PRBool)(ss->ssl3.cwSpec->version > SSL_LIBRARY_VERSION_3_0);
29 + len = ss->ssl3.hs.finishedBytes;
41 + if (ss->firstHsDone && ss->ssl3.hs.ws != idle_handshake) {
48 + if (ss->ssl3.hs.isResuming)
58 + memcpy(out, &ss->ssl3.hs.finishedMsgs.tFinished[index], len);
60 + memcpy(out, &ss->ssl3.hs.finishedMsgs.sFinished[index], len);
signedcertificatetimestamps.patch 5 sid->u.ssl3.sessionIDLength = sidBytes.len;
6 PORT_Memcpy(sid->u.ssl3.sessionID, sidBytes.data, sidBytes.len);
10 + rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.signedCertTimestamps,
16 ss->ssl3.hs.isResuming = PR_FALSE;
17 ss->ssl3.hs.ws = wait_server_cert;
209 + * (in sec.ci.sid.u.ssl3.signedCertTimestamps).
222 if (sid->u.ssl3.originalHandshakeHash.data) {
223 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE);
225 + if (sid->u.ssl3.signedCertTimestamps.data) {
226 + SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE)
    [all...]
ignorechangecipherspec.patch 11 + SSL_TRC(3, ("%d: SSL3[%d]: discard out of order "
fallbackscsv.patch 29 PRINT_BUF(4, (ss, "client, found session-id:", sid->u.ssl3.sessionID,
31 if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
38 if (ss->ssl3.hs.sendingSCSV) {
55 + if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
62 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
  /external/chromium_org/net/third_party/nss/ssl/
dtlscon.c 247 if ((message_seq == ss->ssl3.hs.recvMessageSeq)
251 ss->ssl3.hs.msg_type = (SSL3HandshakeType)type;
252 ss->ssl3.hs.msg_len = message_length;
256 dtls_FreeHandshakeMessages(&ss->ssl3.hs.lastMessageFlight);
257 ss->ssl3.hs.recvdHighWater = -1;
262 if (ss->ssl3.hs.rtRetries == 0) {
263 ss->ssl3.hs.rtTimeoutMs = INITIAL_DTLS_TIMEOUT_MS;
266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len);
272 if (message_seq < ss->ssl3.hs.recvMessageSeq) {
275 if (ss->ssl3.hs.rtTimerCb == NULL)
    [all...]
ssl3con.c 3 * SSL3 Protocol
110 /* This list of SSL3 cipher suites is sorted in descending order of
225 /* This list of SSL3 compression methods is sorted in descending order of
    [all...]
sslnonce.c 124 if (sid->u.ssl3.locked.sessionTicket.ticket.data) {
125 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket,
128 if (sid->u.ssl3.srvName.data) {
129 SECITEM_FreeItem(&sid->u.ssl3.srvName, PR_FALSE);
131 if (sid->u.ssl3.originalHandshakeHash.data) {
132 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE);
134 if (sid->u.ssl3.signedCertTimestamps.data) {
135 SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE);
138 if (sid->u.ssl3.lock) {
139 NSSRWLock_Destroy(sid->u.ssl3.lock)
    [all...]
ssl3gthr.c 2 * Gather (Read) entire SSL3 records from socket into buffer.
14 * Attempt to read in an entire SSL3 record.
18 * returns 1 if received a complete SSL3 record.
26 * GS_HEADER: waiting for the 5-byte SSL3 record header to come in.
27 * GS_DATA: waiting for the body of the SSL3 record to come in.
32 * (c) data (entire SSL3 record) has been received.
55 SSL_TRC(30, ("%d: SSL3[%d]: gather state %d (need %d more)",
64 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd));
68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd,
96 ** Have received SSL3 record header in gs->hdr
    [all...]
notes.txt 11 hs = ss->ssl3->hs
13 gs->inbuf SSL3 only: incoming (encrypted) ssl records are placed here,
18 SSL3: ssl3_HandleHandshake puts decrypted ssl records here.
20 hs.msg_body (SSL3 only) When an incoming handshake message spans more
24 hs.msgState (SSL3 only) an alternative set of pointers/lengths for gs->buf.
79 SSl3: (in ssl3_SendPlainText)
80 ss->ssl3 (the pointer)
81 ss->ssl3->current_write* (the pointer and the data in the spec
98 SSL3: (in ssl3_HandleRecord )
99 ssl3->current_read* (the pointer and all data refernced
    [all...]
ssl3ext.c 2 * SSL3 Protocol
523 /* The caller must be holding sid->u.ssl3.lock for reading. We cannot
531 session_ticket = &sid->u.ssl3.locked.sessionTicket;
675 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE);
676 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result);
710 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE);
711 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED;
713 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name);
846 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) {
    [all...]
sslsnce.c 130 /*104 */} ssl3; member in union:sidCacheEntryStr::__anon13738
380 sce->u.ssl3.certIndex = ndx;
440 sce->u.ssl3.srvNameIndex = ndx;
442 PORT_Memcpy(sce->u.ssl3.srvNameHash, snce.nameHash, SHA256_LENGTH);
502 to->u.ssl3.cipherSuite = from->u.ssl3.cipherSuite;
503 to->u.ssl3.compression = (PRUint16)from->u.ssl3.compression;
504 to->u.ssl3.keys = from->u.ssl3.keys
    [all...]
sslinfo.c 54 } else if (ss->ssl3.initialized) { /* SSL3 and TLS */
60 inf.cipherSuite = ss->ssl3.hs.cipher_suite;
61 inf.compressionMethod = ss->ssl3.cwSpec->compression_method;
75 unsigned int sidLen = sid->u.ssl3.sessionIDLength;
78 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen);
313 ss->ssl3.initialized) { /* TLS */
316 crsName = &ss->ssl3.cwSpec->srvVirtName;
379 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
381 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH)
    [all...]
sslreveal.c 97 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
ssl3ecc.c 2 * SSL3 Protocol
284 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0);
285 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2);
392 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0);
393 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2);
450 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa) {
454 if (!SSL_IS_CURVE_NEGOTIATED(ss->ssl3.hs.negotiatedECCurves, ec_curve)) {
483 return ssl3_GetCurveWithECKeyStrength(ss->ssl3.hs.negotiatedECCurves,
611 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0);
612 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2)
    [all...]
  /external/chromium_org/third_party/openssl/patches.chromium/
0015-export_certificate_types.patch 15 diff --git android-openssl.orig/include/openssl/ssl3.h android-openssl/include/openssl/ssl3.h
17 --- android-openssl.orig/include/openssl/ssl3.h
18 +++ android-openssl/include/openssl/ssl3.h
42 diff --git android-openssl.orig/ssl/ssl3.h android-openssl/ssl/ssl3.h
44 --- android-openssl.orig/ssl/ssl3.h
45 +++ android-openssl/ssl/ssl3.h
  /external/chromium_org/third_party/openssl/openssl/android.testssl/
testssl 50 $ssltest -ssl3 $extra || exit 1
53 $ssltest -ssl3 -server_auth $CA $extra || exit 1
56 $ssltest -ssl3 -client_auth $CA $extra || exit 1
59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1
91 $ssltest -bio_pair -ssl3 $extra || exit 1
94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1
97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1
100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1
132 prot="-ssl3"
  /external/openssl/android.testssl/
testssl 50 $ssltest -ssl3 $extra || exit 1
53 $ssltest -ssl3 -server_auth $CA $extra || exit 1
56 $ssltest -ssl3 -client_auth $CA $extra || exit 1
59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1
91 $ssltest -bio_pair -ssl3 $extra || exit 1
94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1
97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1
100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1
132 prot="-ssl3"
  /external/chromium_org/third_party/openssl/openssl/patches/
README 8 Enables SSL3+ clients to send application data immediately following the

Completed in 413 milliseconds

1 2 3 4 5