/external/chromium_org/net/third_party/nss/ssl/ |
dtlscon.c | 247 if ((message_seq == ss->ssl3.hs.recvMessageSeq) 251 ss->ssl3.hs.msg_type = (SSL3HandshakeType)type; 252 ss->ssl3.hs.msg_len = message_length; 256 dtls_FreeHandshakeMessages(&ss->ssl3.hs.lastMessageFlight); 257 ss->ssl3.hs.recvdHighWater = -1; 262 if (ss->ssl3.hs.rtRetries == 0) { 263 ss->ssl3.hs.rtTimeoutMs = INITIAL_DTLS_TIMEOUT_MS; 266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len); 272 if (message_seq < ss->ssl3.hs.recvMessageSeq) { 275 if (ss->ssl3.hs.rtTimerCb == NULL) [all...] |
sslnonce.c | 124 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { 125 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, 128 if (sid->u.ssl3.srvName.data) { 129 SECITEM_FreeItem(&sid->u.ssl3.srvName, PR_FALSE); 131 if (sid->u.ssl3.originalHandshakeHash.data) { 132 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE); 134 if (sid->u.ssl3.signedCertTimestamps.data) { 135 SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE); 138 if (sid->u.ssl3.lock) { 139 NSSRWLock_Destroy(sid->u.ssl3.lock) [all...] |
ssl3con.c | 3 * SSL3 Protocol 110 /* This list of SSL3 cipher suites is sorted in descending order of 225 /* This list of SSL3 compression methods is sorted in descending order of [all...] |
ssl3gthr.c | 2 * Gather (Read) entire SSL3 records from socket into buffer. 14 * Attempt to read in an entire SSL3 record. 18 * returns 1 if received a complete SSL3 record. 26 * GS_HEADER: waiting for the 5-byte SSL3 record header to come in. 27 * GS_DATA: waiting for the body of the SSL3 record to come in. 32 * (c) data (entire SSL3 record) has been received. 55 SSL_TRC(30, ("%d: SSL3[%d]: gather state %d (need %d more)", 64 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd)); 68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, 96 ** Have received SSL3 record header in gs->hdr [all...] |
ssl3ext.c | 2 * SSL3 Protocol 523 /* The caller must be holding sid->u.ssl3.lock for reading. We cannot 531 session_ticket = &sid->u.ssl3.locked.sessionTicket; 675 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); 676 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result); 710 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); 711 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED; 713 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name); 846 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) { [all...] |
sslsnce.c | 130 /*104 */} ssl3; member in union:sidCacheEntryStr::__anon14358 380 sce->u.ssl3.certIndex = ndx; 440 sce->u.ssl3.srvNameIndex = ndx; 442 PORT_Memcpy(sce->u.ssl3.srvNameHash, snce.nameHash, SHA256_LENGTH); 502 to->u.ssl3.cipherSuite = from->u.ssl3.cipherSuite; 503 to->u.ssl3.compression = (PRUint16)from->u.ssl3.compression; 504 to->u.ssl3.keys = from->u.ssl3.keys [all...] |
sslinfo.c | 54 } else if (ss->ssl3.initialized) { /* SSL3 and TLS */ 60 inf.cipherSuite = ss->ssl3.hs.cipher_suite; 61 inf.compressionMethod = ss->ssl3.cwSpec->compression_method; 75 unsigned int sidLen = sid->u.ssl3.sessionIDLength; 78 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen); 313 ss->ssl3.initialized) { /* TLS */ 316 crsName = &ss->ssl3.cwSpec->srvVirtName; 379 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH); 381 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH) [all...] |
ssl3ecc.c | 2 * SSL3 Protocol 284 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); 285 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 392 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); 393 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 450 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa) { 454 if (!SSL_IS_CURVE_NEGOTIATED(ss->ssl3.hs.negotiatedECCurves, ec_curve)) { 483 return ssl3_GetCurveWithECKeyStrength(ss->ssl3.hs.negotiatedECCurves, 611 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); 612 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2) [all...] |
sslreveal.c | 97 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
|
sslsecur.c | 233 ss->ssl3.hs.canFalseStart = PR_FALSE; 234 ss->ssl3.hs.restartTarget = NULL; 391 if (!ss->ssl3.initialized) { 402 *canFalseStart = ss->ssl3.hs.kea_def->kea == kea_dhe_dss || 403 ss->ssl3.hs.kea_def->kea == kea_dhe_rsa || 404 ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa || 405 ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa; 1132 ss->ssl3.initialized) { 1164 ss->ssl3.initialized) { [all...] |
sslsock.c | 221 PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, os->ssl3.dtlsSRTPCiphers, 222 sizeof(PRUint16) * os->ssl3.dtlsSRTPCipherCount); 223 ss->ssl3.dtlsSRTPCipherCount = os->ssl3.dtlsSRTPCipherCount; [all...] |
sslauth.c | 57 for (cur = ss->ssl3.peerCertChain; cur; cur = cur->next) {
|
sslimpl.h | 286 ** SSL3 cipher suite policy and preference struct. 383 * SSL3: recv'd ciphertext records are put in inbuf (see below), then 388 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3). 416 /* These next two values are used by SSL2 and SSL3. 426 ** Always zero for SSl3 application data. 431 /* Buffer for ssl3 to read (encrypted) data from the socket */ 432 sslBuffer inbuf; /*recvBufLock*/ /* ssl3 only */ 438 ** For SSL2, the plaintext portion is two bytes long. For SSl3 it is 5. 575 ** These are the "specs" in the "ssl3" struct. 631 /* The rest of the members, except for the members of u.ssl3.locked, ma 746 } ssl3; member in union:sslSessionIDStr::__anon14338 1350 ssl3State ssl3; member in struct:sslSocketStr [all...] |
/external/openssl/android.testssl/ |
testssl | 50 $ssltest -ssl3 $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 91 $ssltest -bio_pair -ssl3 $extra || exit 1 94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1 97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1 100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1 132 prot="-ssl3"
|
/external/chromium_org/net/socket/ |
ssl_session_cache_openssl_unittest.cc | 299 // current cache entry) is not yet good, fail to associate it with |ssl3|. 300 ScopedSSL ssl3(NewSSL(key)); 301 EXPECT_FALSE(cache_.SetSSLSession(ssl3.get())); 302 EXPECT_NE(session, ssl3.get()->session); 303 EXPECT_NE(session2, ssl3.get()->session); 304 EXPECT_EQ(1, ssl3.get()->session->references);
|
ssl_client_socket_pool_unittest.cc | 273 SSLSocketDataProvider ssl3(ASYNC, ERR_SSL_PROTOCOL_ERROR); 274 ssl3.is_in_session_cache = false; 286 socket_factory_.AddSSLSocketDataProvider(&ssl3); 346 SSLSocketDataProvider ssl3(ASYNC, OK); 347 ssl3.is_in_session_cache = false; 348 ssl3.should_pause_on_connect = true; 351 socket_factory_.AddSSLSocketDataProvider(&ssl3); 418 SSLSocketDataProvider ssl3(ASYNC, OK); 419 ssl3.is_in_session_cache = false; 422 socket_factory_.AddSSLSocketDataProvider(&ssl3); [all...] |
/external/openssl/ssl/ |
ssltest.c | 349 fprintf(stderr," -ssl3 - use SSLv3\n"); 508 int tls1=0,ssl2=0,ssl3=0,ret=1; local 666 else if (strcmp(*argv,"-ssl3") == 0) 667 ssl3=1; 799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force) 803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n" 884 if (ssl3) 893 if (ssl3) [all...] |
ssl.h | 657 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
ssl.h | 483 * SSL3, without a length prefix. */ 546 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and 550 * possible (SSL3 and TLS only). This stops SSL_get_shared_ciphers from [all...] |
/external/openssl/include/openssl/ |
ssl.h | 657 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and [all...] |
/external/chromium_org/net/http/ |
http_network_transaction_unittest.cc | [all...] |