HomeSort by relevance Sort by last modified time
    Searched refs:ssl3 (Results 1 - 21 of 21) sorted by null

  /external/chromium_org/net/third_party/nss/ssl/
dtlscon.c 247 if ((message_seq == ss->ssl3.hs.recvMessageSeq)
251 ss->ssl3.hs.msg_type = (SSL3HandshakeType)type;
252 ss->ssl3.hs.msg_len = message_length;
256 dtls_FreeHandshakeMessages(&ss->ssl3.hs.lastMessageFlight);
257 ss->ssl3.hs.recvdHighWater = -1;
262 if (ss->ssl3.hs.rtRetries == 0) {
263 ss->ssl3.hs.rtTimeoutMs = INITIAL_DTLS_TIMEOUT_MS;
266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len);
272 if (message_seq < ss->ssl3.hs.recvMessageSeq) {
275 if (ss->ssl3.hs.rtTimerCb == NULL)
    [all...]
sslnonce.c 124 if (sid->u.ssl3.locked.sessionTicket.ticket.data) {
125 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket,
128 if (sid->u.ssl3.srvName.data) {
129 SECITEM_FreeItem(&sid->u.ssl3.srvName, PR_FALSE);
131 if (sid->u.ssl3.originalHandshakeHash.data) {
132 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE);
134 if (sid->u.ssl3.signedCertTimestamps.data) {
135 SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE);
138 if (sid->u.ssl3.lock) {
139 NSSRWLock_Destroy(sid->u.ssl3.lock)
    [all...]
ssl3con.c 3 * SSL3 Protocol
110 /* This list of SSL3 cipher suites is sorted in descending order of
225 /* This list of SSL3 compression methods is sorted in descending order of
    [all...]
ssl3gthr.c 2 * Gather (Read) entire SSL3 records from socket into buffer.
14 * Attempt to read in an entire SSL3 record.
18 * returns 1 if received a complete SSL3 record.
26 * GS_HEADER: waiting for the 5-byte SSL3 record header to come in.
27 * GS_DATA: waiting for the body of the SSL3 record to come in.
32 * (c) data (entire SSL3 record) has been received.
55 SSL_TRC(30, ("%d: SSL3[%d]: gather state %d (need %d more)",
64 SSL_TRC(30, ("%d: SSL3[%d]: EOF", SSL_GETPID(), ss->fd));
68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd,
96 ** Have received SSL3 record header in gs->hdr
    [all...]
ssl3ext.c 2 * SSL3 Protocol
523 /* The caller must be holding sid->u.ssl3.lock for reading. We cannot
531 session_ticket = &sid->u.ssl3.locked.sessionTicket;
675 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE);
676 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result);
710 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE);
711 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED;
713 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name);
846 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) {
    [all...]
sslsnce.c 130 /*104 */} ssl3; member in union:sidCacheEntryStr::__anon14358
380 sce->u.ssl3.certIndex = ndx;
440 sce->u.ssl3.srvNameIndex = ndx;
442 PORT_Memcpy(sce->u.ssl3.srvNameHash, snce.nameHash, SHA256_LENGTH);
502 to->u.ssl3.cipherSuite = from->u.ssl3.cipherSuite;
503 to->u.ssl3.compression = (PRUint16)from->u.ssl3.compression;
504 to->u.ssl3.keys = from->u.ssl3.keys
    [all...]
sslinfo.c 54 } else if (ss->ssl3.initialized) { /* SSL3 and TLS */
60 inf.cipherSuite = ss->ssl3.hs.cipher_suite;
61 inf.compressionMethod = ss->ssl3.cwSpec->compression_method;
75 unsigned int sidLen = sid->u.ssl3.sessionIDLength;
78 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen);
313 ss->ssl3.initialized) { /* TLS */
316 crsName = &ss->ssl3.cwSpec->srvVirtName;
379 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
381 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH)
    [all...]
ssl3ecc.c 2 * SSL3 Protocol
284 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0);
285 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2);
392 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0);
393 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2);
450 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa) {
454 if (!SSL_IS_CURVE_NEGOTIATED(ss->ssl3.hs.negotiatedECCurves, ec_curve)) {
483 return ssl3_GetCurveWithECKeyStrength(ss->ssl3.hs.negotiatedECCurves,
611 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0);
612 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2)
    [all...]
sslreveal.c 97 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
sslsecur.c 233 ss->ssl3.hs.canFalseStart = PR_FALSE;
234 ss->ssl3.hs.restartTarget = NULL;
391 if (!ss->ssl3.initialized) {
402 *canFalseStart = ss->ssl3.hs.kea_def->kea == kea_dhe_dss ||
403 ss->ssl3.hs.kea_def->kea == kea_dhe_rsa ||
404 ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa ||
405 ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa;
1132 ss->ssl3.initialized) {
1164 ss->ssl3.initialized) {
    [all...]
sslsock.c 221 PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, os->ssl3.dtlsSRTPCiphers,
222 sizeof(PRUint16) * os->ssl3.dtlsSRTPCipherCount);
223 ss->ssl3.dtlsSRTPCipherCount = os->ssl3.dtlsSRTPCipherCount;
    [all...]
sslauth.c 57 for (cur = ss->ssl3.peerCertChain; cur; cur = cur->next) {
sslimpl.h 286 ** SSL3 cipher suite policy and preference struct.
383 * SSL3: recv'd ciphertext records are put in inbuf (see below), then
388 /* number of bytes previously read into hdr or buf(ssl2) or inbuf (ssl3).
416 /* These next two values are used by SSL2 and SSL3.
426 ** Always zero for SSl3 application data.
431 /* Buffer for ssl3 to read (encrypted) data from the socket */
432 sslBuffer inbuf; /*recvBufLock*/ /* ssl3 only */
438 ** For SSL2, the plaintext portion is two bytes long. For SSl3 it is 5.
575 ** These are the "specs" in the "ssl3" struct.
631 /* The rest of the members, except for the members of u.ssl3.locked, ma
746 } ssl3; member in union:sslSessionIDStr::__anon14338
1350 ssl3State ssl3; member in struct:sslSocketStr
    [all...]
  /external/openssl/android.testssl/
testssl 50 $ssltest -ssl3 $extra || exit 1
53 $ssltest -ssl3 -server_auth $CA $extra || exit 1
56 $ssltest -ssl3 -client_auth $CA $extra || exit 1
59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1
91 $ssltest -bio_pair -ssl3 $extra || exit 1
94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1
97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1
100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1
132 prot="-ssl3"
  /external/chromium_org/net/socket/
ssl_session_cache_openssl_unittest.cc 299 // current cache entry) is not yet good, fail to associate it with |ssl3|.
300 ScopedSSL ssl3(NewSSL(key));
301 EXPECT_FALSE(cache_.SetSSLSession(ssl3.get()));
302 EXPECT_NE(session, ssl3.get()->session);
303 EXPECT_NE(session2, ssl3.get()->session);
304 EXPECT_EQ(1, ssl3.get()->session->references);
ssl_client_socket_pool_unittest.cc 273 SSLSocketDataProvider ssl3(ASYNC, ERR_SSL_PROTOCOL_ERROR);
274 ssl3.is_in_session_cache = false;
286 socket_factory_.AddSSLSocketDataProvider(&ssl3);
346 SSLSocketDataProvider ssl3(ASYNC, OK);
347 ssl3.is_in_session_cache = false;
348 ssl3.should_pause_on_connect = true;
351 socket_factory_.AddSSLSocketDataProvider(&ssl3);
418 SSLSocketDataProvider ssl3(ASYNC, OK);
419 ssl3.is_in_session_cache = false;
422 socket_factory_.AddSSLSocketDataProvider(&ssl3);
    [all...]
  /external/openssl/ssl/
ssltest.c 349 fprintf(stderr," -ssl3 - use SSLv3\n");
508 int tls1=0,ssl2=0,ssl3=0,ret=1; local
666 else if (strcmp(*argv,"-ssl3") == 0)
667 ssl3=1;
799 if (!ssl2 && !ssl3 && !tls1 && number > 1 && !reuse && !force)
803 "or add one of -ssl2, -ssl3, -tls1, -reuse\n"
884 if (ssl3)
893 if (ssl3)
    [all...]
ssl.h 657 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and
    [all...]
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ssl.h 483 * SSL3, without a length prefix. */
546 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and
550 * possible (SSL3 and TLS only). This stops SSL_get_shared_ciphers from
    [all...]
  /external/openssl/include/openssl/
ssl.h 657 /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and
    [all...]
  /external/chromium_org/net/http/
http_network_transaction_unittest.cc     [all...]

Completed in 3335 milliseconds