/external/chromium/net/third_party/nss/ssl/ |
D | sslauth.c | 52 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", in SSL_PeerCertificate() 70 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", in SSL_LocalCertificate() 98 SSL_DBG(("%d: SSL[%d]: bad socket in SecurityStatus", in SSL_SecurityStatus() 182 SSL_DBG(("%d: SSL[%d]: bad socket in AuthCertificateHook", in SSL_AuthCertificateHook() 202 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", in SSL_GetClientAuthDataHook() 220 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", in SSL_SetPKCS11PinArg()
|
D | sslsock.c | 565 SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); in SSL_OptionSet() 758 SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); in SSL_OptionGet() 1125 SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefSet", SSL_GETPID(), fd)); in SSL_CipherPrefSet() 1153 SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefGet", SSL_GETPID(), fd)); in SSL_CipherPrefGet() 1230 SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ImportFD", in SSL_ImportFD() 1264 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego", SSL_GETPID(), in SSL_SetNextProtoNego() 1304 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetNextProto", SSL_GETPID(), in SSL_GetNextProto() 1340 SSL_DBG(("%d: SSL[%d]: bad socket in accept", SSL_GETPID(), fd)); in ssl_Accept() 1357 SSL_DBG(("%d: SSL[%d]: accept failed, errno=%d", in ssl_Accept() 1408 SSL_DBG(("%d: SSL[%d]: bad socket in connect", SSL_GETPID(), fd)); in ssl_Connect() [all …]
|
D | sslcon.c | 285 SSL_DBG(("%d: SSL[%d]: Can't handshake! both v2 and v3 disabled.", in ssl2_CheckConfigSanity() 506 SSL_DBG(("%d: SSL[%d]: ssl2_GetSendBuffer failed, tried to get %d bytes", in ssl2_GetSendBuffer() 1459 SSL_DBG(("%d: SSL[%d]: ssl2_CreateSessionCypher: unknown cipher=%d", in ssl2_CreateSessionCypher() 1613 SSL_DBG(("%d: SSL[%d]: ssl2_ServerSetupSessionCypher: unknown cipher=%d", in ssl2_ServerSetupSessionCypher() 1622 SSL_DBG(("%d: SSL[%d]: disallowed cipher=%d", in ssl2_ServerSetupSessionCypher() 1630 SSL_DBG(("%d: SSL[%d]: invalid master secret key length=%d (bits)!", in ssl2_ServerSetupSessionCypher() 1637 SSL_DBG(("%d: SSL[%d]: invalid clear key length, ckLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1644 SSL_DBG(("%d: SSL[%d]: invalid key args length, caLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1656 SSL_DBG(("%d: SSL[%d]: invalid encrypted key length, ekLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1684 SSL_DBG(("%d: SSL[%d]: strange encryption block", in ssl2_ServerSetupSessionCypher() [all …]
|
D | sslsecur.c | 198 SSL_DBG(("%d: SSL[%d]: bad socket in SetTimeout", SSL_GETPID(), fd)); in ssl_SetTimeout() 225 SSL_DBG(("%d: SSL[%d]: bad socket in ResetHandshake", SSL_GETPID(), s)); in SSL_ResetHandshake() 288 SSL_DBG(("%d: SSL[%d]: bad socket in RedoHandshake", SSL_GETPID(), fd)); in SSL_ReHandshake() 342 SSL_DBG(("%d: SSL[%d]: bad socket in HandshakeCallback", in SSL_HandshakeCallback() 382 SSL_DBG(("%d: SSL[%d]: bad socket in ForceHandshake", in SSL_ForceHandshake() 986 SSL_DBG(("%d: SSL[%d]: connect failed, errno=%d", in ssl_SecureConnect() 1231 SSL_DBG(("%d: SSL[%d]: bad socket in SSLBadCertHook", in SSL_BadCertHook() 1253 SSL_DBG(("%d: SSL[%d]: bad socket in SSLSetURL", in SSL_SetURL()
|
D | ssl3ext.c | 146 SSL_DBG(("%d: SSL[%d]: Pub or priv key(s) is NULL.", in ssl3_GenerateSessionTicketKeysPKCS11() 934 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.", in ssl3_ServerHandleSessionTicketXtn() 944 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.", in ssl3_ServerHandleSessionTicketXtn() 971 SSL_DBG(("%d: SSL[%d]: Unable to create HMAC context: %d.", in ssl3_ServerHandleSessionTicketXtn() 975 SSL_DBG(("%d: SSL[%d]: Successfully created HMAC context.", in ssl3_ServerHandleSessionTicketXtn() 993 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.", in ssl3_ServerHandleSessionTicketXtn() 1014 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", in ssl3_ServerHandleSessionTicketXtn() 1032 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", in ssl3_ServerHandleSessionTicketXtn() 1221 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.", in ssl3_ServerHandleSessionTicketXtn()
|
D | sslgathr.c | 128 SSL_DBG(("%d: SSL[%d]: recv error %d", SSL_GETPID(), ss->fd, in ssl2_GatherData() 261 SSL_DBG(("%d: SSL[%d]: sender, count=%d blockSize=%d", in ssl2_GatherData() 314 SSL_DBG(("%d: SSL[%d]: mac check failed, seq=%d", in ssl2_GatherData()
|
D | ssl3gthr.c | 100 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, in ssl3_GatherData()
|
D | sslsnce.c | 417 SSL_DBG(("%d: SSL: masterKeyLen=%d cipherArgLen=%d", in ConvertFromSID() 1647 SSL_DBG(("%d: SSL[%s]: Unable to wrap session ticket %s.", in WrapTicketKey() 1668 SSL_DBG(("%d: SSL[%s]: Unable to generate random key name bytes.", in GenerateAndWrapTicketKeys() 1685 SSL_DBG(("%d: SSL[%s]: Unable to generate session ticket keys.", in GenerateAndWrapTicketKeys() 1732 SSL_DBG(("%d: SSL[%s]: Unable to unwrap session ticket keys.", in UnwrapCachedTicketKeys() 1736 SSL_DBG(("%d: SSL[%s]: Successfully unwrapped session ticket keys.", in UnwrapCachedTicketKeys()
|
D | sslinfo.c | 71 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelInfo", in SSL_GetChannelInfo()
|
D | sslimpl.h | 128 #define SSL_DBG(b) if (ssl_debug) ssl_Trace b macro 130 #define SSL_DBG(b) macro
|
D | ssl3con.c | 2225 SSL_DBG(("%d: SSL3[%d]: SendRecord, tried to get %d bytes", in ssl3_SendRecord() 6391 SSL_DBG(("%d: SSL3[%d]: bad v2 client hello message, len=%d should=%d", in ssl3_HandleV2ClientHello() 7552 SSL_DBG(("%d: SSL3[%d]: go to async cert handler", in ssl3_HandleCertificate() 7683 SSL_DBG(("%d: SSL3[%d]: peer certificate is no good: error=%d", in ssl3_HandleCertificate() 8503 SSL_DBG(("%d: SSL3[%d]: HandleRecord, resuming handshake", in ssl3_HandleRecord() 8528 SSL_DBG(("%d: SSL3[%d]: HandleRecord, tried to get %d bytes", in ssl3_HandleRecord() 8607 SSL_DBG(("%d: SSL3[%d]: mac check failed", SSL_GETPID(), ss->fd)); in ssl3_HandleRecord() 8630 SSL_DBG(("%d: SSL3[%d]: HandleRecord, tried to get %d bytes", in ssl3_HandleRecord() 8699 SSL_DBG(("%d: SSL3[%d]: bogus content type=%d", in ssl3_HandleRecord()
|