/external/chromium_org/net/third_party/nss/ssl/ |
D | sslauth.c | 20 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", in SSL_PeerCertificate() 41 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificateChain", in SSL_PeerCertificateChain() 78 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", in SSL_LocalCertificate() 106 SSL_DBG(("%d: SSL[%d]: bad socket in SecurityStatus", in SSL_SecurityStatus() 189 SSL_DBG(("%d: SSL[%d]: bad socket in AuthCertificateHook", in SSL_AuthCertificateHook() 209 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", in SSL_GetClientAuthDataHook() 226 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetClientChannelIDCallback", in SSL_SetClientChannelIDCallback() 248 SSL_DBG(("%d: SSL[%d]: bad socket in GetPlatformClientAuthDataHook", in SSL_GetPlatformClientAuthDataHook() 267 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", in SSL_SetPKCS11PinArg()
|
D | sslsock.c | 577 SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); in SSL_OptionSet() 830 SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); in SSL_OptionGet() 1277 SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefSet", SSL_GETPID(), fd)); in SSL_CipherPrefSet() 1300 SSL_DBG(("%d: SSL[%d]: bad socket in CipherOrderSet", SSL_GETPID(), in SSL_CipherOrderSet() 1318 SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefGet", SSL_GETPID(), fd)); in SSL_CipherPrefGet() 1368 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelBinding", in SSL_GetChannelBinding() 1401 SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ImportFD", in ssl_ImportFD() 1442 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoCallback", SSL_GETPID(), in SSL_SetNextProtoCallback() 1469 SSL_DBG(("%d: SSL[%d]: bad socket in ssl_NextProtoNegoCallback", in ssl_NextProtoNegoCallback() 1520 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego", in SSL_SetNextProtoNego() [all …]
|
D | sslsecur.c | 175 SSL_DBG(("%d: SSL[%d]: bad socket in SetTimeout", SSL_GETPID(), fd)); in ssl_SetTimeout() 202 SSL_DBG(("%d: SSL[%d]: bad socket in ResetHandshake", SSL_GETPID(), s)); in SSL_ResetHandshake() 269 SSL_DBG(("%d: SSL[%d]: bad socket in RedoHandshake", SSL_GETPID(), fd)); in SSL_ReHandshake() 323 SSL_DBG(("%d: SSL[%d]: bad socket in HandshakeCallback", in SSL_HandshakeCallback() 356 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetCanFalseStartCallback", in SSL_SetCanFalseStartCallback() 386 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_RecommendedCanFalseStart", in SSL_RecommendedCanFalseStart() 428 SSL_DBG(("%d: SSL[%d]: bad socket in ForceHandshake", in SSL_ForceHandshake() 1087 SSL_DBG(("%d: SSL[%d]: connect failed, errno=%d", in ssl_SecureConnect() 1350 SSL_DBG(("%d: SSL[%d]: bad socket in SSLBadCertHook", in SSL_BadCertHook() 1373 SSL_DBG(("%d: SSL[%d]: bad socket in SSLSetURL", in SSL_SetURL() [all …]
|
D | ssl3gthr.c | 68 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, in ssl3_GatherData() 202 SSL_DBG(("%d: SSL3[%d]: recv error %d", SSL_GETPID(), ss->fd, in dtls_GatherData() 215 SSL_DBG(("%d: SSL3[%d]: rest of DTLS packet " in dtls_GatherData() 230 SSL_DBG(("%d: SSL3[%d]: rest of DTLS packet too short " in dtls_GatherData()
|
D | sslcon.c | 251 SSL_DBG(("%d: SSL[%d]: Can't handshake! all versions disabled.", in ssl2_CheckConfigSanity() 472 SSL_DBG(("%d: SSL[%d]: ssl2_GetSendBuffer failed, tried to get %d bytes", in ssl2_GetSendBuffer() 1427 SSL_DBG(("%d: SSL[%d]: ssl2_CreateSessionCypher: unknown cipher=%d", in ssl2_CreateSessionCypher() 1581 SSL_DBG(("%d: SSL[%d]: ssl2_ServerSetupSessionCypher: unknown cipher=%d", in ssl2_ServerSetupSessionCypher() 1590 SSL_DBG(("%d: SSL[%d]: disallowed cipher=%d", in ssl2_ServerSetupSessionCypher() 1598 SSL_DBG(("%d: SSL[%d]: invalid master secret key length=%d (bits)!", in ssl2_ServerSetupSessionCypher() 1605 SSL_DBG(("%d: SSL[%d]: invalid clear key length, ckLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1612 SSL_DBG(("%d: SSL[%d]: invalid key args length, caLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1624 SSL_DBG(("%d: SSL[%d]: invalid encrypted key length, ekLen=%d (bytes)!", in ssl2_ServerSetupSessionCypher() 1652 SSL_DBG(("%d: SSL[%d]: strange encryption block", in ssl2_ServerSetupSessionCypher() [all …]
|
D | sslgathr.c | 95 SSL_DBG(("%d: SSL[%d]: recv error %d", SSL_GETPID(), ss->fd, in ssl2_GatherData() 228 SSL_DBG(("%d: SSL[%d]: sender, count=%d blockSize=%d", in ssl2_GatherData() 280 SSL_DBG(("%d: SSL[%d]: mac check failed, seq=%d", in ssl2_GatherData()
|
D | sslreveal.c | 88 SSL_DBG(("%d: SSL[%d]: bad socket in HandshakeNegotiatedExtension", in SSL_HandshakeNegotiatedExtension()
|
D | sslinfo.c | 37 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelInfo", in SSL_GetChannelInfo() 306 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetNegotiatedHostInfo", in SSL_GetNegotiatedHostInfo() 351 SSL_DBG(("%d: SSL[%d]: bad socket in ExportKeyingMaterial", in SSL_ExportKeyingMaterial()
|
D | ssl3ext.c | 159 SSL_DBG(("%d: SSL[%d]: Pub or priv key(s) is NULL.", in ssl3_GenerateSessionTicketKeysPKCS11() 1421 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.", in ssl3_ServerHandleSessionTicketXtn() 1431 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.", in ssl3_ServerHandleSessionTicketXtn() 1461 SSL_DBG(("%d: SSL[%d]: Unable to create HMAC context: %d.", in ssl3_ServerHandleSessionTicketXtn() 1465 SSL_DBG(("%d: SSL[%d]: Successfully created HMAC context.", in ssl3_ServerHandleSessionTicketXtn() 1483 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.", in ssl3_ServerHandleSessionTicketXtn() 1505 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", in ssl3_ServerHandleSessionTicketXtn() 1525 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", in ssl3_ServerHandleSessionTicketXtn() 1733 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.", in ssl3_ServerHandleSessionTicketXtn()
|
D | sslsnce.c | 469 SSL_DBG(("%d: SSL: masterKeyLen=%d cipherArgLen=%d", in ConvertFromSID() 1844 SSL_DBG(("%d: SSL[%s]: Unable to wrap session ticket %s.", in WrapTicketKey() 1873 SSL_DBG(("%d: SSL[%s]: Unable to generate random key name bytes.", in GenerateTicketKeys() 1891 SSL_DBG(("%d: SSL[%s]: Unable to generate session ticket keys.", in GenerateTicketKeys() 1962 SSL_DBG(("%d: SSL[%s]: Unable to unwrap session ticket keys.", in UnwrapCachedTicketKeys() 1966 SSL_DBG(("%d: SSL[%s]: Successfully unwrapped session ticket keys.", in UnwrapCachedTicketKeys()
|
D | sslimpl.h | 108 #define SSL_DBG(b) if (ssl_debug) ssl_Trace b macro 110 #define SSL_DBG(b) macro
|
D | ssl3con.c | 2962 SSL_DBG(("%d: SSL3[%d]: SendRecord, tried to get %d bytes", in ssl3_SendRecord() 3407 SSL_DBG(("%d: SSL3[%d]: peer certificate is no good: error=%d", in ssl3_SendAlertForCertError() 8865 SSL_DBG(("%d: SSL3[%d]: bad v2 client hello message, len=%d should=%d", in ssl3_HandleV2ClientHello() 11927 SSL_DBG(("%d: SSL3[%d]: HandleRecord, resuming handshake", in ssl3_HandleRecord() 11951 SSL_DBG(("%d: SSL3[%d]: HandleRecord, received packet " in ssl3_HandleRecord() 11963 SSL_DBG(("%d: SSL3[%d]: HandleRecord, rejecting " in ssl3_HandleRecord() 12035 SSL_DBG(("%d: SSL3[%d]: HandleRecord, tried to get %d bytes", in ssl3_HandleRecord() 12160 SSL_DBG(("%d: SSL3[%d]: decryption failed", SSL_GETPID(), ss->fd)); in ssl3_HandleRecord() 12194 SSL_DBG(("%d: SSL3[%d]: HandleRecord, tried to get %d bytes", in ssl3_HandleRecord() 12293 SSL_DBG(("%d: SSL3[%d]: bogus content type=%d", in ssl3_HandleRecord()
|
/external/chromium_org/net/third_party/nss/patches/ |
D | didhandshakeresume.patch | 26 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
|
D | getrequestedclientcerttypes.patch | 69 + SSL_DBG(("%d: SSL[%d]: bad socket in "
|
D | cipherorder.patch | 93 + SSL_DBG(("%d: SSL[%d]: bad socket in CipherOrderSet", SSL_GETPID(),
|
D | tlsunique.patch | 135 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelBinding",
|
D | restartclientauth.patch | 179 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_RestartHandshakeAfterCertReq",
|
D | channelid.patch | 451 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetClientChannelIDCallback", 611 + SSL_DBG(("%d: SSL[%d]: bad socket in"
|
D | signedcertificatetimestamps.patch | 296 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_PeerSignedCertTimestamps",
|
D | clientauth.patch | 257 + SSL_DBG(("%d: SSL[%d]: bad socket in GetPlatformClientAuthDataHook",
|