/external/chromium_org/net/third_party/nss/patches/ |
D | nssrwlock.patch | 7 if (sid->u.ssl3.lock) { 8 - PR_RWLock_Rlock(sid->u.ssl3.lock); 9 + NSSRWLock_LockRead(sid->u.ssl3.lock); 17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); 26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 27 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 35 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 36 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } [all …]
|
D | clientauth.patch | 9 + * used, u.ssl3.clAuthValid will be false and this function will always 11 if (!sid || !sid->u.ssl3.clAuthValid) { 16 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); 17 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); 18 - keyType = ss->ssl3.clientPrivateKey->keyType; 19 - rv = ssl3_SignHashes(&hashes, ss->ssl3.clientPrivateKey, &buf, isTLS); 23 + if (ss->ssl3.platformClientKey) { 26 + &ss->ssl3.clientCertificate->subjectPublicKeyInfo); 28 + &hashes, ss->ssl3.platformClientKey, &buf, isTLS, keyType); 29 + ssl_FreePlatformKey(ss->ssl3.platformClientKey); [all …]
|
D | channelid.patch | 16 + if (ss->ssl3.channelID != NULL) { 17 + SECKEY_DestroyPrivateKey(ss->ssl3.channelID); 18 + ss->ssl3.channelID = NULL; 20 + if (ss->ssl3.channelIDPub != NULL) { 21 + SECKEY_DestroyPublicKey(ss->ssl3.channelIDPub); 22 + ss->ssl3.channelIDPub = NULL; 39 ss->ssl3.hs.isResuming = PR_FALSE; 40 ss->ssl3.hs.ws = wait_server_cert; 48 + &ss->ssl3.channelIDPub, &ss->ssl3.channelID); 54 + ss->ssl3.channelIDPub == NULL || [all …]
|
D | restartclientauth.patch | 48 + ss->ssl3.clientCertificate = cert; 49 + ss->ssl3.clientPrivateKey = key; 50 + ss->ssl3.clientCertChain = certChain; 53 + if (ss->ssl3.clientCertificate) { 54 + CERT_DestroyCertificate(ss->ssl3.clientCertificate); 55 + ss->ssl3.clientCertificate = NULL; 57 + if (ss->ssl3.clientPrivateKey) { 58 + SECKEY_DestroyPrivateKey(ss->ssl3.clientPrivateKey); 59 + ss->ssl3.clientPrivateKey = NULL; 61 + if (ss->ssl3.clientCertChain != NULL) { [all …]
|
D | sessioncache.patch | 5 ss->ssl3.hs.receivedNewSessionTicket = PR_FALSE; 8 - if (ss->ssl3.hs.cacheSID) { 9 + if (ss->ssl3.hs.cacheSID && ss->sec.isServer) { 12 ss->ssl3.hs.cacheSID = PR_FALSE; 47 + if (ss->ssl3.hs.cacheSID) { 49 + ss->ssl3.hs.cacheSID = PR_FALSE;
|
D | cachecerts.patch | 29 ss->ssl3.peerCertChain = NULL; 42 + PORT_Assert(!ss->ssl3.peerCertArena); 43 + PORT_Assert(!ss->ssl3.peerCertChain); 44 + ss->ssl3.peerCertArena = arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); 56 + ss->ssl3.peerCertChain = certs; 71 * ssl3 CertificateStatus message. 77 + ssl3_CopyPeerCertsToSID(ss->ssl3.peerCertChain, ss->sec.ci.sid);
|
D | signedcertificatetimestamps.patch | 5 sid->u.ssl3.sessionIDLength = sidBytes.len; 6 PORT_Memcpy(sid->u.ssl3.sessionID, sidBytes.data, sidBytes.len); 10 + rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.signedCertTimestamps, 16 ss->ssl3.hs.isResuming = PR_FALSE; 17 ss->ssl3.hs.ws = wait_server_cert; 209 + * (in sec.ci.sid.u.ssl3.signedCertTimestamps). 222 if (sid->u.ssl3.originalHandshakeHash.data) { 223 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE); 225 + if (sid->u.ssl3.signedCertTimestamps.data) { 226 + SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE); [all …]
|
D | tlsunique.patch | 23 + isTLS = (PRBool)(ss->ssl3.cwSpec->version > SSL_LIBRARY_VERSION_3_0); 29 + len = ss->ssl3.hs.finishedBytes; 41 + if (ss->firstHsDone && ss->ssl3.hs.ws != idle_handshake) { 48 + if (ss->ssl3.hs.isResuming) 58 + memcpy(out, &ss->ssl3.hs.finishedMsgs.tFinished[index], len); 60 + memcpy(out, &ss->ssl3.hs.finishedMsgs.sFinished[index], len);
|
D | fallbackscsv.patch | 29 PRINT_BUF(4, (ss, "client, found session-id:", sid->u.ssl3.sessionID, 31 if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 38 if (ss->ssl3.hs.sendingSCSV) { 55 + if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 62 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
|
D | secretexporterlocks.patch | 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH); 30 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH);
|
/external/chromium_org/net/third_party/nss/ssl/ |
D | dtlscon.c | 247 if ((message_seq == ss->ssl3.hs.recvMessageSeq) in dtls_HandleHandshake() 251 ss->ssl3.hs.msg_type = (SSL3HandshakeType)type; in dtls_HandleHandshake() 252 ss->ssl3.hs.msg_len = message_length; in dtls_HandleHandshake() 256 dtls_FreeHandshakeMessages(&ss->ssl3.hs.lastMessageFlight); in dtls_HandleHandshake() 257 ss->ssl3.hs.recvdHighWater = -1; in dtls_HandleHandshake() 262 if (ss->ssl3.hs.rtRetries == 0) { in dtls_HandleHandshake() 263 ss->ssl3.hs.rtTimeoutMs = INITIAL_DTLS_TIMEOUT_MS; in dtls_HandleHandshake() 266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len); in dtls_HandleHandshake() 272 if (message_seq < ss->ssl3.hs.recvMessageSeq) { in dtls_HandleHandshake() 275 if (ss->ssl3.hs.rtTimerCb == NULL) { in dtls_HandleHandshake() [all …]
|
D | ssl3con.c | 1403 ssl3CipherSuite suite = ss->ssl3.hs.cipher_suite; in ssl3_SetupPendingCipherSpec() 1414 pwSpec = ss->ssl3.pwSpec; in ssl3_SetupPendingCipherSpec() 1415 PORT_Assert(pwSpec == ss->ssl3.prSpec); in ssl3_SetupPendingCipherSpec() 1418 cwSpec = ss->ssl3.cwSpec; in ssl3_SetupPendingCipherSpec() 1449 ss->ssl3.hs.suite_def = suite_def; in ssl3_SetupPendingCipherSpec() 1450 ss->ssl3.hs.kea_def = &kea_defs[kea]; in ssl3_SetupPendingCipherSpec() 1451 PORT_Assert(ss->ssl3.hs.kea_def->kea == kea); in ssl3_SetupPendingCipherSpec() 1468 pwSpec->compression_method = ss->ssl3.hs.compression; in ssl3_SetupPendingCipherSpec() 1644 PORT_Assert(ss->ssl3.prSpec == ss->ssl3.pwSpec); in ssl3_InitPendingContextsBypass() 1646 pwSpec = ss->ssl3.pwSpec; in ssl3_InitPendingContextsBypass() [all …]
|
D | sslnonce.c | 124 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 125 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 128 if (sid->u.ssl3.srvName.data) { in ssl_DestroySID() 129 SECITEM_FreeItem(&sid->u.ssl3.srvName, PR_FALSE); in ssl_DestroySID() 131 if (sid->u.ssl3.originalHandshakeHash.data) { in ssl_DestroySID() 132 SECITEM_FreeItem(&sid->u.ssl3.originalHandshakeHash, PR_FALSE); in ssl_DestroySID() 134 if (sid->u.ssl3.signedCertTimestamps.data) { in ssl_DestroySID() 135 SECITEM_FreeItem(&sid->u.ssl3.signedCertTimestamps, PR_FALSE); in ssl_DestroySID() 138 if (sid->u.ssl3.lock) { in ssl_DestroySID() 139 NSSRWLock_Destroy(sid->u.ssl3.lock); in ssl_DestroySID() [all …]
|
D | ssl3ext.c | 531 session_ticket = &sid->u.ssl3.locked.sessionTicket; in ssl3_SendSessionTicketXtn() 675 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); in ssl3_ClientHandleNextProtoNegoXtn() 676 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result); in ssl3_ClientHandleNextProtoNegoXtn() 710 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); in ssl3_ClientHandleAppProtoXtn() 711 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED; in ssl3_ClientHandleAppProtoXtn() 713 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name); in ssl3_ClientHandleAppProtoXtn() 846 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) { in ssl3_ClientSendChannelIDXtn() 1057 if (ss->ssl3.pwSpec->msItem.len && ss->ssl3.pwSpec->msItem.data) { in ssl3_SendNewSessionTicket() 1059 ms_item.data = ss->ssl3.pwSpec->msItem.data; in ssl3_SendNewSessionTicket() 1060 ms_item.len = ss->ssl3.pwSpec->msItem.len; in ssl3_SendNewSessionTicket() [all …]
|
D | sslsnce.c | 130 /*104 */} ssl3; member 380 sce->u.ssl3.certIndex = ndx; in CacheCert() 440 sce->u.ssl3.srvNameIndex = ndx; in CacheSrvName() 442 PORT_Memcpy(sce->u.ssl3.srvNameHash, snce.nameHash, SHA256_LENGTH); in CacheSrvName() 502 to->u.ssl3.cipherSuite = from->u.ssl3.cipherSuite; in ConvertFromSID() 503 to->u.ssl3.compression = (PRUint16)from->u.ssl3.compression; in ConvertFromSID() 504 to->u.ssl3.keys = from->u.ssl3.keys; in ConvertFromSID() 505 to->u.ssl3.masterWrapMech = from->u.ssl3.masterWrapMech; in ConvertFromSID() 506 to->u.ssl3.exchKeyType = from->u.ssl3.exchKeyType; in ConvertFromSID() 507 to->sessionIDLength = from->u.ssl3.sessionIDLength; in ConvertFromSID() [all …]
|
D | ssl3gthr.c | 298 if (ss->ssl3.hs.restartTarget) { in ssl3_GatherCompleteHandshake() 309 if (ss->ssl3.hs.msgState.buf) { in ssl3_GatherCompleteHandshake() 310 if (ss->ssl3.hs.msgState.len == 0) { in ssl3_GatherCompleteHandshake() 311 ss->ssl3.hs.msgState.buf = NULL; in ssl3_GatherCompleteHandshake() 395 if (ss->ssl3.hs.ws == idle_handshake) { in ssl3_GatherCompleteHandshake() 403 PORT_Assert(!ss->ssl3.hs.canFalseStart); in ssl3_GatherCompleteHandshake() 405 } else if (ss->ssl3.hs.canFalseStart) { in ssl3_GatherCompleteHandshake() 419 ss->ssl3.hs.canFalseStart = PR_FALSE; in ssl3_GatherCompleteHandshake()
|
D | sslinfo.c | 54 } else if (ss->ssl3.initialized) { /* SSL3 and TLS */ in SSL_GetChannelInfo() 60 inf.cipherSuite = ss->ssl3.hs.cipher_suite; in SSL_GetChannelInfo() 61 inf.compressionMethod = ss->ssl3.cwSpec->compression_method; in SSL_GetChannelInfo() 75 unsigned int sidLen = sid->u.ssl3.sessionIDLength; in SSL_GetChannelInfo() 78 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen); in SSL_GetChannelInfo() 313 ss->ssl3.initialized) { /* TLS */ in SSL_GetNegotiatedHostInfo() 316 crsName = &ss->ssl3.cwSpec->srvVirtName; in SSL_GetNegotiatedHostInfo() 379 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH); in SSL_ExportKeyingMaterial() 381 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH); in SSL_ExportKeyingMaterial() 396 if (!ss->ssl3.cwSpec->master_secret && !ss->ssl3.cwSpec->msItem.len) { in SSL_ExportKeyingMaterial() [all …]
|
D | ssl3ecc.c | 284 isTLS = (PRBool)(ss->ssl3.pwSpec->version > SSL_LIBRARY_VERSION_3_0); in ssl3_SendECDHClientKeyExchange() 285 isTLS12 = (PRBool)(ss->ssl3.pwSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); in ssl3_SendECDHClientKeyExchange() 392 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); in ssl3_HandleECDHClientKeyExchange() 393 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); in ssl3_HandleECDHClientKeyExchange() 450 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa) { in ssl3_GetCurveNameForServerSocket() 454 if (!SSL_IS_CURVE_NEGOTIATED(ss->ssl3.hs.negotiatedECCurves, ec_curve)) { in ssl3_GetCurveNameForServerSocket() 483 return ssl3_GetCurveWithECKeyStrength(ss->ssl3.hs.negotiatedECCurves, in ssl3_GetCurveNameForServerSocket() 611 isTLS = (PRBool)(ss->ssl3.prSpec->version > SSL_LIBRARY_VERSION_3_0); in ssl3_HandleECDHServerKeyExchange() 612 isTLS12 = (PRBool)(ss->ssl3.prSpec->version >= SSL_LIBRARY_VERSION_TLS_1_2); in ssl3_HandleECDHServerKeyExchange() 680 &ss->ssl3.hs.client_random, in ssl3_HandleECDHServerKeyExchange() [all …]
|
D | sslsecur.c | 233 ss->ssl3.hs.canFalseStart = PR_FALSE; in SSL_ResetHandshake() 234 ss->ssl3.hs.restartTarget = NULL; in SSL_ResetHandshake() 391 if (!ss->ssl3.initialized) { in SSL_RecommendedCanFalseStart() 402 *canFalseStart = ss->ssl3.hs.kea_def->kea == kea_dhe_dss || in SSL_RecommendedCanFalseStart() 403 ss->ssl3.hs.kea_def->kea == kea_dhe_rsa || in SSL_RecommendedCanFalseStart() 404 ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa || in SSL_RecommendedCanFalseStart() 405 ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa; in SSL_RecommendedCanFalseStart() 1132 ss->ssl3.initialized) { in ssl_SecureClose() 1164 ss->ssl3.initialized) { in ssl_SecureShutdown() 1279 falseStart = ss->ssl3.hs.canFalseStart; in ssl_SecureSend() [all …]
|
D | sslsock.c | 221 PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, os->ssl3.dtlsSRTPCiphers, in ssl_DupSocket() 222 sizeof(PRUint16) * os->ssl3.dtlsSRTPCipherCount); in ssl_DupSocket() 223 ss->ssl3.dtlsSRTPCipherCount = os->ssl3.dtlsSRTPCipherCount; in ssl_DupSocket() 1487 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NEGOTIATED; in ssl_NextProtoNegoCallback() 1497 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NO_OVERLAP; in ssl_NextProtoNegoCallback() 1556 *state = ss->ssl3.nextProtoState; in SSL_GetNextProto() 1558 if (ss->ssl3.nextProtoState != SSL_NEXT_PROTO_NO_SUPPORT && in SSL_GetNextProto() 1559 ss->ssl3.nextProto.data) { in SSL_GetNextProto() 1560 if (ss->ssl3.nextProto.len > bufLenMax) { in SSL_GetNextProto() 1564 PORT_Memcpy(buf, ss->ssl3.nextProto.data, ss->ssl3.nextProto.len); in SSL_GetNextProto() [all …]
|
D | notes.txt | 11 hs = ss->ssl3->hs 80 ss->ssl3 (the pointer) 81 ss->ssl3->current_write* (the pointer and the data in the spec 99 ssl3->current_read* (the pointer and all data refernced) 110 ss->ssl3->current_write-> (spec)
|
/external/openssl/android.testssl/ |
D | testssl | 50 $ssltest -ssl3 $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 91 $ssltest -bio_pair -ssl3 $extra || exit 1 94 $ssltest -bio_pair -ssl3 -server_auth $CA $extra || exit 1 97 $ssltest -bio_pair -ssl3 -client_auth $CA $extra || exit 1 100 $ssltest -bio_pair -ssl3 -server_auth -client_auth $CA $extra || exit 1
|
/external/chromium_org/net/socket/ |
D | ssl_client_socket_pool_unittest.cc | 273 SSLSocketDataProvider ssl3(ASYNC, ERR_SSL_PROTOCOL_ERROR); in TEST_P() local 274 ssl3.is_in_session_cache = false; in TEST_P() 286 socket_factory_.AddSSLSocketDataProvider(&ssl3); in TEST_P() 346 SSLSocketDataProvider ssl3(ASYNC, OK); in TEST_P() local 347 ssl3.is_in_session_cache = false; in TEST_P() 348 ssl3.should_pause_on_connect = true; in TEST_P() 351 socket_factory_.AddSSLSocketDataProvider(&ssl3); in TEST_P() 418 SSLSocketDataProvider ssl3(ASYNC, OK); in TEST_P() local 419 ssl3.is_in_session_cache = false; in TEST_P() 422 socket_factory_.AddSSLSocketDataProvider(&ssl3); in TEST_P() [all …]
|
D | ssl_session_cache_openssl_unittest.cc | 300 ScopedSSL ssl3(NewSSL(key)); in TEST_F() local 301 EXPECT_FALSE(cache_.SetSSLSession(ssl3.get())); in TEST_F() 302 EXPECT_NE(session, ssl3.get()->session); in TEST_F() 303 EXPECT_NE(session2, ssl3.get()->session); in TEST_F() 304 EXPECT_EQ(1, ssl3.get()->session->references); in TEST_F()
|
/external/openssl/patches/ |
D | 0002-handshake_cutthrough.patch | 15 ssl/ssl3.h | 1 + 214 diff --git a/ssl/ssl3.h b/ssl/ssl3.h 216 --- a/ssl/ssl3.h 217 +++ b/ssl/ssl3.h
|