HomeSort by relevance Sort by last modified time
    Searched refs:sid (Results 26 - 50 of 60) sorted by null

12 3

  /external/chromium/net/third_party/nss/ssl/
sslsnce.c 398 ** Convert local SID to shared memory one
532 /* the portions of the SID that are only restored on the client
644 SSL_TRC(7, ("%d: timed out sid entry addr=%08x%08x%08x%08x now=%x "
672 /* This is the primary function for finding entries in the server's sid cache.
682 sslSessionID * sid = 0; local
712 /* The cert doesen't match the SID cache entry,
713 ** so invalidate the SID cache entry.
722 ** Don't invalidate the SID cache entry, but don't find it.
739 sid = ConvertToSID(&sce, pcce ? &cce : 0, dbHandle);
741 return sid;
    [all...]
ssl3ext.c 371 sslSessionID *sid = ss->sec.ci.sid; local
372 session_ticket = &sid->u.ssl3.sessionTicket;
588 cert_length = (ss->opt.requestCertificate && ss->sec.ci.sid->peerCert) ?
589 3 + ss->sec.ci.sid->peerCert->derCert.len : 0;
613 sslSessionID sid; local
614 PORT_Memset(&sid, 0, sizeof(sslSessionID));
622 rv = ssl3_CacheWrappedMasterSecret(ss, &sid, ss->ssl3.pwSpec,
625 if (sid.u.ssl3.keys.wrapped_master_secret_len > sizeof(wrapped_ms))
627 memcpy(wrapped_ms, sid.u.ssl3.keys.wrapped_master_secret
863 sslSessionID *sid = NULL; local
    [all...]
sslcon.c 628 sslSessionID * sid; local
639 PORT_Assert(ss->sec.ci.sid != 0);
640 sid = ss->sec.ci.sid;
645 sendLen = 1 + sizeof(sid->u.ssl2.sessionID);
653 PORT_Memcpy(msg+1, sid->u.ssl2.sessionID,
654 sizeof(sid->u.ssl2.sessionID));
661 (*ss->sec.uncache)(sid);
664 /* Put the sid in session-id cache, (may already be there) */
665 (*ss->sec.cache)(sid);
1583 sslSessionID * sid; local
2046 sslSessionID * sid; local
2198 sslSessionID *sid = ss->sec.ci.sid; local
2773 sslSessionID * sid; local
3002 sslSessionID *sid; local
3447 sslSessionID *sid; local
    [all...]
ssl3con.c 3711 sslSessionID * sid; local
4001 sslSessionID *sid = ss->sec.ci.sid; local
4750 sslSessionID * sid = ss->sec.ci.sid; local
4797 sslSessionID *sid = ss->sec.ci.sid; local
5692 sslSessionID *sid; local
5812 sslSessionID * sid = NULL; local
6341 sslSessionID * sid = NULL; local
6505 sslSessionID *sid; local
7990 sslSessionID * sid = ss->sec.ci.sid; local
9040 sslSessionID * sid = ss->sec.ci.sid; local
    [all...]
sslinfo.c 62 sslSessionID * sid; local
80 sid = ss->sec.ci.sid;
100 if (sid) {
101 inf.creationTime = sid->creationTime;
102 inf.lastAccessTime = sid->lastAccessTime;
103 inf.expirationTime = sid->expirationTime;
106 memcpy(inf.sessionID, sid->u.ssl2.sessionID,
109 unsigned int sidLen = sid->u.ssl3.sessionIDLength;
112 memcpy(inf.sessionID, sid->u.ssl3.sessionID, sidLen)
    [all...]
sslauth.c 78 if (ss->sec.ci.sid && ss->sec.ci.sid->localCert) {
79 return CERT_DupCertificate(ss->sec.ci.sid->localCert);
sslsecur.c 276 ** For SSLv3, flushes SID cache entry (if requested),
938 if (sec->ci.sid != NULL) {
939 ssl_FreeSID(sec->ci.sid);
1338 sslSessionID * sid = ss->sec.ci.sid; local
    [all...]
sslimpl.h 222 typedef void (*sslSessionIDCacheFunc) (sslSessionID *sid);
223 typedef void (*sslSessionIDUncacheFunc)(sslSessionID *sid);
225 unsigned char* sid,
609 /* values that are copied into the server's on-disk SID cache. */
903 sslSessionID *sid; /* ssl 2 & 3 */ member in struct:sslConnectInfoStr
    [all...]
  /external/chromium/third_party/icu/source/tools/genrb/
wrtxml.cpp 537 char *sid = NULL; local
543 sid = getID(id, resname, sid);
545 sid = getID(id, NULL, sid);
550 printAttribute("id", sid, (int32_t) uprv_strlen(sid));
572 return sid;
605 char *sid = NULL; local
613 sid = printContainer(res, trans_unit, NULL, NULL, id, status)
641 char *sid = NULL; local
672 char* sid = NULL; local
711 char* sid = NULL; local
760 char* sid = NULL; local
789 char* sid = NULL; local
913 char* sid = NULL; local
    [all...]
  /external/icu4c/tools/genrb/
wrtxml.cpp 538 char *sid = NULL; local
544 sid = getID(id, resname, sid);
546 sid = getID(id, NULL, sid);
551 printAttribute("id", sid, (int32_t) uprv_strlen(sid));
573 return sid;
606 char *sid = NULL; local
614 sid = printContainer(res, trans_unit, NULL, NULL, id, status)
642 char *sid = NULL; local
673 char* sid = NULL; local
712 char* sid = NULL; local
761 char* sid = NULL; local
790 char* sid = NULL; local
914 char* sid = NULL; local
    [all...]
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
if_pppox.h 38 sid_t sid; /* Session identifier */ member in struct:pppoe_addr
114 __be16 sid; member in struct:pppoe_hdr
  /external/freetype/src/cff/
cffload.h 39 FT_UInt sid );
cffdrivr.c 233 FT_UShort sid; local
247 /* first, locate the sid in the charset table */
248 sid = font->charset.sids[glyph_index];
251 gname = cff_index_get_sid_string( font, sid );
271 FT_UShort sid; local
284 sid = charset->sids[i];
286 if ( sid > 390 )
287 name = cff_index_get_string( cff, sid - 391 );
289 name = (FT_String *)psnames->adobe_std_strings( sid );
cffcmap.c 128 FT_UInt sid = charset->sids[idx]; local
131 return cff_index_get_sid_string( cff, sid );
cffload.c 611 FT_UInt sid )
614 if ( sid == 0xFFFFU )
618 if ( sid > 390 )
619 return cff_index_get_string( font, sid - 391 );
626 return (FT_String *)font->psnames->adobe_std_strings( sid );
885 FT_UShort sid = FT_GET_USHORT(); local
889 if ( sid < 65000L )
890 charset->sids[j] = sid;
894 " invalid SID value %d set to zero\n", sid ));
1270 FT_UInt sid = encoding->sids[j]; local
    [all...]
  /frameworks/base/include/surfaceflinger/
ISurfaceComposerClient.h 78 virtual status_t destroySurface(SurfaceID sid) = 0;
SurfaceComposerClient.h 153 status_t destroySurface(SurfaceID sid);
  /external/bluetooth/hcidump/parser/
avdtp.c 425 uint8_t hdr, sid, nsp, type; local
435 sid = hdr & 0x08 ? 0x00 : get_u8(frm);
438 hdr & 0x08 ? pt2str(hdr) : si2str(sid), mt2str(hdr), hdr >> 4);
440 switch (sid & 0x7f) {
  /external/freetype/src/psnames/
psmodule.c 514 ps_get_standard_strings( FT_UInt sid )
516 if ( sid >= FT_NUM_SID_NAMES )
519 return ft_standard_glyph_names + ft_sid_names[sid];
  /external/chromium/base/
win_util.cc 109 BYTE sid[SECURITY_MAX_SID_SIZE] = {0};
114 // a known sid.
133 memcpy(sid, token_user->User.Sid, size_sid);
135 if (!CreateWellKnownSid(known_sid , NULL, sid, &size_sid)) {
149 new_access.Trustee.ptstrName = reinterpret_cast<LPWSTR>(&sid);
183 if (!user->User.Sid)
188 if (!::ConvertSidToStringSid(user->User.Sid, &sid_string))
219 // Look for the logon sid.
220 SID* logon_sid = NULL
    [all...]
  /external/iptables/extensions/
libip6t_owner.c 23 "[!] --sid-owner sessionid Match local sid\n"
33 "[!] --sid-owner sessionid Match local sid\n"
43 { "sid-owner", 1, 0, '4' },
108 ownerinfo->sid = strtoul(optarg, &end, 0);
110 exit_error(PARAMETER_PROBLEM, "Bad OWNER SID value `%s'", optarg);
178 printf("%u ", info->sid);
211 print_item(info, IP6T_OWNER_SID, numeric, "OWNER SID match ");
226 print_item(info, IP6T_OWNER_SID, 0, "--sid-owner ")
    [all...]
libipt_owner.c 23 "[!] --sid-owner sessionid Match local sid\n"
25 "NOTE: pid, sid and command matching are broken on SMP\n"
34 "[!] --sid-owner sessionid Match local sid\n"
35 "NOTE: pid and sid matching are broken on SMP\n"
45 { "sid-owner", 1, 0, '4' },
109 ownerinfo->sid = strtoul(optarg, &end, 0);
111 exit_error(PARAMETER_PROBLEM, "Bad OWNER SID value `%s'", optarg);
179 printf("%u ", info->sid);
    [all...]
  /external/ppp/pppd/plugins/rp-pppoe/
plugin.c 162 sp.sa_addr.pppoe.sid = conn->session;
238 sp.sa_addr.pppoe.sid = 0;
  /frameworks/base/libs/surfaceflinger_client/
ISurfaceComposerClient.cpp 108 virtual status_t destroySurface(SurfaceID sid)
112 data.writeInt32(sid);
  /external/bluetooth/glib/gobject/
gobject.c 1815 gulong sid; local
1899 guint sid = 0, detail = 0, mask = 0; local
    [all...]

Completed in 672 milliseconds

12 3