/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
Handshake.java | 22 * This class incapsulates the constants determining the types of handshake 23 * messages as defined in TLS 1.0 spec., 7.4. Handshake protocol. 27 public class Handshake { 31 * hello_request handshake type 37 * client_hello handshake type 43 * server_hello handshake type 49 * certificate handshake type 55 * server_key_exchange handshake type 61 * certificate_request handshake type 67 * server_hello_done handshake typ [all...] |
HandshakeProtocol.java | 38 * Handshake protocol</a> 44 * Handshake status NEED_UNWRAP - HandshakeProtocol needs to receive data 49 * Handshake status NOT_HANDSHAKING - is not currently handshaking 54 * Handshake status FINISHED - HandshakeProtocol has just finished 59 * Handshake status NEED_TASK - HandshakeProtocol needs the results of delegated task 64 * Current handshake status 69 * IO stream for income/outcome handshake data 84 * Delegated tasks for this handshake implementation 89 * Indicates non-blocking handshake 99 * Sended and received handshake message [all...] |
ContentType.java | 39 * Identifies handshake message 41 protected static final byte HANDSHAKE = 22;
|
/external/iptables/extensions/ |
libipt_tcpmss.man | 1 This matches the TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the MSS is only negotiated during the TCP handshake at connection startup time.
|
/external/chromium/net/socket/ |
socks5_client_socket.h | 25 // This ClientSocket is used to setup a SOCKSv5 handshake with a socks proxy. 46 // Does the SOCKS handshake and completes the protocol. 101 // Writes the SOCKS handshake buffer into |handshake| 103 int BuildHandshakeWriteBuffer(std::string* handshake) const; 116 // SOCKS handshake data. The length contains the expected size to 120 // While writing, this buffer stores the complete write handshake data. 121 // While reading, it stores the handshake information received so far. 124 // This becomes true when the SOCKS handshake has completed and the 128 // These contain the bytes sent / received by the SOCKS handshake [all...] |
socks_client_socket.h | 42 // Does the SOCKS handshake and completes the protocol. 107 // SOCKS handshake data. The length contains the expected size to 111 // While writing, this buffer stores the complete write handshake data. 112 // While reading, it stores the handshake information received so far. 115 // This becomes true when the SOCKS handshake has completed and the 119 // These contain the bytes sent / received by the SOCKS handshake.
|
socks5_client_socket.cc | 114 // if the SOCKS handshake is complete. 125 // SOCKS handshake is complete. 298 int SOCKS5ClientSocket::BuildHandshakeWriteBuffer(std::string* handshake) 300 DCHECK(handshake->empty()); 302 handshake->push_back(kSOCKS5Version); 303 handshake->push_back(kTunnelCommand); // Connect command 304 handshake->push_back(kNullByte); // Reserved null 306 handshake->push_back(kEndPointDomain); // The type of the address. 311 handshake->push_back(static_cast<unsigned char>( 313 handshake->append(host_request_info_.hostname()) [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
HandshakeCompletedEvent.java | 27 * handshake on a SSL connection. 57 * Returns the name of the cipher suite negotiated during this handshake. 59 * @return the name of the cipher suite negotiated during this handshake. 66 * Returns the list of local certificates used during the handshake. These 69 * @return Returns the list of certificates used during the handshake with 71 * if no certificates were used during the handshake. 79 * handshake. 117 * Returns the {@code Principal} used to identify during the handshake. 119 * @return the {@code Principal} used to identify during the handshake.
|
SSLEngineResult.java | 27 * The {@code enum} describing the state of the current handshake. 31 * No handshake in progress. 35 * The handshake is finished. 40 * the handshake. 45 * handshake. 50 * handshake. 100 * the status of the current handshake 140 * Returns the status of the current handshake. 142 * @return the status of the current handshake.
|
HandshakeCompletedListener.java | 24 * of SSL handshake on an SSL connection. 28 * The callback method that is invoked when a SSL handshake is completed. 31 * the information on the completed SSL handshake event.
|
HttpsURLConnection.java | 108 * Returns the name of the cipher suite negotiated during the SSL handshake. 110 * @return the name of the cipher suite negotiated during the SSL handshake. 117 * Returns the list of local certificates used during the handshake. These 120 * @return Returns the list of certificates used during the handshake with 122 * if no certificates were used during the handshake. 130 * handshake. 159 * Returns the {@code Principal} used to identify the local host during the handshake. 161 * @return the {@code Principal} used to identify the local host during the handshake, or
|
package.html | 10 All the details of the SSL handshake protocol are accounted for, and a client or a server can specify the cipher
|
/external/webkit/WebKitTools/pywebsocket/test/ |
test_handshake.py | 33 """Tests for handshake module.""" 39 from mod_pywebsocket import handshake namespace 57 'HTTP/1.1 101 Web Socket Protocol Handshake\r\n' 66 'HTTP/1.1 101 Web Socket Protocol Handshake\r\n' 87 'HTTP/1.1 101 Web Socket Protocol Handshake\r\n' 96 'HTTP/1.1 101 Web Socket Protocol Handshake\r\n' 116 'HTTP/1.1 101 Web Socket Protocol Handshake\r\n' 407 handshake._validate_protocol('sample') # should succeed. 408 handshake._validate_protocol('Sample') # should succeed. 409 handshake._validate_protocol('sample\x20protocol') # should succeed [all...] |
/libcore/luni/src/test/java/org/apache/harmony/xnet/provider/jsse/ |
NativeCryptoTest.java | 553 public static Future<TestSSLHandshakeCallbacks> handshake(final ServerSocket listener, method in class:NativeCryptoTest 573 + " handshake" 587 + " handshake" 638 Future<TestSSLHandshakeCallbacks> client = handshake(listener, 0, true, cHooks); 639 Future<TestSSLHandshakeCallbacks> server = handshake(listener, 0, false, sHooks); 680 Future<TestSSLHandshakeCallbacks> client = handshake(listener, 0, true, cHooks); 681 Future<TestSSLHandshakeCallbacks> server = handshake(listener, 0, false, sHooks); 725 Future<TestSSLHandshakeCallbacks> client = handshake(listener, 0, true, cHooks); 726 Future<TestSSLHandshakeCallbacks> server = handshake(listener, 0, false, sHooks); 740 Future<TestSSLHandshakeCallbacks> client = handshake(listener, 1, true, cHooks) [all...] |
/frameworks/base/core/java/android/net/ |
SSLCertificateSocketFactory.java | 57 * <li>Timeout specification for SSL handshake operations 63 * The handshake timeout does not apply to actual TCP socket connection. 118 * Returns a new socket factory instance with an optional handshake timeout. 120 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 121 * for none. The socket timeout is reset to 0 after the handshake. 129 * Returns a new socket factory instance with an optional handshake timeout 132 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 133 * for none. The socket timeout is reset to 0 after the handshake. 143 * disabled, using an optional handshake timeout and SSL session cache. 148 * @param handshakeTimeoutMillis to use for SSL connection handshake, or [all...] |
/external/chromium/net/websockets/ |
websocket.h | 98 // Creates the client handshake message from |this|. 160 // Checks handshake. 161 // Prerequisite: Server handshake message is received in |current_read_buf_|. 162 // Returns number of bytes for server handshake message, 163 // or negative if server handshake message is not received fully yet. 166 // Processes server handshake message, parsed as |headers|, and updates 205 // Handshake messages that server sent.
|
/external/apache-http/src/org/apache/http/ |
HttpEntityEnclosingRequest.java | 46 * Tells if this request should use the expect-continue handshake. 47 * The expect continue handshake gives the server a chance to decide 50 * @return true if the expect continue handshake should be used, false if
|
/external/chromium/net/third_party/nss/ssl/ |
sslsecur.c | 59 * Currently, the list of functions called through ss->handshake is: 76 * The ss->handshake function returns SECWouldBlock under these conditions: 79 * to switch to SSL v3 handshake processing. 121 if (ss->handshake == 0) { 122 /* Previous handshake finished. Switch to next one */ 123 ss->handshake = ss->nextHandshake; 126 if (ss->handshake == 0) { 127 /* Previous handshake finished. Switch to security handshake */ 128 ss->handshake = ss->securityHandshake [all...] |
/external/chromium/net/socket_stream/ |
socket_stream_metrics.h | 6 // TODO(ukai): collect WebSocket specific metrics (e.g. handshake time, etc).
|
/external/webkit/WebKitTools/pywebsocket/mod_pywebsocket/ |
headerparserhandler.py | 41 import handshake namespace 83 handshaker = handshake.Handshaker(request, _dispatcher) 88 except handshake.HandshakeError, e: 89 # Handshake for ws/wss failed.
|
/external/openssl/include/openssl/ |
dtls1.h | 181 * The current data and handshake epoch. This is initially 182 * undefined, and starts at zero once the initial handshake is 194 /* handshake message numbers */ 203 /* Received handshake records (processed and unprocessed) */ 207 /* Buffered handshake messages */ 210 /* Buffered (sent) handshake records */ 230 /* Indicates when the last handshake msg sent will timeout */ 236 /* storage for Alert/Handshake protocol data received but not
|
/external/openssl/ssl/ |
dtls1.h | 181 * The current data and handshake epoch. This is initially 182 * undefined, and starts at zero once the initial handshake is 194 /* handshake message numbers */ 203 /* Received handshake records (processed and unprocessed) */ 207 /* Buffered handshake messages */ 210 /* Buffered (sent) handshake records */ 230 /* Indicates when the last handshake msg sent will timeout */ 236 /* storage for Alert/Handshake protocol data received but not
|
/external/wpa_supplicant/ |
defs.h | 94 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress 96 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 104 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress 106 * This state is entered when 4-Way Key Handshake has been completed 117 * completed. In case of WPA2, this happens when the 4-Way Handshake is 119 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
defs.h | 153 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress 155 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 163 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress 165 * This state is entered when 4-Way Key Handshake has been completed 176 * completed. In case of WPA2, this happens when the 4-Way Handshake is 178 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
|
/frameworks/base/wifi/java/android/net/wifi/ |
SupplicantState.java | 81 * WPA 4-Way Key Handshake in progress. 83 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 91 * WPA Group Key Handshake in progress. 93 * This state is entered when 4-Way Key Handshake has been completed 104 * completed. In case of WPA2, this happens when the 4-Way Handshake is 106 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
|