Home | History | Annotate | Download | only in http

Lines Matching refs:ssl

1503 // that requires a restart when setting up an SSL tunnel.
1554 SSLSocketDataProvider ssl(true, OK);
1555 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
1613 // proxy connection, when setting up an SSL tunnel.
1864 SSLSocketDataProvider ssl(true, OK);
1865 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
1916 SSLSocketDataProvider ssl(true, OK);
1917 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
1974 SSLSocketDataProvider ssl(true, OK);
1975 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
1976 ssl.next_proto = "spdy/2";
1977 ssl.was_npn_negotiated = true;
1978 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
2060 SSLSocketDataProvider ssl(true, OK);
2061 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
2062 ssl.next_proto = "spdy/2";
2063 ssl.was_npn_negotiated = true;
2064 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
2158 SSLSocketDataProvider ssl(true, OK);
2159 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
2160 ssl.next_proto = "spdy/2";
2161 ssl.was_npn_negotiated = true;
2162 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
2230 SSLSocketDataProvider ssl(true, OK);
2231 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
2232 ssl.next_proto = "spdy/2";
2233 ssl.was_npn_negotiated = true;
2234 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
2296 SSLSocketDataProvider ssl(true, OK);
2297 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
2298 ssl.next_proto = "spdy/2";
2299 ssl.was_npn_negotiated = true;
2300 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
2366 SSLSocketDataProvider ssl(true, OK);
2367 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
3260 // Make sure that we recycle a SSL socket after reading all of the response
3282 SSLSocketDataProvider ssl(true, OK);
3283 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
3319 // Grab a SSL socket, use it, and put it back into the pool. Then, reuse it
3345 SSLSocketDataProvider ssl(true, OK);
3347 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
4357 SSLSocketDataProvider ssl(true, OK);
4362 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
4428 SSLSocketDataProvider ssl(true, OK);
4433 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
4491 SSLSocketDataProvider proxy_ssl(true, OK); // SSL to the proxy
4492 SSLSocketDataProvider tunnel_ssl(true, OK); // SSL through the tunnel
4543 SSLSocketDataProvider proxy_ssl(true, OK); // SSL to the proxy
4601 SSLSocketDataProvider proxy_ssl(true, OK); // SSL to the proxy
4654 SSLSocketDataProvider proxy_ssl(true, OK); // SSL to the proxy
4720 SSLSocketDataProvider proxy_ssl(true, OK); // SSL to the proxy
4796 SSLSocketDataProvider ssl(true, OK);
4798 // SSL to the proxy, then CONNECT request, then SSL with bad certificate
4799 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
4803 // SSL to the proxy, then CONNECT request, then valid SSL certificate
4804 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
4806 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
5302 SSLSocketDataProvider ssl(true, OK);
5303 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
5437 SSLSocketDataProvider ssl(true, OK);
5438 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
5463 bool ssl;
5510 // SSL Tests
5514 "ssl/www.google.com:443",
5520 "ssl/[2001:1418:13:1::25]:443",
5526 "ssl/host.with.alternate:443",
5549 if (tests[i].ssl)
5569 // SSL Tests
5573 "ssl/www.google.com:443",
5580 "ssl/host.with.alternate:443",
5605 if (tests[i].ssl)
5631 // SSL Tests
5635 "socks4/ssl/www.google.com:443",
5641 "socks5/ssl/www.google.com:443",
5648 "socks4/ssl/host.with.alternate:443",
5675 if (tests[i].ssl)
6027 SSLSocketDataProvider ssl(true, OK);
6030 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
6566 SSLSocketDataProvider ssl(true, OK);
6567 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
6568 ssl.next_proto = "spdy/2";
6569 ssl.was_npn_negotiated = true;
6570 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
6667 SSLSocketDataProvider ssl(true, OK);
6668 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
6669 ssl.next_proto = "spdy/2";
6670 ssl.was_npn_negotiated = true;
6671 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
6775 SSLSocketDataProvider ssl(true, OK);
6776 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
6777 ssl.next_proto = "spdy/2";
6778 ssl.was_npn_negotiated = true;
6779 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
6898 SSLSocketDataProvider ssl(true, OK);
6899 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
6900 ssl.next_proto = "spdy/2";
6901 ssl.was_npn_negotiated = true;
6902 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
7004 SSLSocketDataProvider ssl(true, OK);
7005 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
7006 ssl.next_proto = "spdy/2";
7007 ssl.was_npn_negotiated = true;
7008 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
7009 // Make sure we use ssl for spdy here.
7475 // Add an SSL sequence if necessary.
7830 SSLSocketDataProvider ssl(true, OK);
7831 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
7832 ssl.next_proto = "http/1.1";
7834 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
7867 // Simulate the SSL handshake completing with an NPN negotiation
7879 SSLSocketDataProvider ssl(true, OK);
7880 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
7881 ssl.next_proto = "spdy/2";
7882 ssl.was_npn_negotiated = true;
7883 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
7961 // simply returned another 407 so the unit test could skip the SSL connection
8011 SSLSocketDataProvider ssl(true, OK);
8012 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
8013 ssl.next_proto = "spdy/2";
8014 ssl.was_npn_negotiated = true;
8024 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
8183 SSLSocketDataProvider ssl(true, OK);
8184 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
8247 SSLSocketDataProvider ssl(true, OK);
8248 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
8293 SSLSocketDataProvider ssl(true, OK);
8294 ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
8295 ssl.next_proto = "spdy/2";
8296 ssl.was_npn_negotiated = true;
8297 session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
8375 // Ensure that a client certificate is removed from the SSL client auth
8392 // [ssl_]data1 contains the data for the first SSL handshake. When a
8402 // [ssl_]data2 contains the data for the second SSL handshake. When TLS
8403 // False Start is not being used, the result of the SSL handshake will be
8415 // [ssl_]data3 contains the data for the third SSL handshake. When a
8416 // connection to a server fails during an SSL handshake,
8432 // Begin the SSL handshake with the peer. This consumes ssl_data1.
8437 // Complete the SSL handshake, which should abort due to requiring a
8468 // Ensure that a client certificate is removed from the SSL client auth
8499 // [ssl_]data1 represents the initial SSL handshake with the peer.
8525 // the data for the SSL handshake once the TLSv1 connection falls back to
8537 // Begin the initial SSL handshake.
8542 // Complete the SSL handshake, which should abort due to requiring a
8574 // Ensure that a client certificate is removed from the SSL client auth
8631 // Begin the SSL handshake with the proxy.
8636 // Complete the SSL handshake, which should abort due to requiring a