/external/chromium_org/cloud_print/gcp20/prototype/ |
print_job_handler.cc | 32 bool ValidateTicket(const std::string& ticket) { 43 LocalPrintJobExtended(const LocalPrintJob& job, const std::string& ticket) 45 ticket(ticket), 51 std::string ticket; member in struct:PrintJobHandler::LocalPrintJobExtended 58 LocalPrintJobDraft(const std::string& ticket, const base::Time& expiration) 59 : ticket(ticket), 63 std::string ticket; member in struct:PrintJobHandler::LocalPrintJobDraft 76 const std::string& ticket, [all...] |
print_job_handler.h | 31 const std::string& ticket, 37 // Creates printer job with empty ticket and "prints" it 58 const std::string& ticket, 65 // Contains ticket info and job info together 68 // Contains job ticket
|
cloud_print_response_parser.h | 35 std::string ticket; member in struct:cloud_print_response_parser::Job
|
privet_http_server.h | 102 const std::string& ticket,
|
printer.h | 75 const std::string& ticket,
|
/external/valgrind/main/coregrind/m_scheduler/ |
ticket-lock-linux.c | 3 /*--- Linux ticket lock implementation ticket-lock-linux.c ---*/ 73 return "ticket lock"; 107 * Acquire ticket lock. Increment the tail of the queue and use the original 108 * value as the ticket value. Wait until the head of the queue equals the 109 * ticket value. The futex used to wait depends on the ticket value in order 110 * to avoid that all threads get woken up every time a ticket lock is 114 * See also Nick Piggin, x86: FIFO ticket spinlocks, Linux kernel mailing list 119 unsigned ticket, futex_value local [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/ |
KerberosTicketTest.java | 42 // ticket's ASN.1 encoding 43 private static final byte[] ticket = { 0x01, 0x02, 0x03, 0x04 }; field in class:KerberosTicketTest 95 KerberosTicket krbTicket = new KerberosTicket(ticket, pClient, pServer, 108 new KerberosTicket(ticket, pClient, pServer, sessionKey, KEY_TYPE, 120 KerberosTicket krbTicket = new KerberosTicket(ticket, pClient, pServer, 128 new KerberosTicket(ticket, null, pServer, sessionKey, KEY_TYPE, 140 KerberosTicket krbTicket = new KerberosTicket(ticket, pClient, pServer, 154 krbTicket = new KerberosTicket(ticket, pClient, pServer, sessionKey, 164 KerberosTicket krbTicket = new KerberosTicket(ticket, pClient, pServer, 168 assertTrue(Arrays.equals(ticket, krbTicket.getEncoded())) [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/internal/kerberos/v5/ |
KDCReplyTest.java | 28 import org.apache.harmony.auth.internal.kerberos.v5.Ticket; 41 // ticket 42 Ticket ticket = reply.getTicket(); local 43 assertEquals("ticket's realm", "MY.REALM", ticket.getRealm()); 44 assertEquals("ticket's sname", new PrincipalName(0, new String[] { 45 "krbtgt", "MY.REALM" }), ticket.getSname()); 108 // ticket [5] Ticket [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/serialization/ |
KerberosTicketTest.java | 35 // ticket's ASN.1 encoding 36 private static final byte[] ticket = { 0x01, 0x02, 0x03, 0x04 }; field in class:KerberosTicketTest 72 assertTrue("Ticket", Arrays.equals(init.getEncoded(), desr 98 SerializationTest.verifySelf(new KerberosTicket(ticket, pClient, 107 SerializationTest.verifyGolden(this, new KerberosTicket(ticket,
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslnonce.c | 126 if (sid->u.ssl3.sessionTicket.ticket.data) { 127 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE); 296 sid->u.ssl3.sessionTicket.ticket.data == NULL) 447 /* A server might have sent us an empty ticket, which has the 448 * effect of clearing the previously known ticket. 450 if (sid->u.ssl3.sessionTicket.ticket.data) 451 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE); 452 if (session_ticket->ticket.len > 0) { 453 rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.sessionTicket.ticket, 454 &session_ticket->ticket); [all...] |
ssl3prot.h | 333 SECItem ticket; member in struct:__anon12202
|
ssl3ext.c | 493 * Clients sends a filled in session ticket if one is available, and otherwise 494 * sends an empty ticket. Servers always send empty tickets. 514 /* If we are a client then send a session ticket if one is availble. 521 if (session_ticket->ticket.data) { 523 extension_length += session_ticket->ticket.len; 528 extension_length += session_ticket->ticket.len; 540 if (session_ticket && session_ticket->ticket.data && 542 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data, 543 session_ticket->ticket.len, 2); 969 NewSessionTicket ticket; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/chromium_org/chrome/browser/local_discovery/ |
privet_http.h | 147 // |ticket| should be in CJT format. 148 virtual void SetTicket(const std::string& ticket) = 0;
|
privet_http_impl.h | 163 virtual void SetTicket(const std::string& ticket) OVERRIDE;
|
privet_http_impl.cc | 663 void PrivetLocalPrintOperationImpl::SetTicket(const std::string& ticket) { 665 ticket_ = ticket;
|
/external/chromium_org/third_party/openssl/openssl/crypto/krb5/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/external/openssl/include/openssl/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 120 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, 136 ticket, len); 138 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) { 144 pac_opaque_len = WPA_GET_BE16(ticket + 2); 145 pac_opaque = ticket + 4; [all...] |