Searched refs:savedSessionInfo (Results 1 – 4 of 4) sorted by relevance
206 public static D2DConnectionContext fromSavedSession(byte[] savedSessionInfo) { in fromSavedSession() argument207 if (savedSessionInfo == null || savedSessionInfo.length == 0) { in fromSavedSession()211 int protocolVersion = savedSessionInfo[0] & 0xff; in fromSavedSession()217 if (savedSessionInfo.length != 37) { in fromSavedSession()218 throw new IllegalArgumentException("Incorrect data length (" + savedSessionInfo.length in fromSavedSession()221 int sequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 1, 5)); in fromSavedSession()222 SecretKey sharedKey = new SecretKeySpec(Arrays.copyOfRange(savedSessionInfo, 5, 37), "AES"); in fromSavedSession()228 if (savedSessionInfo.length != 73) { in fromSavedSession()231 int encodeSequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 1, 5)); in fromSavedSession()232 int decodeSequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 5, 9)); in fromSavedSession()[all …]
35 explicit D2DConnectionContextV1Peer(const std::string& savedSessionInfo) { in D2DConnectionContextV1Peer() argument36 context_ = D2DConnectionContextV1::FromSavedSession(savedSessionInfo); in D2DConnectionContextV1Peer()
205 D2DConnectionContextV1::FromSavedSession(const std::string& savedSessionInfo) { in FromSavedSession() argument206 ByteBuffer byteBuffer = ByteBuffer(savedSessionInfo); in FromSavedSession()
68 const string& savedSessionInfo);