/external/cronet/net/url_request/ |
D | url_request_quic_unittest.cc | 250 explicit CheckLoadTimingDelegate(bool session_reused) in CheckLoadTimingDelegate() argument 251 : session_reused_(session_reused) {} in CheckLoadTimingDelegate() 265 bool session_reused) { in assertLoadTimingValid() argument 266 EXPECT_EQ(session_reused, load_timing_info.socket_reused); in assertLoadTimingValid() 270 EXPECT_EQ(session_reused, in assertLoadTimingValid() 272 EXPECT_EQ(session_reused, in assertLoadTimingValid() 274 EXPECT_EQ(session_reused, in assertLoadTimingValid() 276 EXPECT_EQ(session_reused, in assertLoadTimingValid() 282 EXPECT_EQ(session_reused, in assertLoadTimingValid() 284 EXPECT_EQ(session_reused, in assertLoadTimingValid()
|
/external/grpc-grpc/test/core/tsi/ |
D | ssl_transport_security_test.cc | 93 bool session_reused; member 207 const tsi_peer_property* session_reused = in check_session_reusage() local 209 GPR_ASSERT(session_reused != nullptr); in check_session_reusage() 210 if (ssl_fixture->session_reused) { in check_session_reusage() 211 GPR_ASSERT(strncmp(session_reused->value.data, "true", in check_session_reusage() 212 session_reused->value.length) == 0); in check_session_reusage() 214 GPR_ASSERT(strncmp(session_reused->value.data, "false", in check_session_reusage() 215 session_reused->value.length) == 0); in check_session_reusage() 454 ssl_fixture->session_reused = false; in ssl_tsi_test_fixture_create() 636 &session_cache](bool session_reused) { in ssl_tsi_test_do_handshake_session_cache() argument [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | handoff.cc | 339 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 355 !CBB_add_asn1_bool(&seq, s3->session_reused) || in SSL_serialize_handback() 453 int session_reused, channel_id_negotiated, cert_request, in SSL_apply_handback() local 482 !CBS_get_asn1_bool(&seq, &session_reused) || in SSL_apply_handback() 489 if (!session_reused || type == handback_tls13) { in SSL_apply_handback() 597 if (!session_reused) { in SSL_apply_handback() 603 if (session_reused) { in SSL_apply_handback() 617 s3->session_reused = session_reused; in SSL_apply_handback()
|
D | s3_lib.cc | 173 session_reused(false), in SSL3_STATE()
|
D | tls13_server.cc | 395 ssl->s3->session_reused = true; in do_select_session() 515 hs, ssl->s3->session_reused in do_select_session() 698 if (ssl->s3->session_reused) { in do_read_second_client_hello() 827 if (!ssl->s3->session_reused) { in do_send_server_hello() 871 if (!ssl->s3->session_reused) { in do_send_server_hello() 1096 if (!ssl->s3->session_reused) { in do_read_client_certificate()
|
D | tls13_client.cc | 458 ssl->s3->session_reused = true; in do_read_server_hello() 483 hs, ssl->s3->session_reused in do_read_server_hello() 560 assert(ssl->s3->session_reused); in do_read_encrypted_extensions() 620 if (ssl->s3->session_reused) { in do_read_certificate_request()
|
D | extensions.cc | 613 if (hs->ssl->s3->session_reused || in ext_sni_add_serverhello() 1179 ssl->s3->session_reused || in ext_ocsp_add_serverhello() 1365 if (!ssl->s3->session_reused) { in ext_sct_parse_serverhello() 1394 if (ssl_protocol_version(ssl) >= TLS1_3_VERSION || ssl->s3->session_reused || in ext_sct_add_serverhello() 2095 if (!hs->ssl->s3->session_reused) { in ssl_ext_pre_shared_key_add_serverhello() 2198 ssl->s3->early_data_reason = ssl->s3->session_reused in ext_early_data_parse_serverhello() 2219 if (!ssl->s3->session_reused) { in ext_early_data_parse_serverhello()
|
D | handshake_client.cc | 446 ssl->s3->session_reused = false; in do_start_connect() 820 ssl->s3->session_reused = true; in do_read_server_hello()
|
/external/cronet/third_party/boringssl/src/ssl/ |
D | handoff.cc | 347 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 365 !CBB_add_asn1_bool(&seq, s3->session_reused) || in SSL_serialize_handback() 468 int session_reused, channel_id_negotiated, cert_request, in SSL_apply_handback() local 497 !CBS_get_asn1_bool(&seq, &session_reused) || in SSL_apply_handback() 507 if (!session_reused || type == handback_tls13) { in SSL_apply_handback() 615 if (!session_reused) { in SSL_apply_handback() 621 if (session_reused) { in SSL_apply_handback() 635 s3->session_reused = session_reused; in SSL_apply_handback()
|
D | s3_lib.cc | 173 session_reused(false), in SSL3_STATE()
|
D | tls13_server.cc | 397 ssl->s3->session_reused = true; in do_select_session() 517 hs, ssl->s3->session_reused in do_select_session() 688 if (ssl->s3->session_reused) { in do_read_second_client_hello() 818 if (!ssl->s3->session_reused) { in do_send_server_hello() 862 if (!ssl->s3->session_reused) { in do_send_server_hello() 1087 if (!ssl->s3->session_reused) { in do_read_client_certificate()
|
D | tls13_client.cc | 462 ssl->s3->session_reused = true; in do_read_server_hello() 487 hs, ssl->s3->session_reused in do_read_server_hello() 564 assert(ssl->s3->session_reused); in do_read_encrypted_extensions() 624 if (ssl->s3->session_reused) { in do_read_certificate_request()
|
D | extensions.cc | 618 if (hs->ssl->s3->session_reused || in ext_sni_add_serverhello() 1184 ssl->s3->session_reused || in ext_ocsp_add_serverhello() 1372 if (!ssl->s3->session_reused) { in ext_sct_parse_serverhello() 1401 if (ssl_protocol_version(ssl) >= TLS1_3_VERSION || ssl->s3->session_reused || in ext_sct_add_serverhello() 2105 if (!hs->ssl->s3->session_reused) { in ssl_ext_pre_shared_key_add_serverhello() 2205 ssl->s3->early_data_reason = ssl->s3->session_reused in ext_early_data_parse_serverhello() 2226 if (!ssl->s3->session_reused) { in ext_early_data_parse_serverhello()
|
D | handshake_client.cc | 457 ssl->s3->session_reused = false; in do_start_connect() 832 ssl->s3->session_reused = true; in do_read_server_hello()
|
/external/boringssl/src/ssl/ |
D | handoff.cc | 347 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 365 !CBB_add_asn1_bool(&seq, s3->session_reused) || in SSL_serialize_handback() 468 int session_reused, channel_id_negotiated, cert_request, in SSL_apply_handback() local 497 !CBS_get_asn1_bool(&seq, &session_reused) || in SSL_apply_handback() 507 if (!session_reused || type == handback_tls13) { in SSL_apply_handback() 615 if (!session_reused) { in SSL_apply_handback() 621 if (session_reused) { in SSL_apply_handback() 635 s3->session_reused = session_reused; in SSL_apply_handback()
|
D | s3_lib.cc | 173 session_reused(false), in SSL3_STATE()
|
D | tls13_server.cc | 397 ssl->s3->session_reused = true; in do_select_session() 517 hs, ssl->s3->session_reused in do_select_session() 688 if (ssl->s3->session_reused) { in do_read_second_client_hello() 818 if (!ssl->s3->session_reused) { in do_send_server_hello() 862 if (!ssl->s3->session_reused) { in do_send_server_hello() 1087 if (!ssl->s3->session_reused) { in do_read_client_certificate()
|
D | tls13_client.cc | 462 ssl->s3->session_reused = true; in do_read_server_hello() 487 hs, ssl->s3->session_reused in do_read_server_hello() 564 assert(ssl->s3->session_reused); in do_read_encrypted_extensions() 624 if (ssl->s3->session_reused) { in do_read_certificate_request()
|
D | extensions.cc | 618 if (hs->ssl->s3->session_reused || in ext_sni_add_serverhello() 1184 ssl->s3->session_reused || in ext_ocsp_add_serverhello() 1372 if (!ssl->s3->session_reused) { in ext_sct_parse_serverhello() 1401 if (ssl_protocol_version(ssl) >= TLS1_3_VERSION || ssl->s3->session_reused || in ext_sct_add_serverhello() 2105 if (!hs->ssl->s3->session_reused) { in ssl_ext_pre_shared_key_add_serverhello() 2205 ssl->s3->early_data_reason = ssl->s3->session_reused in ext_early_data_parse_serverhello() 2226 if (!ssl->s3->session_reused) { in ext_early_data_parse_serverhello()
|
D | handshake_client.cc | 461 ssl->s3->session_reused = false; in do_start_connect() 836 ssl->s3->session_reused = true; in do_read_server_hello()
|
/external/python/cpython3/Lib/ |
D | ssl.py | 892 def session_reused(self): member in SSLObject 894 return self._sslobj.session_reused 1100 def session_reused(self): member in SSLSocket 1102 return self._sslobj.session_reused
|
/external/cronet/net/quic/ |
D | quic_http_stream_test.cc | 617 bool session_reused) { in ExpectLoadTimingValid() argument 618 EXPECT_EQ(session_reused, load_timing_info.socket_reused); in ExpectLoadTimingValid() 619 if (session_reused) { in ExpectLoadTimingValid()
|
D | bidirectional_stream_quic_impl_unittest.cc | 739 bool session_reused) { in ExpectLoadTimingValid() argument 740 EXPECT_EQ(session_reused, load_timing_info.socket_reused); in ExpectLoadTimingValid() 742 if (session_reused) { in ExpectLoadTimingValid()
|
/external/grpc-grpc/src/core/tsi/ |
D | ssl_transport_security.cc | 1053 const char* session_reused = SSL_session_reused(impl->ssl) ? "true" : "false"; in ssl_handshaker_result_extract_peer() local 1055 TSI_SSL_SESSION_REUSED_PEER_PROPERTY, session_reused, in ssl_handshaker_result_extract_peer()
|
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/ |
D | ssl_transport_security.cc | 1296 const char* session_reused = SSL_session_reused(impl->ssl) ? "true" : "false"; in ssl_handshaker_result_extract_peer() local 1298 TSI_SSL_SESSION_REUSED_PEER_PROPERTY, session_reused, in ssl_handshaker_result_extract_peer()
|