Searched refs:sendBuf (Results 1 - 5 of 5) sorted by relevance
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | dtlscon.c | 474 * Empty the sendBuf buffer. 476 * Always set sendBuf.len to 0, even when returning SECFailure. 492 if (!ss->sec.ci.sendBuf.buf || !ss->sec.ci.sendBuf.len) 496 ss->sec.ci.sendBuf.buf, ss->sec.ci.sendBuf.len); 499 ss->sec.ci.sendBuf.len = 0; 503 /* Enqueue the handshake message in sendBuf (if any) and then
|
H A D | sslcon.c | 469 if (len > ss->sec.ci.sendBuf.space) { 470 rv = sslBuffer_Grow(&ss->sec.ci.sendBuf, len); 573 msg = ss->sec.ci.sendBuf.buf; 616 msg = ss->sec.ci.sendBuf.buf; 671 msg = ss->sec.ci.sendBuf.buf; 720 msg = ss->sec.ci.sendBuf.buf; 756 msg = ss->sec.ci.sendBuf.buf; 3137 cp = msg = ss->sec.ci.sendBuf.buf; 3554 msg = ss->sec.ci.sendBuf.buf;
|
H A D | sslsecur.c | 1042 PORT_ZFree(sec->ci.sendBuf.buf, sec->ci.sendBuf.space);
|
H A D | ssl3con.c | 3181 * Always set sendBuf.len to 0, even when returning SECFailure. 3203 /* Attempt to send the content of sendBuf buffer in an SSL handshake record. 3205 * Always set sendBuf.len to 0, even when returning SECFailure. 3219 if (!ss->sec.ci.sendBuf.buf || !ss->sec.ci.sendBuf.len) 3228 rv = ssl3_SendRecord(ss, 0, content_handshake, ss->sec.ci.sendBuf.buf, 3229 ss->sec.ci.sendBuf.len, flags); 3237 } else if (rv < ss->sec.ci.sendBuf.len) { 3239 PORT_Assert(rv >= ss->sec.ci.sendBuf.len); 3247 ss->sec.ci.sendBuf [all...] |
H A D | sslimpl.h | 1098 * sendBuf in the ConnectInfo maintained by sslcon.c is used 1110 sslBuffer sendBuf; /*xmitBufLock*/ /* ssl 2 & 3 */ member in struct:sslConnectInfoStr
|
Completed in 144 milliseconds