Searched refs:client1 (Results 1 - 9 of 9) sorted by relevance
/third_party/node/test/parallel/ |
H A D | test-tls-client-resume.js | 51 const client1 = tls.connect({ 55 tls13 = client1.getProtocol() === 'TLSv1.3'; 56 assert.strictEqual(client1.isSessionReused(), false); 57 sessionx = client1.getSession(); 64 client1.on('data', common.mustCall()); 66 client1.once('session', common.mustCall((session) => { 74 client1.on('session', () => { 75 console.log('client1 session#', ++sessions); 78 client1.on('close', () => { 79 console.log('client1 clos [all...] |
H A D | test-https-client-resume.js | 47 const client1 = tls.connect({ 52 assert.strictEqual(client1.isSessionReused(), false); 53 client1.write('GET / HTTP/1.0\r\n' + 59 client1.once('session', common.mustCall((session) => { 84 client1.resume();
|
H A D | test-https-server-close-all.js | 38 const client1 = connect({ port, rejectUnauthorized: false }); 40 client1.on('connect', common.mustCall(() => { 66 client1.on('close', common.mustCall()); 68 client1.on('error', () => {}); 70 client1.write('GET / HTTP/1.1');
|
H A D | test-https-server-close-idle.js | 40 const client1 = connect({ port, rejectUnauthorized: false }); 42 client1.on('connect', common.mustCall(() => { 75 client1.on('close', common.mustCall(() => { 79 client1.on('error', () => {}); 81 client1.write('GET / HTTP/1.1');
|
H A D | test-tls-connect-simple.js | 50 const client1 = tls.connect(client1options, common.mustCall(function() { 51 client1.end();
|
H A D | test-tls-add-context.js | 52 const client1 = tls.connect({ 57 client1.end();
|
/third_party/node/test/pummel/ |
H A D | test-tls-server-large-request.js | 63 const client1 = tls.connect({ 67 client1.end(request);
|
/third_party/libuv/src/win/ |
H A D | tcp.c | 1563 SOCKET client1 = INVALID_SOCKET; in uv_socketpair() local 1603 client1 = WSASocketW(AF_INET, type, protocol, NULL, 0, client1_flags); in uv_socketpair() 1604 if (client1 == INVALID_SOCKET) in uv_socketpair() 1606 if (!SetHandleInformation((HANDLE) client1, HANDLE_FLAG_INHERIT, 0)) in uv_socketpair() 1614 client1, in uv_socketpair() 1626 while (!WSAGetOverlappedResult(client1, &overlap, &bytes, FALSE, &flags)) { in uv_socketpair() 1637 if (setsockopt(client1, SOL_SOCKET, SO_UPDATE_ACCEPT_CONTEXT, in uv_socketpair() 1645 fds[1] = client1; in uv_socketpair() 1662 if (client1 != INVALID_SOCKET) in uv_socketpair() 1663 closesocket(client1); in uv_socketpair() [all...] |
/third_party/node/deps/uv/src/win/ |
H A D | tcp.c | 1595 SOCKET client1 = INVALID_SOCKET; in uv_socketpair() local 1635 client1 = WSASocketW(AF_INET, type, protocol, NULL, 0, client1_flags); in uv_socketpair() 1636 if (client1 == INVALID_SOCKET) in uv_socketpair() 1638 if (!SetHandleInformation((HANDLE) client1, HANDLE_FLAG_INHERIT, 0)) in uv_socketpair() 1646 client1, in uv_socketpair() 1658 while (!WSAGetOverlappedResult(client1, &overlap, &bytes, FALSE, &flags)) { in uv_socketpair() 1669 if (setsockopt(client1, SOL_SOCKET, SO_UPDATE_ACCEPT_CONTEXT, in uv_socketpair() 1677 fds[1] = client1; in uv_socketpair() 1694 if (client1 != INVALID_SOCKET) in uv_socketpair() 1695 closesocket(client1); in uv_socketpair() [all...] |
Completed in 7 milliseconds