Searched refs:hit (Results 1 – 14 of 14) sorted by relevance
520 if (s->hit) in ossl_statem_server13_write_transition()663 if (s->hit) { in ossl_statem_server_write_transition()715 if (s->hit) { in ossl_statem_server_write_transition()734 if (s->hit) { in ossl_statem_server_write_transition()1779 s->hit = 0; in tls_early_post_process_client_hello()1875 s->hit = 1; in tls_early_post_process_client_hello()1972 if (!s->hit in tls_early_post_process_client_hello()1991 s->hit = 1; in tls_early_post_process_client_hello()2117 if (!s->hit) { in tls_early_post_process_client_hello()2486 s->hit = 0; in tls_construct_server_hello()[all …]
139 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_server_name()251 if (!s->hit) { in tls_parse_ctos_ec_pt_formats()291 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 1)) { in tls_parse_ctos_sig_algs_cert()310 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 0)) { in tls_parse_ctos_sig_algs()326 if (s->hit) in tls_parse_ctos_status_request()615 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) in tls_parse_ctos_key_share()947 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_supported_groups()1321 if (s->hit && !SSL_CONNECTION_IS_TLS13(s)) in tls_construct_stoc_server_name()1667 if (!s->hit || !tls13_generate_handshake_secret(s, NULL, 0)) { in tls_construct_stoc_key_share()1674 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) { in tls_construct_stoc_key_share()[all …]
586 || (s->hit && (extctx & SSL_EXT_IGNORE_ON_RESUMPTION) != 0)) in extension_is_relevant()1019 if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) { in final_server_name()1049 if (!s->hit) { in final_server_name()1266 if (!s->server && s->hit) { in final_ems()1343 if (!sent && SSL_CONNECTION_IS_TLS13(s) && !s->hit) { in final_sig_algs()1391 if (!s->hit) { in final_key_share()1450 && (!s->hit in final_key_share()1485 if (!s->hit in final_key_share()1738 || !s->hit in final_early_data()
130 if (s->hit) { in ossl_statem_client13_read_transition()276 if (s->hit) { in ossl_statem_client_read_transition()301 s->hit = 1; in ossl_statem_client_read_transition()675 if (s->hit) { in ossl_statem_client_write_transition()683 if (s->hit) { in ossl_statem_client_write_transition()752 if (s->hit) { in ossl_statem_client_pre_work()876 if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { in ossl_statem_client_post_work()1585 s->hit = 0; in tls_process_server_hello()1646 s->hit = 1; in tls_process_server_hello()1649 if (s->hit) { in tls_process_server_hello()[all …]
1366 if (!s->hit) { in tls_parse_stoc_server_name()1392 if (!s->hit) { in tls_parse_stoc_ec_pt_formats()1694 if (!s->hit) { in tls_parse_stoc_alpn()1788 if (!s->hit) in tls_parse_stoc_ems()1898 if (!s->hit) { in tls_parse_stoc_key_share()2025 || !s->hit) { in tls_parse_stoc_early_data()2063 s->hit = 1; in tls_parse_stoc_psk()2089 s->hit = 1; in tls_parse_stoc_psk()
237 s->hit = 0; in tls_setup_handshake()1489 if (s->hit) in tls_finish_handshake()
49 successfully reused is counted as a hit. In server mode a session successfully50 retrieved from internal or external cache is counted as a hit.
157 possible to handle cases where the criteria have more than one hit.
17 You can just hit carriage returns to accept the default values, except for "Common Name"; you
40 # NB: this test requires more than 1GB of memory to run so it will hit the
599 sc->hit = 0; in ossl_ssl_connection_reset()3474 if (sc->hit && !SSL_CONNECTION_IS_TLS13(sc)) in SSL_get_servername()3505 if (!SSL_CONNECTION_IS_TLS13(sc) && sc->hit in SSL_get_servername()4652 && (!s->hit || SSL_CONNECTION_IS_TLS13(s))) { in ssl_update_cache()5122 retsc->hit = sc->hit; in SSL_dup()6017 return sc->hit; in SSL_session_reused()
1444 int hit; /* reusing a previous session */ member
4910 if (!s->hit) in ssl_gensecret()
3507 functions then this issue could be hit. This might result in a crash3692 * Properly detect EOF while reading in libssl. Previously if we hit an EOF
Completed in 161 milliseconds