/openssl/crypto/ |
H A D | ppccpuid.pl | 235 add $tick,$tick,$diff 244 add $tick,$tick,$diff 268 add $tick,$tick,$diff 279 add $tick,$tick,$diff 286 mftb $tick 293 not $tick,$tick # flip bits 319 add $tick,$tick,$diff 328 add $tick,$tick,$diff 352 add $tick,$tick,$diff 363 add $tick,$tick,$diff [all …]
|
H A D | alphacpuid.pl | 184 addl $diff,$tick,$tick 185 mov $tick,$diff 195 addl $diff,$tick,$tick 196 mov $tick,$diff 219 addl $diff,$tick,$tick 220 mov $tick,$diff 224 rpcc $tick 231 addl $diff,$tick,$tick 232 mov $tick,$diff 239 rpcc $tick [all …]
|
H A D | pariscid.pl | 187 mfctl %cr16,$tick 192 ldw 0($out),$tick 193 add $diff,$tick,$tick 194 stw $tick,0($out) 196 mfctl %cr16,$tick 201 ldw 0($out),$tick 202 add $diff,$tick,$tick 228 add $diff,$tick,$tick 238 add $diff,$tick,$tick 248 ldi 1,$tick [all …]
|
H A D | sparccpuid.S | 233 .word 0x91410000 !rd %tick,%o0 277 .word 0x91410000 !rd %tick,%o0 280 .word 0x93410000 !rd %tick,%o1 283 .word 0x95410000 !rd %tick,%o2 286 .word 0x97410000 !rd %tick,%o3 289 .word 0x99410000 !rd %tick,%o4 484 .word 0x99410000 !rd %tick,%o4 ! tick 499 mov %o4,%o5 ! lasttick=tick 524 .word 0x99410000 !rd %tick,%o4 ! tick 537 .word 0x99410000 !rd %tick,%o4 ! tick [all …]
|
/openssl/doc/man3/ |
H A D | SSL_SESSION_has_ticket.pod | 15 void SSL_SESSION_get0_ticket(const SSL_SESSION *s, const unsigned char **tick, 27 session. The length of the ticket is written to B<*len>. If B<tick> is non 28 NULL then a pointer to the ticket is written to B<*tick>. The pointer is only
|
/openssl/ssl/ |
H A D | ssl_asn1.c | 187 if (in->ext.tick) { in i2d_SSL_SESSION() 189 in->ext.tick, in->ext.ticklen); in i2d_SSL_SESSION() 371 OPENSSL_free(ret->ext.tick); in d2i_SSL_SESSION_ex() 373 ret->ext.tick = as->tlsext_tick->data; in d2i_SSL_SESSION_ex() 377 ret->ext.tick = NULL; in d2i_SSL_SESSION_ex()
|
H A D | ssl_sess.c | 158 dest->ext.tick = NULL; in ssl_session_dup_intern() 231 if (ticket != 0 && src->ext.tick != NULL) { in ssl_session_dup_intern() 232 dest->ext.tick = in ssl_session_dup_intern() 233 OPENSSL_memdup(src->ext.tick, src->ext.ticklen); in ssl_session_dup_intern() 234 if (dest->ext.tick == NULL) in ssl_session_dup_intern() 860 OPENSSL_free(ss->ext.tick); in SSL_SESSION_free() 1040 void SSL_SESSION_get0_ticket(const SSL_SESSION *s, const unsigned char **tick, in SSL_SESSION_get0_ticket() argument 1044 if (tick != NULL) in SSL_SESSION_get0_ticket() 1045 *tick = s->ext.tick; in SSL_SESSION_get0_ticket()
|
H A D | ssl_txt.c | 109 if (x->ext.tick) { in SSL_SESSION_print() 113 (bp, (const char *)x->ext.tick, (int)x->ext.ticklen, 4) in SSL_SESSION_print()
|
H A D | ssl_local.h | 535 unsigned char *tick; /* Session ticket */ member
|
/openssl/test/helpers/ |
H A D | handshake.c | 1431 const unsigned char* tick = NULL; in do_handshake_internal() local 1651 SSL_SESSION_get0_ticket(sess, &tick, &tick_len); in do_handshake_internal() 1654 if (tick == NULL || tick_len == 0) in do_handshake_internal() 1686 SSL_SESSION_get0_ticket_appdata(sess, (void**)&tick, &tick_len); in do_handshake_internal() 1687 ret->result_session_ticket_app_data = OPENSSL_strndup((const char*)tick, tick_len); in do_handshake_internal()
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 293 && s->session->ext.tick != NULL in tls_construct_ctos_session_ticket() 299 s->session->ext.tick = OPENSSL_malloc(ticklen); in tls_construct_ctos_session_ticket() 300 if (s->session->ext.tick == NULL) { in tls_construct_ctos_session_ticket() 304 memcpy(s->session->ext.tick, in tls_construct_ctos_session_ticket() 316 || !WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, ticklen)) { in tls_construct_ctos_session_ticket() 1170 if (!WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, in tls_construct_ctos_psk()
|
H A D | statem_clnt.c | 293 && s->session->ext.tick != NULL in ossl_statem_client_read_transition() 1619 && s->ext.session_secret_cb != NULL && s->session->ext.tick) { in tls_process_server_hello() 2755 OPENSSL_free(s->session->ext.tick); in tls_process_new_session_ticket() 2756 s->session->ext.tick = NULL; in tls_process_new_session_ticket() 2759 s->session->ext.tick = OPENSSL_malloc(ticklen); in tls_process_new_session_ticket() 2760 if (s->session->ext.tick == NULL) { in tls_process_new_session_ticket() 2764 if (!PACKET_copy_bytes(pkt, s->session->ext.tick, ticklen)) { in tls_process_new_session_ticket() 2814 if (!EVP_Digest(s->session->ext.tick, ticklen, in tls_process_new_session_ticket()
|
H A D | extensions_srvr.c | 996 static SSL_TICKET_STATUS tls_get_stateful_ticket(SSL_CONNECTION *s, PACKET *tick, in tls_get_stateful_ticket() argument 1003 switch (PACKET_remaining(tick)) { in tls_get_stateful_ticket() 1014 tmpsess = lookup_sess_in_cache(s, PACKET_data(tick), in tls_get_stateful_ticket()
|
H A D | extensions.c | 1053 OPENSSL_free(ss->ext.tick); in final_server_name() 1054 ss->ext.tick = NULL; in final_server_name()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-thread-assist.md | 58 - The assist thread performs a reduced tick operation which does everything
|
/openssl/crypto/engine/ |
H A D | README.md | 184 tick is that the ENGINE_TABLE instantiations (tb_***.c) use NULL as their
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 1715 void SSL_SESSION_get0_ticket(const SSL_SESSION *s, const unsigned char **tick,
|