Home
last modified time | relevance | path

Searched refs:hit (Results 1 – 14 of 14) sorted by relevance

/openssl/ssl/statem/
H A Dstatem_srvr.c520 if (s->hit) in ossl_statem_server13_write_transition()
663 if (s->hit) { in ossl_statem_server_write_transition()
715 if (s->hit) { in ossl_statem_server_write_transition()
734 if (s->hit) { in ossl_statem_server_write_transition()
1779 s->hit = 0; in tls_early_post_process_client_hello()
1875 s->hit = 1; in tls_early_post_process_client_hello()
1972 if (!s->hit in tls_early_post_process_client_hello()
1991 s->hit = 1; in tls_early_post_process_client_hello()
2117 if (!s->hit) { in tls_early_post_process_client_hello()
2486 s->hit = 0; in tls_construct_server_hello()
[all …]
H A Dextensions_srvr.c139 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_server_name()
251 if (!s->hit) { in tls_parse_ctos_ec_pt_formats()
291 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 1)) { in tls_parse_ctos_sig_algs_cert()
310 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 0)) { in tls_parse_ctos_sig_algs()
326 if (s->hit) in tls_parse_ctos_status_request()
615 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) in tls_parse_ctos_key_share()
947 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_supported_groups()
1321 if (s->hit && !SSL_CONNECTION_IS_TLS13(s)) in tls_construct_stoc_server_name()
1667 if (!s->hit || !tls13_generate_handshake_secret(s, NULL, 0)) { in tls_construct_stoc_key_share()
1674 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) { in tls_construct_stoc_key_share()
[all …]
H A Dextensions.c586 || (s->hit && (extctx & SSL_EXT_IGNORE_ON_RESUMPTION) != 0)) in extension_is_relevant()
1019 if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) { in final_server_name()
1049 if (!s->hit) { in final_server_name()
1266 if (!s->server && s->hit) { in final_ems()
1343 if (!sent && SSL_CONNECTION_IS_TLS13(s) && !s->hit) { in final_sig_algs()
1391 if (!s->hit) { in final_key_share()
1450 && (!s->hit in final_key_share()
1485 if (!s->hit in final_key_share()
1738 || !s->hit in final_early_data()
H A Dstatem_clnt.c130 if (s->hit) { in ossl_statem_client13_read_transition()
276 if (s->hit) { in ossl_statem_client_read_transition()
301 s->hit = 1; in ossl_statem_client_read_transition()
675 if (s->hit) { in ossl_statem_client_write_transition()
683 if (s->hit) { in ossl_statem_client_write_transition()
752 if (s->hit) { in ossl_statem_client_pre_work()
876 if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { in ossl_statem_client_post_work()
1585 s->hit = 0; in tls_process_server_hello()
1646 s->hit = 1; in tls_process_server_hello()
1649 if (s->hit) { in tls_process_server_hello()
[all …]
H A Dextensions_clnt.c1366 if (!s->hit) { in tls_parse_stoc_server_name()
1392 if (!s->hit) { in tls_parse_stoc_ec_pt_formats()
1694 if (!s->hit) { in tls_parse_stoc_alpn()
1788 if (!s->hit) in tls_parse_stoc_ems()
1898 if (!s->hit) { in tls_parse_stoc_key_share()
2025 || !s->hit) { in tls_parse_stoc_early_data()
2063 s->hit = 1; in tls_parse_stoc_psk()
2089 s->hit = 1; in tls_parse_stoc_psk()
H A Dstatem_lib.c237 s->hit = 0; in tls_setup_handshake()
1489 if (s->hit) in tls_finish_handshake()
/openssl/doc/man3/
H A DSSL_CTX_sess_number.pod49 successfully reused is counted as a hit. In server mode a session successfully
50 retrieved from internal or external cache is counted as a hit.
H A DX509_LOOKUP.pod157 possible to handle cases where the criteria have more than one hit.
/openssl/demos/sslecho/
H A DA-SSL-Docs.txt17 You can just hit carriage returns to accept the default values, except for "Common Name"; you
/openssl/test/recipes/30-test_evp_data/
H A Devppbe_scrypt.txt40 # NB: this test requires more than 1GB of memory to run so it will hit the
/openssl/ssl/
H A Dssl_lib.c599 sc->hit = 0; in ossl_ssl_connection_reset()
3474 if (sc->hit && !SSL_CONNECTION_IS_TLS13(sc)) in SSL_get_servername()
3505 if (!SSL_CONNECTION_IS_TLS13(sc) && sc->hit in SSL_get_servername()
4652 && (!s->hit || SSL_CONNECTION_IS_TLS13(s))) { in ssl_update_cache()
5122 retsc->hit = sc->hit; in SSL_dup()
6017 return sc->hit; in SSL_session_reused()
H A Dssl_local.h1444 int hit; /* reusing a previous session */ member
H A Ds3_lib.c4910 if (!s->hit) in ssl_gensecret()
/openssl/
H A DCHANGES.md3507 functions then this issue could be hit. This might result in a crash
3692 * Properly detect EOF while reading in libssl. Previously if we hit an EOF

Completed in 130 milliseconds