Searched refs:tlsext_tick (Results 1 - 12 of 12) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_asn1.c | 110 ASN1_OCTET_STRING tlsext_tick; member in struct:ssl_session_asn1_st 241 if (in->tlsext_tick) { 242 a.tlsext_tick.length = in->tlsext_ticklen; 243 a.tlsext_tick.type = V_ASN1_OCTET_STRING; 244 a.tlsext_tick.data = (unsigned char *)in->tlsext_tick; 300 if (in->tlsext_tick) 301 M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, 365 if (in->tlsext_tick) 366 M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_txt.c | 216 if (x->tlsext_tick) { 219 if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4)
|
H A D | ssl_sess.c | 259 dest->tlsext_tick = NULL; 329 dest->tlsext_tick = BUF_memdup(src->tlsext_tick, src->tlsext_ticklen); 330 if(dest->tlsext_tick == NULL) 874 if (ss->tlsext_tick != NULL) 875 OPENSSL_free(ss->tlsext_tick);
|
H A D | s3_clnt.c | 695 (!sess->session_id_length && !sess->tlsext_tick) || 1001 s->session->tlsext_tick) { 2307 if (s->session->tlsext_tick) { 2308 OPENSSL_free(s->session->tlsext_tick); 2311 s->session->tlsext_tick = OPENSSL_malloc(ticklen); 2312 if (!s->session->tlsext_tick) { 2316 memcpy(s->session->tlsext_tick, p, ticklen); 3687 !s->session->tlsext_tick)
|
H A D | t1_lib.c | 1401 if (!s->new_session && s->session && s->session->tlsext_tick) 1406 s->session->tlsext_tick = OPENSSL_malloc(ticklen); 1407 if (!s->session->tlsext_tick) 1409 memcpy(s->session->tlsext_tick, 1426 memcpy(ret, s->session->tlsext_tick, ticklen);
|
H A D | ssl.h | 567 unsigned char *tlsext_tick; /* Session ticket */ member in struct:ssl_session_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_asn1.c | 110 ASN1_OCTET_STRING tlsext_tick; member in struct:ssl_session_asn1_st 241 if (in->tlsext_tick) { 242 a.tlsext_tick.length = in->tlsext_ticklen; 243 a.tlsext_tick.type = V_ASN1_OCTET_STRING; 244 a.tlsext_tick.data = (unsigned char *)in->tlsext_tick; 300 if (in->tlsext_tick) 301 M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, 365 if (in->tlsext_tick) 366 M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRIN [all...] |
H A D | ssl_txt.c | 216 if (x->tlsext_tick) { 219 if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4)
|
H A D | ssl_sess.c | 259 dest->tlsext_tick = NULL; 329 dest->tlsext_tick = BUF_memdup(src->tlsext_tick, src->tlsext_ticklen); 330 if(dest->tlsext_tick == NULL) 874 if (ss->tlsext_tick != NULL) 875 OPENSSL_free(ss->tlsext_tick);
|
H A D | s3_clnt.c | 695 (!sess->session_id_length && !sess->tlsext_tick) || 1001 s->session->tlsext_tick) { 2307 if (s->session->tlsext_tick) { 2308 OPENSSL_free(s->session->tlsext_tick); 2311 s->session->tlsext_tick = OPENSSL_malloc(ticklen); 2312 if (!s->session->tlsext_tick) { 2316 memcpy(s->session->tlsext_tick, p, ticklen); 3687 !s->session->tlsext_tick)
|
H A D | t1_lib.c | 1401 if (!s->new_session && s->session && s->session->tlsext_tick) 1406 s->session->tlsext_tick = OPENSSL_malloc(ticklen); 1407 if (!s->session->tlsext_tick) 1409 memcpy(s->session->tlsext_tick, 1426 memcpy(ret, s->session->tlsext_tick, ticklen);
|
H A D | ssl.h | 567 unsigned char *tlsext_tick; /* Session ticket */ member in struct:ssl_session_st
|
Completed in 114 milliseconds