Searched refs:etick (Results 1 - 4 of 4) sorted by relevance
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 1796 * etick: points to the body of the session ticket extension. 1803 SSL_TICKET_STATUS tls_decrypt_ticket(SSL *s, const unsigned char *etick, in tls_decrypt_ticket() argument 1860 unsigned char *nctick = (unsigned char *)etick; in tls_decrypt_ticket() 1890 if (memcmp(etick, tctx->ext.tick_key_name, in tls_decrypt_ticket() 1904 etick + TLSEXT_KEYNAME_LENGTH) <= 0) { in tls_decrypt_ticket() 1936 if (ssl_hmac_update(hctx, etick, eticklen) <= 0 in tls_decrypt_ticket() 1942 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { in tls_decrypt_ticket() 1948 p = etick + TLSEXT_KEYNAME_LENGTH + ivlen; in tls_decrypt_ticket() 2017 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
|
H A D | ssl_local.h | 2733 __owur SSL_TICKET_STATUS tls_decrypt_ticket(SSL *s, const unsigned char *etick,
|
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 1776 * etick: points to the body of the session ticket extension. 1783 SSL_TICKET_STATUS tls_decrypt_ticket(SSL *s, const unsigned char *etick, in tls_decrypt_ticket() argument 1840 unsigned char *nctick = (unsigned char *)etick; in tls_decrypt_ticket() 1870 if (memcmp(etick, tctx->ext.tick_key_name, in tls_decrypt_ticket() 1884 etick + TLSEXT_KEYNAME_LENGTH) <= 0) { in tls_decrypt_ticket() 1916 if (ssl_hmac_update(hctx, etick, eticklen) <= 0 in tls_decrypt_ticket() 1922 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { in tls_decrypt_ticket() 1928 p = etick + TLSEXT_KEYNAME_LENGTH + ivlen; in tls_decrypt_ticket() 1997 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
|
H A D | ssl_local.h | 2677 __owur SSL_TICKET_STATUS tls_decrypt_ticket(SSL *s, const unsigned char *etick,
|
Completed in 24 milliseconds