Searched refs:cutthrough (Results 1 - 6 of 6) sorted by relevance

/external/chromium_org/third_party/openssl/openssl/android.testssl/
H A Dtestssl73 echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
74 $ssltest -server_auth -client_auth -cutthrough $CA $extra || exit 1
/external/openssl/android.testssl/
H A Dtestssl73 echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
74 $ssltest -server_auth -client_auth -cutthrough $CA $extra || exit 1
/external/chromium_org/third_party/openssl/openssl/apps/
H A Ds_client.c364 BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
581 int cutthrough=0; local
888 else if (strcmp(*argv,"-cutthrough") == 0)
889 cutthrough=1;
1165 /* Enable handshake cutthrough for client connections using
1167 if (cutthrough)
/external/chromium_org/third_party/openssl/openssl/ssl/
H A Dssltest.c372 fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
553 int cutthrough = 0; local
770 else if (strcmp(*argv, "-cutthrough") == 0)
772 cutthrough = 1;
909 if (cutthrough)
/external/openssl/apps/
H A Ds_client.c365 BIO_printf(bio_err," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
582 int cutthrough=0; local
895 else if (strcmp(*argv,"-cutthrough") == 0)
896 cutthrough=1;
1186 /* Enable handshake cutthrough for client connections using
1188 if (cutthrough)
/external/openssl/ssl/
H A Dssltest.c372 fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
553 int cutthrough = 0; local
770 else if (strcmp(*argv, "-cutthrough") == 0)
772 cutthrough = 1;
909 if (cutthrough)

Completed in 179 milliseconds