Searched refs:tlsext_ticket_expected (Results 1 - 9 of 9) sorted by relevance

/external/boringssl/src/ssl/
H A Dd1_srvr.c216 if (s->tlsext_ticket_expected) {
354 } else if (s->tlsext_ticket_expected) {
H A Dd1_clnt.c244 if (s->tlsext_ticket_expected) {
404 if (s->tlsext_ticket_expected) {
H A Dt1_lib.c1218 if (s->tlsext_ticket_expected && !(SSL_get_options(s) & SSL_OP_NO_TICKET)) {
1696 s->tlsext_ticket_expected = 0;
1766 s->tlsext_ticket_expected = 1;
2037 * Sets s->tlsext_ticket_expected to 1 if the server will have to issue
2041 * the client's ticket. Otherwise, s->tlsext_ticket_expected is set to 0.
2046 s->tlsext_ticket_expected = 0;
2062 s->tlsext_ticket_expected = 1;
2070 s->tlsext_ticket_expected = 1;
2077 s->tlsext_ticket_expected = 1;
H A Dssl_sess.c292 if (s->tlsext_ticket_expected) {
374 * - Both for new and resumed sessions, s->tlsext_ticket_expected is set to 1
391 r = tls1_process_ticket(s, ctx, &ret); /* sets s->tlsext_ticket_expected */
510 s->tlsext_ticket_expected = 1;
H A Ds3_clnt.c256 if (s->tlsext_ticket_expected) {
450 if (s->tlsext_ticket_expected) {
518 if (s->tlsext_ticket_expected) {
H A Ds3_srvr.c283 if (s->tlsext_ticket_expected) {
468 } else if (s->tlsext_ticket_expected) {
H A Dssl_lib.c292 s->tlsext_ticket_expected = 0;
/external/boringssl/include/openssl/
H A Dssl.h1427 int tlsext_ticket_expected; member in struct:ssl_st
/external/boringssl/src/include/openssl/
H A Dssl.h1427 int tlsext_ticket_expected; member in struct:ssl_st

Completed in 118 milliseconds