/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/net/storj/storj-1.45.3/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/security/xray-core/Xray-core-1.5.0/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/dns/nextdns/nextdns-1.32.2/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/net/v2ray/v2ray-core-4.36.2/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { 20 func (t *sessionTicket) Marshal() []byte { 28 func (t *sessionTicket) Unmarshal(b []byte) error {
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket_test.go | 16 ticket := &sessionTicket{ 23 var t sessionTicket 31 …Expect((&sessionTicket{}).Unmarshal([]byte{})).To(MatchError("failed to read session ticket revisi… 37 …Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("unknown session ticket revision: 13… 43 Expect((&sessionTicket{}).Unmarshal(b.Bytes())).To(MatchError("failed to read RTT")) 50 err := (&sessionTicket{}).Unmarshal(b.Bytes())
|
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1211 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1218 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1211 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1218 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1211 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1218 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/security/nss/nss-3.76.1/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1211 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1218 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1211 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1218 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 333 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 494 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 706 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 729 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenUsable() 765 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1084 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1210 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1217 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ssl/ |
H A D | sslnonce.c | 176 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 177 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 326 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 482 sid->u.ssl3.locked.sessionTicket.flags = (PRUint32)tmpInt; in ssl_DecodeResumptionToken() 691 if (!sid->u.ssl3.locked.sessionTicket.ticket.len) { in ssl_DecodeResumptionToken() 715 NewSessionTicket *ticket = &sid->u.ssl3.locked.sessionTicket; in ssl_IsResumptionTokenValid() 751 if (!sid || !sid->u.ssl3.locked.sessionTicket.ticket.len || in ssl_EncodeResumptionToken() 1070 if (sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) { in ssl_CacheExternalToken() 1210 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 1216 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() [all …]
|
/dports/net/syncthing/syncthing-1.18.1/syncthing/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/lucas-clemente/quic-go/internal/handshake/ |
H A D | session_ticket.go | 15 type sessionTicket struct { struct 20 func (t *sessionTicket) Marshal() []byte { argument 28 func (t *sessionTicket) Unmarshal(b []byte) error { argument
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ssl/ |
H A D | sslnonce.c | 174 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl_DestroySID() 175 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl_DestroySID() 326 sid->u.ssl3.locked.sessionTicket.ticket.data == NULL) in CacheSID() 479 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { in ssl3_SetSIDSessionTicket() 480 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, in ssl3_SetSIDSessionTicket() 485 PORT_Assert(!sid->u.ssl3.locked.sessionTicket.ticket.data); in ssl3_SetSIDSessionTicket() 488 sid->u.ssl3.locked.sessionTicket = *newSessionTicket; in ssl3_SetSIDSessionTicket()
|
/dports/lang/mono/mono-5.10.1.57/external/boringssl/ssl/test/runner/ |
H A D | handshake_client.go | 158 ticketOk := !c.config.SessionTicketsDisabled || candidateSession.sessionTicket == nil 179 if session.sessionTicket != nil { 180 hello.sessionTicket = session.sessionTicket 182 hello.sessionTicket = make([]byte, len(session.sessionTicket)) 183 copy(hello.sessionTicket, session.sessionTicket) 184 if len(hello.sessionTicket) > 0 { 186 if offset > len(hello.sessionTicket) { 187 offset = len(hello.sessionTicket) - 1 189 hello.sessionTicket[offset] ^= 0x40 366 if c.config.Bugs.RequireSessionTickets && len(hs.session.sessionTicket) == 0 { [all …]
|