Lines Matching full:now
308 LockSidCacheLock(sidCacheLock *lock, PRUint32 now)
313 if (!now)
314 now = ssl_Time();
315 lock->timeStamp = now;
317 return now;
332 LockSet(cacheDesc *cache, PRUint32 set, PRUint32 now)
337 return LockSidCacheLock(lock, now);
357 PRUint32 now;
374 now = LockSidCacheLock(cache->certCacheLock, 0);
375 if (now) {
393 return now;
623 FindSID(cacheDesc *cache, PRUint32 setNum, PRUint32 now,
642 if (now > sce->expirationTime) {
644 SSL_TRC(7, ("%d: timed out sid entry addr=%08x%08x%08x%08x now=%x "
648 sce->addr.pr_s6_addr32[3], now,
686 PRUint32 now;
693 now = LockSet(cache, set, 0);
694 if (!now)
697 psce = FindSID(cache, set, now, addr, sessionID, sessionIDLength);
702 PRUint32 gotLock = LockSidCacheLock(cache->certCacheLock, now);
730 psce->lastAccessTime = now;
751 PRUint32 now = 0;
801 now = CacheCert(cache, sid->peerCert, &sce);
805 now = LockSet(cache, set, now);
806 if (now) {
834 PRUint32 now;
869 now = LockSet(cache, set, 0);
870 if (now) {
871 psce = FindSID(cache, set, now, &sid->addr, sessionID, sessionIDLength);
1377 /* We're now going to overwrite the local cache instance with the
1388 ** spaces in shared memory, whose address is now in "my".
1433 /* now, make a local PRLock in this sslMutex for this child process */
1482 PRUint32 now;
1494 now = ssl_Time();
1495 then = now - expiration;
1512 pLock->timeStamp = now;
1516 /* Now what? */
1575 /* If now is zero, it implies that the lock is not held, and must be
1587 PRUint32 now = 0;
1595 lockTime = now = LockSidCacheLock(cache->keyCacheLock, now);
1606 if (now) {
1759 PRUint32 now = 0;
1764 now = LockSidCacheLock(cache->keyCacheLock, now);
1765 if (!now)
1791 PRUint32 now = 0;
1795 now = LockSidCacheLock(cache->keyCacheLock, now);
1796 if (!now)
1842 PRUint32 now = 0;
1861 now = LockSidCacheLock(cache->keyCacheLock, now);
1862 if (now) {
1864 &myWswk, cache, now);