Home | History | Annotate | Download | only in patches

Lines Matching full:cutthrough

30 +	BIO_printf(bio_err," -cutthrough       - enable 1-RTT full-handshake for strong ciphers\n");
38 + int cutthrough=0;
46 + else if (strcmp(*argv,"-cutthrough") == 0)
47 + cutthrough=1;
55 + /* Enable handshake cutthrough for client connections using
57 + if (cutthrough)
94 + && s->s3->previous_server_finished_len == 0 /* no cutthrough on renegotiation (would complicate the state machine) */
236 + return (!s->server && /* cutthrough only applies to clients */
239 + s->s3->in_read_app_data == 0 && /* cutthrough only applies to write() */
240 + (SSL_get_mode((SSL*)s) & SSL_MODE_HANDSHAKE_CUTTHROUGH) && /* cutthrough enabled */
241 + ssl3_can_cutthrough(s) && /* cutthrough allowed */
300 + fprintf(stderr," -cutthrough - enable 1-RTT full-handshake for strong ciphers\n");
308 + int cutthrough = 0;
316 + else if (strcmp(*argv, "-cutthrough") == 0)
318 + cutthrough = 1;
327 + if (cutthrough)
344 +echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
345 +$ssltest -server_auth -client_auth -cutthrough $CA $extra || exit 1