Home
last modified time | relevance | path

Searched refs:ss (Results 1 – 23 of 23) sorted by relevance

/openssl/ssl/
H A Dssl_sess.c49 ss->calc_timeout = ossl_time_add(ss->time, ss->timeout); in ssl_session_calculate_timeout()
103 SSL_SESSION *ss; in SSL_SESSION_new() local
108 ss = OPENSSL_zalloc(sizeof(*ss)); in SSL_SESSION_new()
109 if (ss == NULL) in SSL_SESSION_new()
128 return ss; in SSL_SESSION_new()
408 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id()
482 s->session = ss; in ssl_get_new_session()
844 if (ss == NULL) in SSL_SESSION_free()
854 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); in SSL_SESSION_free()
855 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free()
[all …]
H A Dssl_local.h2498 __owur int ssl_generate_session_id(SSL_CONNECTION *s, SSL_SESSION *ss);
2976 void ssl_session_calculate_timeout(SSL_SESSION *ss);
/openssl/crypto/x509/
H A Dv3_akid.c110 int same_issuer, ss; in v2i_AUTHORITY_KEYID() local
162 ss = X509_check_private_key(ctx->subject_cert, ctx->issuer_pkey); in v2i_AUTHORITY_KEYID()
164 ss = same_issuer; in v2i_AUTHORITY_KEYID()
168 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID()
175 && !(same_issuer && !ss)) { in v2i_AUTHORITY_KEYID()
196 if (issuer == 2 || (issuer == 1 && !ss && ikeyid == NULL)) { in v2i_AUTHORITY_KEYID()
H A Dby_dir.c170 const char *s, *ss, *p; in add_cert_dir() local
183 ss = s; in add_cert_dir()
185 len = p - ss; in add_cert_dir()
190 if (strlen(ent->dir) == len && strncmp(ent->dir, ss, len) == 0) in add_cert_dir()
207 ent->dir = OPENSSL_strndup(ss, len); in add_cert_dir()
/openssl/doc/man3/
H A DOSSL_ESS_check_signing_certs.pod22 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss,
41 the certificates required by the identifiers given in I<ss> and/or I<ssv2>.
42 If I<require_signing_cert> is nonzero, I<ss> or I<ssv2> must not be NULL.
43 If both I<ss> and I<ssv2> are not NULL, they are evaluated independently.
44 The list of certificate identifiers in I<ss> is of type B<ESS_CERT_ID>,
H A DSSL_CTX_set_session_ticket_cb.pod16 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss,
25 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len);
26 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len);
43 available. If ticket decryption was successful then the B<ss> argument contains
51 B<data> and B<len> into B<ss> which is then placed into any generated session
59 application data from B<ss>. The application data can be set via
68 When the B<dec_cb> callback is invoked, the SSL_SESSION B<ss> has not yet been
147 no session data will be available and the callback must not use the B<ss>
150 SSL_SESSION_get0_ticket_appdata() using the session provided in the B<ss>
H A DSSL_get0_peer_rpk.pod19 EVP_PKEY *SSL_SESSION_get0_peer_rpk(const SSL_SESSION *ss);
35 SSL_SESSION B<ss>.
/openssl/crypto/ess/
H A Dess_lib.c339 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss, in OSSL_ESS_check_signing_certs() argument
344 int n_v1 = ss == NULL ? -1 : sk_ESS_CERT_ID_num(ss->cert_ids); in OSSL_ESS_check_signing_certs()
348 if (require_signing_cert && ss == NULL && ssv2 == NULL) { in OSSL_ESS_check_signing_certs()
358 ret = find(sk_ESS_CERT_ID_value(ss->cert_ids, i), NULL, i, chain); in OSSL_ESS_check_signing_certs()
/openssl/crypto/cms/
H A Dcms_ess.c105 ESS_SIGNING_CERT *ss = NULL; in ossl_cms_check_signing_certs() local
107 int ret = ossl_cms_signerinfo_get_signing_cert(si, &ss) >= 0 in ossl_cms_check_signing_certs()
109 && OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ossl_cms_check_signing_certs()
111 ESS_SIGNING_CERT_free(ss); in ossl_cms_check_signing_certs()
/openssl/crypto/
H A Dparam_build.c368 const size_t ss = OSSL_PARAM_ALIGN_SIZE * bld->secure_blocks; in OSSL_PARAM_BLD_to_param() local
370 if (ss > 0) { in OSSL_PARAM_BLD_to_param()
371 s = OPENSSL_secure_malloc(ss); in OSSL_PARAM_BLD_to_param()
384 ossl_param_set_secure_block(last, s, ss); in OSSL_PARAM_BLD_to_param()
/openssl/crypto/conf/
H A Dconf_def.c354 char *ss; in def_load_bio() local
358 ss = start; in def_load_bio()
360 end = eat_alpha_numeric(conf, ss); in def_load_bio()
363 if (*p != '\0' && ss != p) { in def_load_bio()
364 ss = p; in def_load_bio()
/openssl/test/recipes/
H A D25-test_req.t444 my $ss = $cert =~ m/self-signed/;
451 push(@cmd, ("-key", $key)) if $ss;
452 push(@cmd, ("-CA", $ca_cert, "-CAkey", $ca_key)) unless $ss;
/openssl/ssl/statem/
H A Dextensions.c1050 SSL_SESSION* ss = SSL_get_session(ssl); in final_server_name() local
1052 if (ss != NULL) { in final_server_name()
1053 OPENSSL_free(ss->ext.tick); in final_server_name()
1054 ss->ext.tick = NULL; in final_server_name()
1055 ss->ext.ticklen = 0; in final_server_name()
1056 ss->ext.tick_lifetime_hint = 0; in final_server_name()
1057 ss->ext.tick_age_add = 0; in final_server_name()
1058 if (!ssl_generate_session_id(s, ss)) { in final_server_name()
/openssl/crypto/ts/
H A Dts_rsp_verify.c234 ESS_SIGNING_CERT *ss = ossl_ess_get_signing_cert(si); in ts_check_signing_certs() local
236 int ret = OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ts_check_signing_certs()
238 ESS_SIGNING_CERT_free(ss); in ts_check_signing_certs()
/openssl/include/openssl/
H A Dess.h.in73 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss,
H A Dssl.h.in2154 __owur int SSL_SESSION_set_ex_data(SSL_SESSION *ss, int idx, void *data);
2155 void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss, int idx);
2769 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss,
2778 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len);
2779 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len);
/openssl/crypto/cmp/
H A Dcmp_client.c91 OSSL_CMP_PKIFREETEXT *ss; in save_statusInfo() local
106 ss = si->statusString; /* may be NULL */ in save_statusInfo()
107 for (i = 0; i < sk_ASN1_UTF8STRING_num(ss); i++) { in save_statusInfo()
108 ASN1_UTF8STRING *str = sk_ASN1_UTF8STRING_value(ss, i); in save_statusInfo()
/openssl/test/helpers/
H A Dhandshake.c458 SSL_SESSION *ss = SSL_get_session(s); in generate_session_ticket_cb() local
461 if (ss == NULL || app_data == NULL) in generate_session_ticket_cb()
464 return SSL_SESSION_set1_ticket_appdata(ss, app_data, strlen(app_data)); in generate_session_ticket_cb()
467 static int decrypt_session_ticket_cb(SSL *s, SSL_SESSION *ss, in decrypt_session_ticket_cb() argument
/openssl/test/
H A Dtls-provider.c565 unsigned char *ss, size_t *sslen) in xor_encapsulate() argument
580 if (ct == NULL || ss == NULL) { in xor_encapsulate()
609 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_encapsulate()
622 unsigned char *ss, size_t *sslen, in xor_decapsulate() argument
636 if (ss == NULL) { in xor_decapsulate()
656 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_decapsulate()
H A Dsslapitest.c8219 static SSL_TICKET_RETURN dec_tick_cb(SSL *s, SSL_SESSION *ss, in dec_tick_cb() argument
8237 if (!TEST_true(SSL_SESSION_get0_ticket_appdata(ss, &tickdata, in dec_tick_cb()
/openssl/crypto/bio/
H A Dbss_dgram.c563 struct sockaddr_storage ss; in dgram_ctrl() local
564 socklen_t ss_len = sizeof(ss); in dgram_ctrl()
582 if (getpeername(b->num, (struct sockaddr *)&ss, &ss_len) == 0) { in dgram_ctrl()
583 BIO_ADDR_make(&data->peer, BIO_ADDR_sockaddr((BIO_ADDR *)&ss)); in dgram_ctrl()
/openssl/util/
H A Dindent.pro34 -ss
/openssl/
H A DCHANGES.md18540 openssl verify ss.pem
18542 openssl verify -CAfile ss.pem ss.pem

Completed in 196 milliseconds