/openssl/crypto/modes/ |
H A D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 317 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 369 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 375 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 397 ocb_block16_xor(&ctx->sess.offset, &ctx->l_star, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 409 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 461 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_decrypt() 472 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() 501 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() [all …]
|
/openssl/engines/ |
H A D | e_devcrypto.c | 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 377 memset(&to_cipher_ctx->sess, 0, sizeof(to_cipher_ctx->sess)); in cipher_ctrl() 382 memset(&cipher_ctx->sess, 0, sizeof(cipher_ctx->sess)); in cipher_ctrl() 428 session_op_t sess; in prepare_cipher_methods() local 439 memset(&sess, 0, sizeof(sess)); in prepare_cipher_methods() 506 fop.crid = sess.crid; in prepare_cipher_methods() 512 siop.ses = sess.ses; in prepare_cipher_methods() 675 session_op_t sess; member 755 memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess)); in digest_init() [all …]
|
/openssl/test/ |
H A D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
H A D | tls13ccstest.c | 251 SSL_SESSION *sess = NULL; in test_tls13ccs() local 306 sess = SSL_get1_session(cssl); in test_tls13ccs() 307 if (!TEST_ptr(sess)) in test_tls13ccs() 345 if (!TEST_true(SSL_set_session(cssl, sess)) in test_tls13ccs() 482 SSL_SESSION_free(sess); in test_tls13ccs()
|
H A D | sslapitest.c | 433 SSL_SESSION *sess = NULL; in test_keylog_no_master_key() local 535 SSL_SESSION_free(sess); in test_keylog_no_master_key() 945 SSL_SESSION_free(sess); in test_ccs_change_cipher() 1852 SSL_SESSION_free(sess); in new_session_cb() 3090 *sess = clientpsk; in use_session_cb() 3143 *sess = NULL; in find_session_cb() 3148 *sess = serverpsk; in find_session_cb() 3211 if (!TEST_ptr(sess) in create_a_psk() 3222 return sess; in create_a_psk() 3297 if (sess == NULL) in setupearly_data_test() [all …]
|
H A D | dtlstest.c | 169 SSL_SESSION *sess = NULL; in test_dtls_drop_records() local 195 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_dtls_drop_records() 223 if (sess != NULL) { in test_dtls_drop_records() 224 if (!TEST_true(SSL_set_session(clientssl, sess))) in test_dtls_drop_records() 253 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) in test_dtls_drop_records() 263 SSL_SESSION_free(sess); in test_dtls_drop_records()
|
H A D | bad_dtls_test.c | 465 SSL_SESSION *sess = NULL; in test_bad_dtls() local 483 sess = client_session(); in test_bad_dtls() 484 if (!TEST_ptr(sess)) in test_bad_dtls() 505 || !TEST_true(SSL_set_session(con, sess))) in test_bad_dtls() 507 SSL_SESSION_free(sess); in test_bad_dtls()
|
H A D | ssl_old_test.c | 828 SSL_SESSION *sess; in read_session() local 836 sess = PEM_read_bio_SSL_SESSION(f, NULL, 0, NULL); in read_session() 837 if (sess == NULL) { in read_session() 842 return sess; in read_session() 845 static int write_session(const char *filename, SSL_SESSION *sess) in write_session() argument 849 if (sess == NULL) { in write_session() 860 PEM_write_bio_SSL_SESSION(f, sess); in write_session()
|
/openssl/apps/ |
H A D | s_server.c | 200 *sess = NULL; in psk_find_session_cb() 234 *sess = tmpsess; in psk_find_session_cb() 3729 sess->der = app_malloc(sess->derlen, "get session buffer"); in add_session() 3730 if (!sess->id) { in add_session() 3737 p = sess->der; in add_session() 3749 first = sess; in add_session() 3759 for (sess = first; sess; sess = sess->next) { in get_session() 3776 for (sess = first; sess; sess = sess->next) { in del_session() 3777 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session() 3804 for (sess = first; sess;) { in free_sessions() [all …]
|
H A D | s_client.c | 160 SSL_SESSION **sess) in psk_use_session_cb() argument 205 *sess = NULL; in psk_use_session_cb() 208 *sess = usesess; in psk_use_session_cb() 760 static int new_session_cb(SSL *s, SSL_SESSION *sess) in new_session_cb() argument 769 PEM_write_bio_SSL_SESSION(stmp, sess); in new_session_cb() 781 SSL_SESSION_print(bio_c_out, sess); in new_session_cb() 1983 SSL_SESSION *sess; in s_client_main() local 1990 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); in s_client_main() 1992 if (sess == NULL) { in s_client_main() 1997 if (!SSL_set_session(con, sess)) { in s_client_main() [all …]
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 986 *sess = tmpsess; in tls_get_stateful_ticket() 995 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1035 if (sess == NULL in tls_parse_ctos_psk() 1068 if (sess == NULL in tls_parse_ctos_psk() 1083 if (sess != NULL) { in tls_parse_ctos_psk() 1092 sess = sesstmp; in tls_parse_ctos_psk() 1140 sess = NULL; in tls_parse_ctos_psk() 1180 sess = NULL; in tls_parse_ctos_psk() 1188 if (sess == NULL) in tls_parse_ctos_psk() 1220 s->session = sess; in tls_parse_ctos_psk() [all …]
|
H A D | extensions.c | 1464 unsigned char *binderout, SSL_SESSION *sess, int sign, in tls_psk_do_binder() argument 1496 && sess->ext.max_early_data > 0) in tls_psk_do_binder() 1518 early_secret = (unsigned char *)sess->early_secret; in tls_psk_do_binder() 1520 if (!tls13_generate_secret(s, md, NULL, sess->master_key, in tls_psk_do_binder() 1521 sess->master_key_length, early_secret)) { in tls_psk_do_binder()
|
H A D | statem_srvr.c | 3708 SSL_SESSION *sess; in construct_stateless_ticket() local 3751 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); in construct_stateless_ticket() 3752 if (sess == NULL) { in construct_stateless_ticket() 3757 slen = i2d_SSL_SESSION(sess, NULL); in construct_stateless_ticket() 3761 SSL_SESSION_free(sess); in construct_stateless_ticket() 3765 if (!i2d_SSL_SESSION(sess, &p)) { in construct_stateless_ticket() 3767 SSL_SESSION_free(sess); in construct_stateless_ticket() 3770 SSL_SESSION_free(sess); in construct_stateless_ticket()
|
/openssl/ssl/record/ |
H A D | ssl3_record.c | 70 SSL_SESSION *sess = s->session; in ossl_get_max_early_data() local 77 if (!s->server && sess->ext.max_early_data == 0) { in ossl_get_max_early_data() 83 sess = s->psksession; in ossl_get_max_early_data() 87 max_early_data = sess->ext.max_early_data; in ossl_get_max_early_data() 91 max_early_data = s->recv_max_early_data < sess->ext.max_early_data in ossl_get_max_early_data() 92 ? s->recv_max_early_data : sess->ext.max_early_data; in ossl_get_max_early_data()
|
H A D | rec_layer_d1.c | 647 SSL_SESSION *sess; in do_dtls1_write() local 677 sess = sc->session; in do_dtls1_write() 679 if ((sess == NULL) in do_dtls1_write()
|
H A D | rec_layer_s3.c | 506 SSL_SESSION *sess; in do_ssl3_write() local 543 sess = s->session; in do_ssl3_write() 545 if ((sess == NULL) in do_ssl3_write()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_sess_set_get_cb.pod | 22 SSL_SESSION *sess); 24 SSL_SESSION *sess); 60 ssl session B<sess>. 87 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 22 SSL_SESSION **sess); 49 in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key, 55 callback should return successfully and ensure that B<*sess> is
|
H A D | SSL_CTX_set_psk_client_callback.pod | 20 SSL_SESSION **sess); 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 98 this the callback should return successfully and ensure that B<*sess> is
|
H A D | SSL_get_client_random.pod | 19 int SSL_SESSION_set1_master_key(SSL_SESSION *sess, const unsigned char *in, 40 SSL_SESSION B<sess>. For example, this could be used to set up a session based
|
/openssl/ssl/ |
H A D | ssl_sess.c | 80 SSL_SESSION *sess; in SSL_get1_session() local 89 sess = SSL_get_session(ssl); in SSL_get1_session() 90 if (sess != NULL) in SSL_get1_session() 91 SSL_SESSION_up_ref(sess); in SSL_get1_session() 93 return sess; in SSL_get1_session() 1283 int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) in SSL_CTX_sess_set_new_cb() argument 1288 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx)) (SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb() 1293 void (*cb) (SSL_CTX *ctx, SSL_SESSION *sess)) in SSL_CTX_sess_set_remove_cb() argument 1299 SSL_SESSION *sess) { in SSL_CTX_sess_get_remove_cb()
|
H A D | t1_lib.c | 1875 SSL_SESSION *sess = NULL; in tls_decrypt_ticket() local 2034 sess = d2i_SSL_SESSION(NULL, &p, slen); in tls_decrypt_ticket() 2037 if (sess) { in tls_decrypt_ticket() 2040 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2041 sess = NULL; in tls_decrypt_ticket() 2053 sess->session_id_length = sesslen; in tls_decrypt_ticket() 2097 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2098 sess = NULL; in tls_decrypt_ticket() 2105 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2106 sess = NULL; in tls_decrypt_ticket() [all …]
|
/openssl/test/helpers/ |
H A D | handshake.c | 1421 SSL_SESSION* sess = NULL; in do_handshake_internal() local 1636 if ((sess = SSL_get0_session(client.ssl)) != NULL) { in do_handshake_internal() 1637 SSL_SESSION_get0_ticket(sess, &tick, &tick_len); in do_handshake_internal() 1638 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1671 if ((sess = SSL_get0_session(server.ssl)) != NULL) { in do_handshake_internal() 1672 SSL_SESSION_get0_ticket_appdata(sess, (void**)&tick, &tick_len); in do_handshake_internal()
|
/openssl/ |
H A D | NOTES-WINDOWS.md | 231 DWORD sess; 233 if (ProcessIdToSessionId(GetCurrentProcessId(), &sess)) 234 return sess == 0;
|
/openssl/include/crypto/ |
H A D | modes.h | 205 } sess; member
|