Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 21 of 21) sorted by relevance

/openssl/providers/implementations/kdfs/
H A Dsshkdf.c40 const unsigned char *session_id, size_t session_id_len,
51 unsigned char *session_id; member
88 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
104 || !ossl_prov_memdup(src->session_id, src->session_id_len, in kdf_sshkdf_dup()
105 &dest->session_id , &dest->session_id_len) in kdf_sshkdf_dup()
194 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
205 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
260 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
340 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
365 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/openssl/test/
H A Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session()
157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello()
261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello()
479 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
H A Dssl_test.c153 if (!TEST_int_eq(result->session_id, test_ctx->session_id_expected)) { in check_session_id()
156 ssl_session_id_name(result->session_id)); in check_session_id()
H A Dsslapitest.c9344 memset(early->session_id, 1, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
9346 memset(middle->session_id, 2, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
9348 memset(late->session_id, 3, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
/openssl/ssl/
H A Dssl_asn1.c24 ASN1_OCTET_STRING *session_id; member
55 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
116 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
165 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION()
166 in->session_id, in->session_id_length); in i2d_SSL_SESSION()
314 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION_ex()
315 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION_ex()
H A Dssl_sess.c294 return s->session_id; in SSL_SESSION_get_id()
408 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id()
410 if (!cb(ssl, ss->session_id, &tmp)) { in ssl_generate_session_id()
428 if (SSL_has_matching_session_id(ssl, ss->session_id, in ssl_generate_session_id()
507 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache()
620 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session()
855 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free()
917 if (sid != s->session_id && sid_len > 0) in SSL_SESSION_set1_id()
918 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
H A Dssl_txt.c68 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print()
191 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
H A Dssl_lib.c1057 if (sc == NULL || id_len > sizeof(r.session_id)) in SSL_has_matching_session_id()
1062 memcpy(r.session_id, id, id_len); in SSL_has_matching_session_id()
3824 const unsigned char *session_id = a->session_id; in ssl_session_hash() local
3830 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash()
3831 session_id = tmp_storage; in ssl_session_hash()
3835 ((unsigned long)session_id[0]) | in ssl_session_hash()
3836 ((unsigned long)session_id[1] << 8L) | in ssl_session_hash()
3837 ((unsigned long)session_id[2] << 16L) | in ssl_session_hash()
3838 ((unsigned long)session_id[3] << 24L); in ssl_session_hash()
3855 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp()
[all …]
H A Dssl_local.h493 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
650 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
H A Dt1_lib.c2341 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
2551 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
/openssl/doc/man7/
H A DEVP_KDF-SSHKDF.pod41 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
138 "xcghash" and "session_id" values:
145 unsigned char session_id[32] = "012345...";
161 session_id, (size_t)32);
H A Dprovider-kdf.pod269 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
/openssl/test/helpers/
H A Dhandshake.h76 ssl_session_id_t session_id; member
H A Dhandshake.c1662 ret->session_id = SSL_TEST_SESSION_ID_NO; in do_handshake_internal()
1664 ret->session_id = SSL_TEST_SESSION_ID_YES; in do_handshake_internal()
/openssl/ssl/statem/
H A Dstatem_clnt.c1173 unsigned char *session_id; in tls_construct_client_hello() local
1259 session_id = s->session->session_id; in tls_construct_client_hello()
1265 session_id = s->tmp_session_id; in tls_construct_client_hello()
1284 || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, in tls_construct_client_hello()
1458 PACKET session_id, extpkt; in tls_process_server_hello() local
1505 if (!PACKET_get_length_prefixed_1(pkt, &session_id)) { in tls_process_server_hello()
1509 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello()
1510 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello()
1644 && memcmp(PACKET_data(&session_id), s->session->session_id, in tls_process_server_hello()
1684 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello()
[all …]
H A Dstatem_srvr.c1474 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local
1572 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello()
1602 || !PACKET_get_length_prefixed_1(pkt, &session_id) in tls_process_client_hello()
1603 || !PACKET_copy_all(&session_id, clienthello->session_id, in tls_process_client_hello()
1889 memcpy(s->tmp_session_id, s->clienthello->session_id, in tls_early_post_process_client_hello()
2400 unsigned char *session_id; in tls_construct_server_hello() local
2442 session_id = s->tmp_session_id; in tls_construct_server_hello()
2445 session_id = s->session->session_id; in tls_construct_server_hello()
2448 if (sl > sizeof(s->session->session_id)) { in tls_construct_server_hello()
2463 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl) in tls_construct_server_hello()
[all …]
/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref-zlib.txt11 session_id (len=0):
115 session_id (len=0):
H A Dssltraceref.txt11 session_id (len=0):
113 session_id (len=0):
/openssl/doc/man3/
H A DSSL_CTX_set_generate_session_id.pod109 * Prefix the session_id with the required prefix. NB: If our
/openssl/doc/man1/
H A Dopenssl-kdf.pod.in178 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id:
/openssl/
H A DCHANGES.md6264 SSL/TLS protocol specifications, the session_id sent by the server will be

Completed in 143 milliseconds