/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 40 const unsigned char *session_id, size_t session_id_len, 51 unsigned char *session_id; member 88 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 104 || !ossl_prov_memdup(src->session_id, src->session_id_len, in kdf_sshkdf_dup() 105 &dest->session_id , &dest->session_id_len) in kdf_sshkdf_dup() 194 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 205 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 260 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 340 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 365 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/openssl/test/ |
H A D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session() 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello() 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello() 479 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
|
H A D | ssl_test.c | 153 if (!TEST_int_eq(result->session_id, test_ctx->session_id_expected)) { in check_session_id() 156 ssl_session_id_name(result->session_id)); in check_session_id()
|
H A D | sslapitest.c | 9344 memset(early->session_id, 1, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout() 9346 memset(middle->session_id, 2, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout() 9348 memset(late->session_id, 3, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
|
/openssl/ssl/ |
H A D | ssl_asn1.c | 24 ASN1_OCTET_STRING *session_id; member 55 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 116 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 165 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION() 166 in->session_id, in->session_id_length); in i2d_SSL_SESSION() 314 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION_ex() 315 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION_ex()
|
H A D | ssl_sess.c | 294 return s->session_id; in SSL_SESSION_get_id() 408 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 410 if (!cb(ssl, ss->session_id, &tmp)) { in ssl_generate_session_id() 428 if (SSL_has_matching_session_id(ssl, ss->session_id, in ssl_generate_session_id() 507 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 620 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session() 855 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free() 917 if (sid != s->session_id && sid_len > 0) in SSL_SESSION_set1_id() 918 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
H A D | ssl_txt.c | 68 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print() 191 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
|
H A D | ssl_lib.c | 1057 if (sc == NULL || id_len > sizeof(r.session_id)) in SSL_has_matching_session_id() 1062 memcpy(r.session_id, id, id_len); in SSL_has_matching_session_id() 3824 const unsigned char *session_id = a->session_id; in ssl_session_hash() local 3830 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash() 3831 session_id = tmp_storage; in ssl_session_hash() 3835 ((unsigned long)session_id[0]) | in ssl_session_hash() 3836 ((unsigned long)session_id[1] << 8L) | in ssl_session_hash() 3837 ((unsigned long)session_id[2] << 16L) | in ssl_session_hash() 3838 ((unsigned long)session_id[3] << 24L); in ssl_session_hash() 3855 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp() [all …]
|
H A D | ssl_local.h | 493 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member 650 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
|
H A D | t1_lib.c | 2341 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client() 2551 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SSHKDF.pod | 41 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string> 138 "xcghash" and "session_id" values: 145 unsigned char session_id[32] = "012345..."; 161 session_id, (size_t)32);
|
H A D | provider-kdf.pod | 269 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
|
/openssl/test/helpers/ |
H A D | handshake.h | 76 ssl_session_id_t session_id; member
|
H A D | handshake.c | 1662 ret->session_id = SSL_TEST_SESSION_ID_NO; in do_handshake_internal() 1664 ret->session_id = SSL_TEST_SESSION_ID_YES; in do_handshake_internal()
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1173 unsigned char *session_id; in tls_construct_client_hello() local 1259 session_id = s->session->session_id; in tls_construct_client_hello() 1265 session_id = s->tmp_session_id; in tls_construct_client_hello() 1284 || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, in tls_construct_client_hello() 1458 PACKET session_id, extpkt; in tls_process_server_hello() local 1505 if (!PACKET_get_length_prefixed_1(pkt, &session_id)) { in tls_process_server_hello() 1509 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1510 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1644 && memcmp(PACKET_data(&session_id), s->session->session_id, in tls_process_server_hello() 1684 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello() [all …]
|
H A D | statem_srvr.c | 1474 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local 1572 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1602 || !PACKET_get_length_prefixed_1(pkt, &session_id) in tls_process_client_hello() 1603 || !PACKET_copy_all(&session_id, clienthello->session_id, in tls_process_client_hello() 1889 memcpy(s->tmp_session_id, s->clienthello->session_id, in tls_early_post_process_client_hello() 2400 unsigned char *session_id; in tls_construct_server_hello() local 2442 session_id = s->tmp_session_id; in tls_construct_server_hello() 2445 session_id = s->session->session_id; in tls_construct_server_hello() 2448 if (sl > sizeof(s->session->session_id)) { in tls_construct_server_hello() 2463 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl) in tls_construct_server_hello() [all …]
|
/openssl/test/recipes/75-test_quicapi_data/ |
H A D | ssltraceref-zlib.txt | 11 session_id (len=0): 115 session_id (len=0):
|
H A D | ssltraceref.txt | 11 session_id (len=0): 113 session_id (len=0):
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 109 * Prefix the session_id with the required prefix. NB: If our
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 178 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id:
|
/openssl/ |
H A D | CHANGES.md | 6264 SSL/TLS protocol specifications, the session_id sent by the server will be
|