/openssl/crypto/modes/ |
H A D | ocb128.c | 229 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 291 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 313 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 365 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 371 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 393 ocb_block16_xor(&ctx->sess.offset, &ctx->l_star, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 405 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 457 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_decrypt() 468 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() 497 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() [all …]
|
/openssl/engines/ |
H A D | e_devcrypto.c | 92 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 107 session_op_t sess; member 378 memset(&to_cipher_ctx->sess, 0, sizeof(to_cipher_ctx->sess)); in cipher_ctrl() 383 memset(&cipher_ctx->sess, 0, sizeof(cipher_ctx->sess)); in cipher_ctrl() 429 session_op_t sess; in prepare_cipher_methods() local 440 memset(&sess, 0, sizeof(sess)); in prepare_cipher_methods() 507 fop.crid = sess.crid; in prepare_cipher_methods() 513 siop.ses = sess.ses; in prepare_cipher_methods() 676 session_op_t sess; member 756 memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess)); in digest_init() [all …]
|
/openssl/test/ |
H A D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time_ex(sess, time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
H A D | sslapitest.c | 535 SSL_SESSION_free(sess); in test_keylog_no_master_key() 3281 *sess = clientpsk; in use_session_cb() 3334 *sess = NULL; in find_session_cb() 3339 *sess = serverpsk; in find_session_cb() 3397 if (sess == NULL) in ed_gen_cb() 3489 if (sess == NULL) in setupearly_data_test() 8593 SSL_SESSION *sess; in test_shutdown() local 9499 sess = NULL; in test_session_cache_overflow() 9502 sess = NULL; in test_session_cache_overflow() 11876 SSL_SESSION *sess; member [all …]
|
H A D | tls13ccstest.c | 251 SSL_SESSION *sess = NULL; in test_tls13ccs() local 306 sess = SSL_get1_session(cssl); in test_tls13ccs() 307 if (!TEST_ptr(sess)) in test_tls13ccs() 345 if (!TEST_true(SSL_set_session(cssl, sess)) in test_tls13ccs() 478 SSL_SESSION_free(sess); in test_tls13ccs()
|
H A D | dtlstest.c | 198 SSL_SESSION *sess = NULL; in test_dtls_drop_records() local 229 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_dtls_drop_records() 259 if (sess != NULL) { in test_dtls_drop_records() 260 if (!TEST_true(SSL_set_session(clientssl, sess))) in test_dtls_drop_records() 289 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) in test_dtls_drop_records() 299 SSL_SESSION_free(sess); in test_dtls_drop_records()
|
H A D | bad_dtls_test.c | 469 SSL_SESSION *sess = NULL; in test_bad_dtls() local 487 sess = client_session(); in test_bad_dtls() 488 if (!TEST_ptr(sess)) in test_bad_dtls() 509 || !TEST_true(SSL_set_session(con, sess))) in test_bad_dtls() 598 SSL_SESSION_free(sess); in test_bad_dtls()
|
H A D | quicapitest.c | 62 SSL_SESSION *sess = NULL; in test_quic_write_read() local 79 if (sess != NULL && !TEST_true(SSL_set_session(clientquic, sess))) in test_quic_write_read() 162 if (sess == NULL) { in test_quic_write_read() 167 sess = SSL_get1_session(clientquic); in test_quic_write_read() 168 if (!TEST_ptr(sess)) in test_quic_write_read() 198 SSL_SESSION_free(sess); in test_quic_write_read() 1154 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument 1163 *sess = clientpsk; in use_session_cb() 1184 *sess = serverpsk; in find_session_cb() 2192 static int new_session_cb(SSL *ssl, SSL_SESSION *sess) in new_session_cb() argument [all …]
|
H A D | ssl_old_test.c | 841 SSL_SESSION *sess; in read_session() local 849 sess = PEM_read_bio_SSL_SESSION(f, NULL, 0, NULL); in read_session() 850 if (sess == NULL) { in read_session() 855 return sess; in read_session() 858 static int write_session(const char *filename, SSL_SESSION *sess) in write_session() argument 862 if (sess == NULL) { in write_session() 873 PEM_write_bio_SSL_SESSION(f, sess); in write_session()
|
/openssl/apps/ |
H A D | s_server.c | 207 *sess = NULL; in psk_find_session_cb() 242 *sess = tmpsess; in psk_find_session_cb() 3853 sess->der = app_malloc(sess->derlen, "get session buffer"); in add_session() 3854 if (!sess->id) { in add_session() 3861 p = sess->der; in add_session() 3873 first = sess; in add_session() 3883 for (sess = first; sess; sess = sess->next) { in get_session() 3901 for (sess = first; sess; sess = sess->next) { in del_session() 3902 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session() 3929 for (sess = first; sess;) { in free_sessions() [all …]
|
H A D | s_client.c | 205 SSL_SESSION **sess) in psk_use_session_cb() argument 250 *sess = NULL; in psk_use_session_cb() 253 *sess = usesess; in psk_use_session_cb() 812 static int new_session_cb(SSL *s, SSL_SESSION *sess) in new_session_cb() argument 821 PEM_write_bio_SSL_SESSION(stmp, sess); in new_session_cb() 833 SSL_SESSION_print(bio_c_out, sess); in new_session_cb() 2089 SSL_SESSION *sess; in s_client_main() local 2096 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); in s_client_main() 2098 if (sess == NULL) { in s_client_main() 2103 if (!SSL_set_session(con, sess)) { in s_client_main() [all …]
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 1020 *sess = tmpsess; in tls_get_stateful_ticket() 1030 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1070 if (sess == NULL in tls_parse_ctos_psk() 1104 if (sess == NULL in tls_parse_ctos_psk() 1119 if (sess != NULL) { in tls_parse_ctos_psk() 1128 sess = sesstmp; in tls_parse_ctos_psk() 1176 sess = NULL; in tls_parse_ctos_psk() 1218 sess = NULL; in tls_parse_ctos_psk() 1226 if (sess == NULL) in tls_parse_ctos_psk() 1260 s->session = sess; in tls_parse_ctos_psk() [all …]
|
H A D | extensions.c | 1540 unsigned char *binderout, SSL_SESSION *sess, int sign, in tls_psk_do_binder() argument 1569 && sess->ext.max_early_data > 0) in tls_psk_do_binder() 1591 early_secret = (unsigned char *)sess->early_secret; in tls_psk_do_binder() 1593 if (!tls13_generate_secret(s, md, NULL, sess->master_key, in tls_psk_do_binder() 1594 sess->master_key_length, early_secret)) { in tls_psk_do_binder()
|
/openssl/ssl/ |
H A D | ssl_sess.c | 75 SSL_SESSION *sess; in SSL_get1_session() local 84 sess = SSL_get_session(ssl); in SSL_get1_session() 85 if (sess != NULL) in SSL_get1_session() 86 SSL_SESSION_up_ref(sess); in SSL_get1_session() 88 return sess; in SSL_get1_session() 282 SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); in ssl_session_dup() local 284 if (sess != NULL) in ssl_session_dup() 285 sess->not_resumable = 0; in ssl_session_dup() 287 return sess; in ssl_session_dup() 1350 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx)) (SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb() [all …]
|
H A D | t1_lib.c | 2373 SSL_SESSION *sess = NULL; in tls_decrypt_ticket() local 2536 if (sess) { in tls_decrypt_ticket() 2539 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2540 sess = NULL; in tls_decrypt_ticket() 2551 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket() 2552 sess->session_id_length = sesslen; in tls_decrypt_ticket() 2596 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2597 sess = NULL; in tls_decrypt_ticket() 2604 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2605 sess = NULL; in tls_decrypt_ticket() [all …]
|
/openssl/demos/guide/ |
H A D | quic-hq-interop.c | 366 static int cache_new_session(struct ssl_st *ssl, SSL_SESSION *sess) in cache_new_session() argument 373 if (!PEM_write_bio_SSL_SESSION(session_bio, sess)) in cache_new_session() 402 SSL_SESSION *sess = NULL; in setup_session_cache() local 431 if (PEM_read_bio_SSL_SESSION(session_bio, &sess, NULL, NULL)) { in setup_session_cache() 433 if (!SSL_set_session(ssl, sess)) in setup_session_cache()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_sess_set_get_cb.pod | 22 SSL_SESSION *sess); 24 SSL_SESSION *sess); 60 ssl session B<sess>. 87 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 22 SSL_SESSION **sess); 49 in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key, 55 callback should return successfully and ensure that B<*sess> is
|
H A D | SSL_CTX_set_psk_client_callback.pod | 20 SSL_SESSION **sess); 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 98 this the callback should return successfully and ensure that B<*sess> is
|
H A D | SSL_get_client_random.pod | 19 int SSL_SESSION_set1_master_key(SSL_SESSION *sess, const unsigned char *in, 40 SSL_SESSION B<sess>. For example, this could be used to set up a session based
|
/openssl/test/helpers/ |
H A D | ssltestlib.c | 1389 SSL_SESSION *sess = NULL; in create_a_psk() local 1403 sess = SSL_SESSION_new(); in create_a_psk() 1404 if (!TEST_ptr(sess) in create_a_psk() 1406 || !TEST_true(SSL_SESSION_set1_master_key(sess, key, mdsize)) in create_a_psk() 1407 || !TEST_true(SSL_SESSION_set_cipher(sess, cipher)) in create_a_psk() 1409 SSL_SESSION_set_protocol_version(sess, in create_a_psk() 1411 SSL_SESSION_free(sess); in create_a_psk() 1414 return sess; in create_a_psk()
|
H A D | handshake.c | 1435 SSL_SESSION* sess = NULL; in do_handshake_internal() local 1650 if ((sess = SSL_get0_session(client.ssl)) != NULL) { in do_handshake_internal() 1651 SSL_SESSION_get0_ticket(sess, &tick, &tick_len); in do_handshake_internal() 1652 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1685 if ((sess = SSL_get0_session(server.ssl)) != NULL) { in do_handshake_internal() 1686 SSL_SESSION_get0_ticket_appdata(sess, (void**)&tick, &tick_len); in do_handshake_internal()
|
/openssl/ssl/record/ |
H A D | rec_layer_s3.c | 120 SSL_SESSION *sess = s->session; in ossl_get_max_early_data() local 127 if (!s->server && sess->ext.max_early_data == 0) { in ossl_get_max_early_data() 133 sess = s->psksession; in ossl_get_max_early_data() 137 max_early_data = sess->ext.max_early_data; in ossl_get_max_early_data() 141 max_early_data = s->recv_max_early_data < sess->ext.max_early_data in ossl_get_max_early_data() 142 ? s->recv_max_early_data : sess->ext.max_early_data; in ossl_get_max_early_data()
|
/openssl/ |
H A D | NOTES-WINDOWS.md | 249 DWORD sess; 251 if (ProcessIdToSessionId(GetCurrentProcessId(), &sess)) 252 return sess == 0;
|
/openssl/include/crypto/ |
H A D | modes.h | 211 } sess; member
|