/openssl/ssl/ |
H A D | ssl_sess.c | 49 ss->calc_timeout = ossl_time_add(ss->time, ss->timeout); in ssl_session_calculate_timeout() 103 SSL_SESSION *ss; in SSL_SESSION_new() local 108 ss = OPENSSL_zalloc(sizeof(*ss)); in SSL_SESSION_new() 109 if (ss == NULL) in SSL_SESSION_new() 128 return ss; in SSL_SESSION_new() 408 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 482 s->session = ss; in ssl_get_new_session() 844 if (ss == NULL) in SSL_SESSION_free() 854 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); in SSL_SESSION_free() 855 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free() [all …]
|
H A D | ssl_local.h | 2498 __owur int ssl_generate_session_id(SSL_CONNECTION *s, SSL_SESSION *ss); 2976 void ssl_session_calculate_timeout(SSL_SESSION *ss);
|
/openssl/crypto/x509/ |
H A D | v3_akid.c | 110 int same_issuer, ss; in v2i_AUTHORITY_KEYID() local 162 ss = X509_check_private_key(ctx->subject_cert, ctx->issuer_pkey); in v2i_AUTHORITY_KEYID() 164 ss = same_issuer; in v2i_AUTHORITY_KEYID() 168 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID() 175 && !(same_issuer && !ss)) { in v2i_AUTHORITY_KEYID() 196 if (issuer == 2 || (issuer == 1 && !ss && ikeyid == NULL)) { in v2i_AUTHORITY_KEYID()
|
H A D | by_dir.c | 170 const char *s, *ss, *p; in add_cert_dir() local 183 ss = s; in add_cert_dir() 185 len = p - ss; in add_cert_dir() 190 if (strlen(ent->dir) == len && strncmp(ent->dir, ss, len) == 0) in add_cert_dir() 207 ent->dir = OPENSSL_strndup(ss, len); in add_cert_dir()
|
/openssl/doc/man3/ |
H A D | OSSL_ESS_check_signing_certs.pod | 22 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss, 41 the certificates required by the identifiers given in I<ss> and/or I<ssv2>. 42 If I<require_signing_cert> is nonzero, I<ss> or I<ssv2> must not be NULL. 43 If both I<ss> and I<ssv2> are not NULL, they are evaluated independently. 44 The list of certificate identifiers in I<ss> is of type B<ESS_CERT_ID>,
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 16 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss, 25 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len); 26 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len); 43 available. If ticket decryption was successful then the B<ss> argument contains 51 B<data> and B<len> into B<ss> which is then placed into any generated session 59 application data from B<ss>. The application data can be set via 68 When the B<dec_cb> callback is invoked, the SSL_SESSION B<ss> has not yet been 147 no session data will be available and the callback must not use the B<ss> 150 SSL_SESSION_get0_ticket_appdata() using the session provided in the B<ss>
|
H A D | SSL_get0_peer_rpk.pod | 19 EVP_PKEY *SSL_SESSION_get0_peer_rpk(const SSL_SESSION *ss); 35 SSL_SESSION B<ss>.
|
/openssl/crypto/ess/ |
H A D | ess_lib.c | 339 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss, in OSSL_ESS_check_signing_certs() argument 344 int n_v1 = ss == NULL ? -1 : sk_ESS_CERT_ID_num(ss->cert_ids); in OSSL_ESS_check_signing_certs() 348 if (require_signing_cert && ss == NULL && ssv2 == NULL) { in OSSL_ESS_check_signing_certs() 358 ret = find(sk_ESS_CERT_ID_value(ss->cert_ids, i), NULL, i, chain); in OSSL_ESS_check_signing_certs()
|
/openssl/crypto/cms/ |
H A D | cms_ess.c | 105 ESS_SIGNING_CERT *ss = NULL; in ossl_cms_check_signing_certs() local 107 int ret = ossl_cms_signerinfo_get_signing_cert(si, &ss) >= 0 in ossl_cms_check_signing_certs() 109 && OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ossl_cms_check_signing_certs() 111 ESS_SIGNING_CERT_free(ss); in ossl_cms_check_signing_certs()
|
/openssl/crypto/ |
H A D | param_build.c | 368 const size_t ss = OSSL_PARAM_ALIGN_SIZE * bld->secure_blocks; in OSSL_PARAM_BLD_to_param() local 370 if (ss > 0) { in OSSL_PARAM_BLD_to_param() 371 s = OPENSSL_secure_malloc(ss); in OSSL_PARAM_BLD_to_param() 384 ossl_param_set_secure_block(last, s, ss); in OSSL_PARAM_BLD_to_param()
|
/openssl/crypto/conf/ |
H A D | conf_def.c | 354 char *ss; in def_load_bio() local 358 ss = start; in def_load_bio() 360 end = eat_alpha_numeric(conf, ss); in def_load_bio() 363 if (*p != '\0' && ss != p) { in def_load_bio() 364 ss = p; in def_load_bio()
|
/openssl/test/recipes/ |
H A D | 25-test_req.t | 444 my $ss = $cert =~ m/self-signed/; 451 push(@cmd, ("-key", $key)) if $ss; 452 push(@cmd, ("-CA", $ca_cert, "-CAkey", $ca_key)) unless $ss;
|
/openssl/ssl/statem/ |
H A D | extensions.c | 1050 SSL_SESSION* ss = SSL_get_session(ssl); in final_server_name() local 1052 if (ss != NULL) { in final_server_name() 1053 OPENSSL_free(ss->ext.tick); in final_server_name() 1054 ss->ext.tick = NULL; in final_server_name() 1055 ss->ext.ticklen = 0; in final_server_name() 1056 ss->ext.tick_lifetime_hint = 0; in final_server_name() 1057 ss->ext.tick_age_add = 0; in final_server_name() 1058 if (!ssl_generate_session_id(s, ss)) { in final_server_name()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 234 ESS_SIGNING_CERT *ss = ossl_ess_get_signing_cert(si); in ts_check_signing_certs() local 236 int ret = OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ts_check_signing_certs() 238 ESS_SIGNING_CERT_free(ss); in ts_check_signing_certs()
|
/openssl/include/openssl/ |
H A D | ess.h.in | 73 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss,
|
H A D | ssl.h.in | 2154 __owur int SSL_SESSION_set_ex_data(SSL_SESSION *ss, int idx, void *data); 2155 void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss, int idx); 2769 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss, 2778 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len); 2779 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len);
|
/openssl/crypto/cmp/ |
H A D | cmp_client.c | 91 OSSL_CMP_PKIFREETEXT *ss; in save_statusInfo() local 106 ss = si->statusString; /* may be NULL */ in save_statusInfo() 107 for (i = 0; i < sk_ASN1_UTF8STRING_num(ss); i++) { in save_statusInfo() 108 ASN1_UTF8STRING *str = sk_ASN1_UTF8STRING_value(ss, i); in save_statusInfo()
|
/openssl/test/helpers/ |
H A D | handshake.c | 458 SSL_SESSION *ss = SSL_get_session(s); in generate_session_ticket_cb() local 461 if (ss == NULL || app_data == NULL) in generate_session_ticket_cb() 464 return SSL_SESSION_set1_ticket_appdata(ss, app_data, strlen(app_data)); in generate_session_ticket_cb() 467 static int decrypt_session_ticket_cb(SSL *s, SSL_SESSION *ss, in decrypt_session_ticket_cb() argument
|
/openssl/test/ |
H A D | tls-provider.c | 565 unsigned char *ss, size_t *sslen) in xor_encapsulate() argument 580 if (ct == NULL || ss == NULL) { in xor_encapsulate() 609 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_encapsulate() 622 unsigned char *ss, size_t *sslen, in xor_decapsulate() argument 636 if (ss == NULL) { in xor_decapsulate() 656 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_decapsulate()
|
H A D | sslapitest.c | 8219 static SSL_TICKET_RETURN dec_tick_cb(SSL *s, SSL_SESSION *ss, in dec_tick_cb() argument 8237 if (!TEST_true(SSL_SESSION_get0_ticket_appdata(ss, &tickdata, in dec_tick_cb()
|
/openssl/crypto/bio/ |
H A D | bss_dgram.c | 563 struct sockaddr_storage ss; in dgram_ctrl() local 564 socklen_t ss_len = sizeof(ss); in dgram_ctrl() 582 if (getpeername(b->num, (struct sockaddr *)&ss, &ss_len) == 0) { in dgram_ctrl() 583 BIO_ADDR_make(&data->peer, BIO_ADDR_sockaddr((BIO_ADDR *)&ss)); in dgram_ctrl()
|
/openssl/util/ |
H A D | indent.pro | 34 -ss
|
/openssl/ |
H A D | CHANGES.md | 18534 openssl verify ss.pem 18536 openssl verify -CAfile ss.pem ss.pem
|