/ssl/ |
A D | ssl_session.cc | 196 if (session->timeout > session->auth_timeout) { in ssl_session_renew_timeout() 197 session->timeout = session->auth_timeout; in ssl_session_renew_timeout() 479 return session->timeout > now.tv_sec - session->time; in ssl_session_is_time_valid() 659 if (ssl->session.get() == session) { in ssl_set_session() 663 ssl->session = UpRef(session); in ssl_set_session() 668 if (session->next == NULL || session->prev == NULL) { in SSL_SESSION_list_remove() 688 session->next->prev = session->prev; in SSL_SESSION_list_remove() 689 session->prev->next = session->next; in SSL_SESSION_list_remove() 692 session->prev = session->next = NULL; in SSL_SESSION_list_remove() 707 session->next->prev = session; in SSL_SESSION_list_add() [all …]
|
A D | ssl_asn1.cc | 149 CBB session, child, child2; in SSL_SESSION_to_bytes_full() local 151 !CBB_add_asn1_uint64(&session, kVersion) || in SSL_SESSION_to_bytes_full() 160 !CBB_add_asn1(&session, &child, kTimeTag) || in SSL_SESSION_to_bytes_full() 162 !CBB_add_asn1(&session, &child, kTimeoutTag) || in SSL_SESSION_to_bytes_full() 209 if (!CBB_add_asn1(&session, &child, kTicketTag) || in SSL_SESSION_to_bytes_full() 468 CBS session; in SSL_SESSION_parse() local 506 !CBS_get_asn1(&session, &child, kTimeTag) || in SSL_SESSION_parse() 508 !CBS_get_asn1(&session, &child, kTimeoutTag) || in SSL_SESSION_parse() 551 if (CBS_peek_asn1_tag(&session, kPeerSHA256Tag)) { in SSL_SESSION_parse() 572 !SSL_SESSION_parse_crypto_buffer(&session, in SSL_SESSION_parse() [all …]
|
A D | tls13_enc.cc | 87 session->cipher) && in tls13_init_early_key_schedule() 181 const SSL_SESSION *session, in tls13_set_traffic_key() argument 184 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_set_traffic_key() 405 const SSL_SESSION *session = SSL_get_session(ssl); in tls13_rotate_traffic_key() local 406 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_rotate_traffic_key() 411 session, secret); in tls13_rotate_traffic_key() 463 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_derive_session_psk() 466 assert(session->secret.size() == EVP_MD_size(digest)); in tls13_derive_session_psk() 467 return hkdf_expand_label(Span(session->secret), digest, session->secret, in tls13_derive_session_psk() 509 const SSL_SESSION *session, in tls13_psk_binder() argument [all …]
|
A D | ssl_x509.cc | 192 X509_free(session->x509_peer); in ssl_crypto_x509_session_clear() 193 session->x509_peer = nullptr; in ssl_crypto_x509_session_clear() 195 session->x509_chain = nullptr; in ssl_crypto_x509_session_clear() 377 if (session == NULL || session->x509_peer == NULL) { in SSL_get_peer_certificate() 381 return session->x509_peer; in SSL_get_peer_certificate() 390 if (session == nullptr) { in STACK_OF() 396 return ssl->server ? session->x509_chain_without_leaf : session->x509_chain; in STACK_OF() 402 if (session == NULL) { in STACK_OF() 406 return session->x509_chain; in STACK_OF() 549 if (session == NULL) { in SSL_get_verify_result() [all …]
|
A D | tls13_server.cc | 173 UniquePtr<SSL_SESSION> session( in add_new_session_tickets() local 175 if (!session) { in add_new_session_tickets() 192 session->ticket_max_early_data = in add_new_session_tickets() 447 UniquePtr<SSL_SESSION> session; in select_session() local 462 !session->ticket_age_add_valid) { in select_session() 473 assert(now.tv_sec >= session->time); in select_session() 491 *out_session = std::move(session); in select_session() 497 if (!session->is_quic) { in quic_ticket_compatible() 521 UniquePtr<SSL_SESSION> session; in do_select_session() local 526 assert(!session); in do_select_session() [all …]
|
A D | t1_enc.cc | 74 const SSL_SESSION *session) { in generate_key_block() argument 75 const EVP_MD *digest = ssl_session_get_digest(session); in generate_key_block() 78 return tls1_prf(digest, out, session->secret, "key expansion", in generate_key_block() 84 const SSL_SESSION *session, in tls1_configure_aead() argument 88 session->cipher)) { in tls1_configure_aead() 96 !generate_key_block(ssl, Span(*key_block_cache), session)) { in tls1_configure_aead() 124 direction, ssl->s3->version, session->cipher, key, mac_secret, iv); in tls1_configure_aead() 252 const SSL_SESSION *session = SSL_get_session(ssl); in SSL_export_keying_material() local 253 const EVP_MD *digest = ssl_session_get_digest(session); in SSL_export_keying_material() 254 return tls1_prf(digest, out_span, session->secret, label_sv, seed, {}); in SSL_export_keying_material()
|
A D | tls13_client.cc | 425 ssl->session != nullptr && in do_read_server_hello() 1142 if (!session) { in tls13_process_new_session_ticket() 1150 session.release(); in tls13_process_new_session_ticket() 1159 if (!session) { in tls13_create_session_with_ticket() 1163 ssl_session_rebase_time(ssl, session.get()); in tls13_create_session_with_ticket() 1172 !session->ticket.CopyFrom(ticket) || in tls13_create_session_with_ticket() 1182 if (session->timeout > server_timeout) { in tls13_create_session_with_ticket() 1183 session->timeout = server_timeout; in tls13_create_session_with_ticket() 1233 session->ticket_age_add_valid = true; in tls13_create_session_with_ticket() 1234 session->not_resumable = false; in tls13_create_session_with_ticket() [all …]
|
A D | handshake_client.cc | 304 if (ssl->session == nullptr) { in should_offer_early_data() 313 if (!ssl->session->early_alpn.empty()) { in should_offer_early_data() 379 if (ssl->session != nullptr) { in do_start_connect() 381 if (ssl->session->is_server || in do_start_connect() 777 if (ssl->session != NULL || in do_read_server_hello() 794 if (ssl->session != NULL && in do_read_server_hello() 807 if (ssl->session != NULL) { in do_read_server_hello() 1650 if (ssl->session != NULL) { in do_finish_flight() 1714 if (ssl->session != nullptr) { in do_read_session_ticket() 1761 if (ssl->session != NULL) { in do_read_server_finished() [all …]
|
A D | handshake_server.cc | 780 if (session) { in do_select_parameters() 793 session.reset(); in do_select_parameters() 797 if (session) { in do_select_parameters() 800 ssl->session = std::move(session); in do_select_parameters() 828 if (ssl->session == NULL) { in do_select_parameters() 896 if (ssl->session != nullptr && in do_send_server_hello() 938 if (ssl->session != nullptr) { in do_send_server_hello() 1652 if (ssl->session != NULL) { in do_read_client_finished() 1673 const SSL_SESSION *session; in do_send_server_finished() local 1675 if (ssl->session == NULL) { in do_send_server_finished() [all …]
|
A D | handoff.cc | 346 const SSL_SESSION *session; in SSL_serialize_handback() local 348 session = hs->new_session.get(); in SSL_serialize_handback() 350 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 449 if (session->has_application_settings) { in SSL_serialize_handback() 485 SSL_SESSION *session = nullptr; in SSL_apply_handback() local 524 session = hs->new_session.get(); in SSL_apply_handback() 526 ssl->session = in SSL_apply_handback() 528 session = ssl->session.get(); in SSL_apply_handback() 579 if (session->has_application_settings) { in SSL_apply_handback() 638 ssl->s3->version = session->ssl_version; in SSL_apply_handback() [all …]
|
A D | ssl_test.cc | 1154 return session; in CreateSessionWithTicket() 3682 config.session = session; in ExpectSessionReused() 3700 config.session = session; in ExpectSessionRenewed() 4726 config.session = session.get(); in TEST_P() 6581 config.session = session; in TEST_P() 6693 config.session = session; in TEST_P() 6772 config.session = session.get(); in TEST_P() 8361 config.session = session.get(); in TEST_P() 8399 config.session = session.get(); in TEST_P() 8429 config.session = session.get(); in TEST_P() [all …]
|
A D | ssl_lib.cc | 1924 if (session == NULL) { in SSL_get_group_id() 1928 return session->group_id; in SSL_get_group_id() 2084 if (ssl->server || !session || !session->signed_cert_timestamp_list) { in SSL_get0_signed_cert_timestamp_list() 2097 if (ssl->server || !session || !session->ocsp_response) { in SSL_get0_ocsp_response() 2281 session ? session->peer_application_settings : Span<const uint8_t>(); in SSL_get0_peer_application_settings() 2288 return session && session->has_application_settings; in SSL_has_application_settings() 2411 return session == nullptr ? nullptr : session->cipher; in SSL_get_current_cipher() 2643 if (session == NULL) { in SSL_get_psk_identity() 2938 if (session == NULL) { in SSL_get_peer_signature_algorithm() 3065 if (session != nullptr) { in SSL_clear() [all …]
|
A D | ssl_versions.cc | 416 const char *SSL_SESSION_get_version(const SSL_SESSION *session) { in SSL_SESSION_get_version() argument 417 return ssl_version_to_string(session->ssl_version); in SSL_SESSION_get_version() 420 uint16_t SSL_SESSION_get_protocol_version(const SSL_SESSION *session) { in SSL_SESSION_get_protocol_version() argument 421 return wire_version_to_api(session->ssl_version); in SSL_SESSION_get_protocol_version() 424 int SSL_SESSION_set_protocol_version(SSL_SESSION *session, uint16_t version) { in SSL_SESSION_set_protocol_version() argument 427 return api_version_to_wire(&session->ssl_version, version); in SSL_SESSION_set_protocol_version()
|
A D | internal.h | 1193 const SSL_SESSION *session); 1204 const SSL_SESSION *session, 2563 bool (*session_cache_objects)(SSL_SESSION *session); 2568 void (*session_clear)(SSL_SESSION *session); 3385 const SSL_SESSION *session); 3424 const SSL_SESSION *session); 3432 const SSL_SESSION *session); 3442 void ssl_set_session(SSL *ssl, SSL_SESSION *session); 3471 void ssl_session_rebase_time(SSL *ssl, SSL_SESSION *session); 3575 const SSL_SESSION *session, [all …]
|
A D | tls_method.cc | 151 const SSL_SESSION *session) { in ssl_noop_x509_session_dup() argument 154 static void ssl_noop_x509_session_clear(SSL_SESSION *session) {} in ssl_noop_x509_session_clear() argument 155 static bool ssl_noop_x509_session_verify_cert_chain(SSL_SESSION *session, in ssl_noop_x509_session_verify_cert_chain() argument
|
A D | extensions.cc | 933 ssl->session != nullptr && in ext_ticket_add_clienthello() 935 ticket = ssl->session->ticket; in ext_ticket_add_clienthello() 1874 ssl_session_get_type(ssl->session.get()) != in should_offer_psk() 1903 return 15 + ssl->session->ticket.size() + binder_len; in ext_pre_shared_key_clienthello_length() 1929 ssl->session->ticket.size()) || in ext_pre_shared_key_add_clienthello() 4485 UniquePtr<SSL_SESSION> session(SSL_SESSION_from_bytes( in ssl_process_ticket() local 4487 if (!session) { in ssl_process_ticket() 4498 *out_session = std::move(session); in ssl_process_ticket() 4703 if (ssl->session != NULL) { in tls1_channel_id_hash() 4706 if (ssl->session->original_handshake_hash.empty()) { in tls1_channel_id_hash() [all …]
|
A D | ssl_transcript.cc | 205 const SSL_SESSION *session, in GetFinishedMAC() argument 215 if (!tls1_prf(Digest(), Span(out, kFinishedLen), session->secret, label, in GetFinishedMAC()
|
A D | handshake.cc | 427 const SSL_SESSION *session = ssl_handshake_session(hs); in ssl_send_finished() local 431 if (!hs->transcript.GetFinishedMAC(finished_buf, &finished_len, session, in ssl_send_finished() 438 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->secret)) { in ssl_send_finished() 492 return hs->ssl->session.get(); in ssl_handshake_session()
|
/ssl/test/runner/ |
A D | shim_ticket.go | 186 tag, session, _, ok := parseDERElement(plaintext) 192 tag, _, session, ok = parseDERElement(session) 198 tag, version, _, ok := parseDERElement(session) 222 tag, session, _, ok := parseDERElement(plaintext) 228 tag, _, session, ok = parseDERElement(session) 234 tag, _, session, ok = parseDERElement(session) 240 tag, cipherSuite, _, ok := parseDERElement(session)
|
A D | handshake_client.go | 41 session *ClientSessionState member 112 var session *ClientSessionState 143 session = candidateSession 144 hs.session = session 246 finishedHash := newFinishedHash(session.wireVersion, c.isDTLS, session.cipherSuite) 419 if sessionCache != nil && hs.session != nil && session != hs.session { 760 session := hs.session 764 session = nil 767 if session != nil && c.config.time().Before(session.ticketExpiration) { 2287 hs.session = session [all …]
|
A D | common.go | 398 Get(sessionKey string) (session *ClientSessionState, ok bool) 411 Get(sessionID string) (session *sessionState, ok bool) 414 Put(sessionID string, session *sessionState) 2526 func (c *lruServerSessionCache) Put(sessionID string, session *sessionState) { 2527 c.lruSessionCache.Put(sessionID, session)
|
/ssl/test/ |
A D | test_state.cc | 70 static void ssl_ctx_add_session(SSL_SESSION *session, void *void_param) { in ssl_ctx_add_session() argument 73 session, SSL_SESSION_INCLUDE_NONAUTH | SSL_SESSION_INCLUDE_TICKET); in ssl_ctx_add_session() 83 static void push_session(SSL_SESSION *session, void *arg) { in push_session() argument 85 s->push_back(session); in push_session() 123 UniquePtr<SSL_SESSION> session = in DeserializeContextState() local 125 if (!session) { in DeserializeContextState() 128 SSL_CTX_add_session(ctx, session.get()); in DeserializeContextState()
|
A D | settings_writer.cc | 28 SSL_SESSION *session) { in Init() argument 41 if (session != nullptr) { in Init() 44 if (!SSL_SESSION_to_bytes(session, &data, &len)) { in Init()
|
A D | fuzzer.h | 538 bssl::UniquePtr<SSL_SESSION> session(SSL_SESSION_from_bytes( in SetupTest() 540 if (!session) { in SetupTest() 545 SSL_CTX_add_session(ctx_.get(), session.get()); in SetupTest() 547 SSL_set_session(ssl.get(), session.get()); in SetupTest()
|
A D | bssl_shim.cc | 780 SSL_SESSION *session, SettingsWriter *writer) { in DoConnection() argument 782 config->NewSSL(ssl_ctx, session, std::make_unique<TestState>()); in DoConnection() 1423 bssl::UniquePtr<SSL_SESSION> session; in main() local 1433 if (is_resume && !initial_config.is_server && !session) { in main() 1438 bssl::UniquePtr<SSL_SESSION> offer_session = std::move(session); in main() 1444 bool ok = DoConnection(&session, ssl_ctx.get(), config, &retry_config, in main()
|