Searched refs:session_id (Results 1 – 12 of 12) sorted by relevance
/ssl/ |
A D | ssl_session.cc | 55 if (session_id.size() < sizeof(tmp_storage)) { in ssl_hash_session_id() 57 OPENSSL_memcpy(tmp_storage, session_id.data(), session_id.size()); in ssl_hash_session_id() 58 session_id = tmp_storage; in ssl_hash_session_id() 61 uint32_t hash = ((uint32_t)session_id[0]) | ((uint32_t)session_id[1] << 8) | in ssl_hash_session_id() 63 ((uint32_t)session_id[3] << 24); in ssl_hash_session_id() 125 new_session->session_id = session->session_id; in SSL_SESSION_dup() 455 if (!session->session_id.empty()) { in ssl_session_get_type() 516 Span<const uint8_t> session_id) { in ssl_lookup_session() argument 520 if (session_id.empty() || session_id.size() > SSL_MAX_SSL_SESSION_ID_LENGTH) { in ssl_lookup_session() 847 *out_len = session->session_id.size(); in SSL_SESSION_get_id() [all …]
|
A D | handshake_client.cc | 198 !CBB_add_bytes(&child, hs->session_id.data(), hs->session_id.size())) { in ssl_write_client_hello_without_extensions() 417 hs->session_id = ssl->session->session_id; in do_start_connect() 421 hs->session_id.ResizeForOverwrite(SSL_MAX_SSL_SESSION_ID_LENGTH); in do_start_connect() 422 if (!RAND_bytes(hs->session_id.data(), hs->session_id.size())) { in do_start_connect() 549 !CBS_get_u8_length_prefixed(&body, &out->session_id) || in ssl_parse_server_hello() 550 CBS_len(&out->session_id) > SSL3_SESSION_ID_SIZE || in ssl_parse_server_hello() 717 if (!hs->session_id.empty() && in do_read_server_hello() 718 Span<const uint8_t>(server_hello.session_id) == hs->session_id) { in do_read_server_hello() 762 hs->new_session->session_id.CopyFrom(server_hello.session_id); in do_read_server_hello() 1736 hs->new_session->session_id.ResizeForOverwrite(SHA256_DIGEST_LENGTH); in do_read_session_ticket() [all …]
|
A D | tls13_server.cc | 329 hs->session_id.CopyFrom( in do_select_parameters() 330 Span(client_hello.session_id, client_hello.session_id_len)); in do_select_parameters() 725 CBB body, session_id, extensions; in do_send_hello_retry_request() local 730 !CBB_add_u8_length_prefixed(&body, &session_id) || in do_send_hello_retry_request() 731 !CBB_add_bytes(&session_id, hs->session_id.data(), in do_send_hello_retry_request() 732 hs->session_id.size()) || in do_send_hello_retry_request() 926 CBB body, extensions, session_id; in do_send_server_hello() local 932 !CBB_add_u8_length_prefixed(&body, &session_id) || in do_send_server_hello() 933 !CBB_add_bytes(&session_id, hs->session_id.data(), in do_send_server_hello() 934 hs->session_id.size()) || in do_send_server_hello()
|
A D | ssl_asn1.cc | 156 !CBB_add_asn1_octet_string(&session, in->session_id.data(), in SSL_SESSION_to_bytes_full() 157 for_ticket ? 0 : in->session_id.size()) || in SSL_SESSION_to_bytes_full() 500 CBS session_id, secret, child; in SSL_SESSION_parse() local 502 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse() 503 !ret->session_id.TryCopyFrom(session_id) || in SSL_SESSION_parse()
|
A D | handshake_server.cc | 768 hs->session_id.CopyFrom( in do_select_parameters() 769 Span(client_hello.session_id, client_hello.session_id_len)); in do_select_parameters() 813 hs->new_session->session_id.ResizeForOverwrite( in do_select_parameters() 815 RAND_bytes(hs->new_session->session_id.data(), in do_select_parameters() 816 hs->new_session->session_id.size()); in do_select_parameters() 937 Span<const uint8_t> session_id; in do_send_server_hello() local 940 session_id = hs->session_id; in do_send_server_hello() 942 session_id = hs->new_session->session_id; in do_send_server_hello() 951 !CBB_add_bytes(&session_id_bytes, session_id.data(), session_id.size()) || in do_send_server_hello()
|
A D | tls13_client.cc | 121 SSL_is_dtls(hs->ssl) ? Span<const uint8_t>() : Span(hs->session_id); in parse_server_hello_tls13() 126 Span<const uint8_t>(out->session_id) != expected_session_id || in parse_server_hello_tls13() 1230 session->session_id.ResizeForOverwrite(SHA256_DIGEST_LENGTH); in tls13_create_session_with_ticket() 1231 SHA256(CBS_data(&ticket), CBS_len(&ticket), session->session_id.data()); in tls13_create_session_with_ticket()
|
A D | extensions.cc | 118 CBS random, session_id; in ssl_parse_client_hello_with_trailing_data() local 121 !CBS_get_u8_length_prefixed(cbs, &session_id) || in ssl_parse_client_hello_with_trailing_data() 122 CBS_len(&session_id) > SSL_MAX_SSL_SESSION_ID_LENGTH) { in ssl_parse_client_hello_with_trailing_data() 129 out->session_id = CBS_data(&session_id); in ssl_parse_client_hello_with_trailing_data() 130 out->session_id_len = CBS_len(&session_id); in ssl_parse_client_hello_with_trailing_data() 4407 Span<const uint8_t> session_id) { in ssl_process_ticket() argument 4413 session_id.size() > SSL_MAX_SSL_SESSION_ID_LENGTH) { in ssl_process_ticket() 4495 session->session_id.ResizeForOverwrite(SHA256_DIGEST_LENGTH); in ssl_process_ticket() 4496 SHA256(ticket.data(), ticket.size(), session->session_id.data()); in ssl_process_ticket()
|
A D | s3_both.cc | 292 CBS cipher_specs, session_id, challenge; in read_v2_client_hello() local 299 !CBS_get_bytes(&v2_client_hello, &session_id, session_id_length) || in read_v2_client_hello()
|
A D | encrypted_client_hello.cc | 68 !CBB_add_bytes(&cbb, client_hello->session_id, in ssl_client_hello_write_without_extensions() 162 client_hello_inner.session_id = client_hello_outer->session_id; in ssl_decode_client_hello_inner()
|
A D | internal.h | 2036 InplaceVector<uint8_t, SSL_MAX_SSL_SESSION_ID_LENGTH> session_id; member 2171 CBS session_id; member 3395 uint32_t ssl_hash_session_id(Span<const uint8_t> session_id); 3635 Span<const uint8_t> session_id); 4123 bssl::InplaceVector<uint8_t, SSL_MAX_SSL_SESSION_ID_LENGTH> session_id; member
|
A D | ssl_lib.cc | 381 return ssl_hash_session_id(sess->session_id); in ssl_session_hash() 385 return Span(a->session_id) == b->session_id ? 0 : 1; in ssl_session_cmp()
|
A D | ssl_test.cc | 10407 session->session_id.Resize(32); in TEST() 10608 EXPECT_EQ(Bytes(client_hello.session_id, client_hello.session_id_len), in TEST()
|
Completed in 88 milliseconds