Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 32) sorted by relevance

12

/ssl/
A Dssl_session.cc196 if (session->timeout > session->auth_timeout) { in ssl_session_renew_timeout()
197 session->timeout = session->auth_timeout; in ssl_session_renew_timeout()
479 return session->timeout > now.tv_sec - session->time; in ssl_session_is_time_valid()
659 if (ssl->session.get() == session) { in ssl_set_session()
663 ssl->session = UpRef(session); in ssl_set_session()
668 if (session->next == NULL || session->prev == NULL) { in SSL_SESSION_list_remove()
688 session->next->prev = session->prev; in SSL_SESSION_list_remove()
689 session->prev->next = session->next; in SSL_SESSION_list_remove()
692 session->prev = session->next = NULL; in SSL_SESSION_list_remove()
707 session->next->prev = session; in SSL_SESSION_list_add()
[all …]
A Dssl_asn1.cc149 CBB session, child, child2; in SSL_SESSION_to_bytes_full() local
151 !CBB_add_asn1_uint64(&session, kVersion) || in SSL_SESSION_to_bytes_full()
160 !CBB_add_asn1(&session, &child, kTimeTag) || in SSL_SESSION_to_bytes_full()
162 !CBB_add_asn1(&session, &child, kTimeoutTag) || in SSL_SESSION_to_bytes_full()
209 if (!CBB_add_asn1(&session, &child, kTicketTag) || in SSL_SESSION_to_bytes_full()
468 CBS session; in SSL_SESSION_parse() local
506 !CBS_get_asn1(&session, &child, kTimeTag) || in SSL_SESSION_parse()
508 !CBS_get_asn1(&session, &child, kTimeoutTag) || in SSL_SESSION_parse()
551 if (CBS_peek_asn1_tag(&session, kPeerSHA256Tag)) { in SSL_SESSION_parse()
572 !SSL_SESSION_parse_crypto_buffer(&session, in SSL_SESSION_parse()
[all …]
A Dtls13_enc.cc87 session->cipher) && in tls13_init_early_key_schedule()
181 const SSL_SESSION *session, in tls13_set_traffic_key() argument
184 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_set_traffic_key()
405 const SSL_SESSION *session = SSL_get_session(ssl); in tls13_rotate_traffic_key() local
406 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_rotate_traffic_key()
411 session, secret); in tls13_rotate_traffic_key()
463 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_derive_session_psk()
466 assert(session->secret.size() == EVP_MD_size(digest)); in tls13_derive_session_psk()
467 return hkdf_expand_label(Span(session->secret), digest, session->secret, in tls13_derive_session_psk()
509 const SSL_SESSION *session, in tls13_psk_binder() argument
[all …]
A Dssl_x509.cc192 X509_free(session->x509_peer); in ssl_crypto_x509_session_clear()
193 session->x509_peer = nullptr; in ssl_crypto_x509_session_clear()
195 session->x509_chain = nullptr; in ssl_crypto_x509_session_clear()
377 if (session == NULL || session->x509_peer == NULL) { in SSL_get_peer_certificate()
381 return session->x509_peer; in SSL_get_peer_certificate()
390 if (session == nullptr) { in STACK_OF()
396 return ssl->server ? session->x509_chain_without_leaf : session->x509_chain; in STACK_OF()
402 if (session == NULL) { in STACK_OF()
406 return session->x509_chain; in STACK_OF()
549 if (session == NULL) { in SSL_get_verify_result()
[all …]
A Dtls13_server.cc173 UniquePtr<SSL_SESSION> session( in add_new_session_tickets() local
175 if (!session) { in add_new_session_tickets()
192 session->ticket_max_early_data = in add_new_session_tickets()
447 UniquePtr<SSL_SESSION> session; in select_session() local
462 !session->ticket_age_add_valid) { in select_session()
473 assert(now.tv_sec >= session->time); in select_session()
491 *out_session = std::move(session); in select_session()
497 if (!session->is_quic) { in quic_ticket_compatible()
521 UniquePtr<SSL_SESSION> session; in do_select_session() local
526 assert(!session); in do_select_session()
[all …]
A Dt1_enc.cc74 const SSL_SESSION *session) { in generate_key_block() argument
75 const EVP_MD *digest = ssl_session_get_digest(session); in generate_key_block()
78 return tls1_prf(digest, out, session->secret, "key expansion", in generate_key_block()
84 const SSL_SESSION *session, in tls1_configure_aead() argument
88 session->cipher)) { in tls1_configure_aead()
96 !generate_key_block(ssl, Span(*key_block_cache), session)) { in tls1_configure_aead()
124 direction, ssl->s3->version, session->cipher, key, mac_secret, iv); in tls1_configure_aead()
252 const SSL_SESSION *session = SSL_get_session(ssl); in SSL_export_keying_material() local
253 const EVP_MD *digest = ssl_session_get_digest(session); in SSL_export_keying_material()
254 return tls1_prf(digest, out_span, session->secret, label_sv, seed, {}); in SSL_export_keying_material()
A Dtls13_client.cc425 ssl->session != nullptr && in do_read_server_hello()
1142 if (!session) { in tls13_process_new_session_ticket()
1150 session.release(); in tls13_process_new_session_ticket()
1159 if (!session) { in tls13_create_session_with_ticket()
1163 ssl_session_rebase_time(ssl, session.get()); in tls13_create_session_with_ticket()
1172 !session->ticket.CopyFrom(ticket) || in tls13_create_session_with_ticket()
1182 if (session->timeout > server_timeout) { in tls13_create_session_with_ticket()
1183 session->timeout = server_timeout; in tls13_create_session_with_ticket()
1233 session->ticket_age_add_valid = true; in tls13_create_session_with_ticket()
1234 session->not_resumable = false; in tls13_create_session_with_ticket()
[all …]
A Dhandshake_client.cc304 if (ssl->session == nullptr) { in should_offer_early_data()
313 if (!ssl->session->early_alpn.empty()) { in should_offer_early_data()
379 if (ssl->session != nullptr) { in do_start_connect()
381 if (ssl->session->is_server || in do_start_connect()
777 if (ssl->session != NULL || in do_read_server_hello()
794 if (ssl->session != NULL && in do_read_server_hello()
807 if (ssl->session != NULL) { in do_read_server_hello()
1650 if (ssl->session != NULL) { in do_finish_flight()
1714 if (ssl->session != nullptr) { in do_read_session_ticket()
1761 if (ssl->session != NULL) { in do_read_server_finished()
[all …]
A Dhandshake_server.cc780 if (session) { in do_select_parameters()
793 session.reset(); in do_select_parameters()
797 if (session) { in do_select_parameters()
800 ssl->session = std::move(session); in do_select_parameters()
828 if (ssl->session == NULL) { in do_select_parameters()
896 if (ssl->session != nullptr && in do_send_server_hello()
938 if (ssl->session != nullptr) { in do_send_server_hello()
1652 if (ssl->session != NULL) { in do_read_client_finished()
1673 const SSL_SESSION *session; in do_send_server_finished() local
1675 if (ssl->session == NULL) { in do_send_server_finished()
[all …]
A Dhandoff.cc346 const SSL_SESSION *session; in SSL_serialize_handback() local
348 session = hs->new_session.get(); in SSL_serialize_handback()
350 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback()
449 if (session->has_application_settings) { in SSL_serialize_handback()
485 SSL_SESSION *session = nullptr; in SSL_apply_handback() local
524 session = hs->new_session.get(); in SSL_apply_handback()
526 ssl->session = in SSL_apply_handback()
528 session = ssl->session.get(); in SSL_apply_handback()
579 if (session->has_application_settings) { in SSL_apply_handback()
638 ssl->s3->version = session->ssl_version; in SSL_apply_handback()
[all …]
A Dssl_test.cc1154 return session; in CreateSessionWithTicket()
3682 config.session = session; in ExpectSessionReused()
3700 config.session = session; in ExpectSessionRenewed()
4726 config.session = session.get(); in TEST_P()
6581 config.session = session; in TEST_P()
6693 config.session = session; in TEST_P()
6772 config.session = session.get(); in TEST_P()
8361 config.session = session.get(); in TEST_P()
8399 config.session = session.get(); in TEST_P()
8429 config.session = session.get(); in TEST_P()
[all …]
A Dssl_lib.cc1924 if (session == NULL) { in SSL_get_group_id()
1928 return session->group_id; in SSL_get_group_id()
2084 if (ssl->server || !session || !session->signed_cert_timestamp_list) { in SSL_get0_signed_cert_timestamp_list()
2097 if (ssl->server || !session || !session->ocsp_response) { in SSL_get0_ocsp_response()
2281 session ? session->peer_application_settings : Span<const uint8_t>(); in SSL_get0_peer_application_settings()
2288 return session && session->has_application_settings; in SSL_has_application_settings()
2411 return session == nullptr ? nullptr : session->cipher; in SSL_get_current_cipher()
2643 if (session == NULL) { in SSL_get_psk_identity()
2938 if (session == NULL) { in SSL_get_peer_signature_algorithm()
3065 if (session != nullptr) { in SSL_clear()
[all …]
A Dssl_versions.cc416 const char *SSL_SESSION_get_version(const SSL_SESSION *session) { in SSL_SESSION_get_version() argument
417 return ssl_version_to_string(session->ssl_version); in SSL_SESSION_get_version()
420 uint16_t SSL_SESSION_get_protocol_version(const SSL_SESSION *session) { in SSL_SESSION_get_protocol_version() argument
421 return wire_version_to_api(session->ssl_version); in SSL_SESSION_get_protocol_version()
424 int SSL_SESSION_set_protocol_version(SSL_SESSION *session, uint16_t version) { in SSL_SESSION_set_protocol_version() argument
427 return api_version_to_wire(&session->ssl_version, version); in SSL_SESSION_set_protocol_version()
A Dinternal.h1193 const SSL_SESSION *session);
1204 const SSL_SESSION *session,
2563 bool (*session_cache_objects)(SSL_SESSION *session);
2568 void (*session_clear)(SSL_SESSION *session);
3385 const SSL_SESSION *session);
3424 const SSL_SESSION *session);
3432 const SSL_SESSION *session);
3442 void ssl_set_session(SSL *ssl, SSL_SESSION *session);
3471 void ssl_session_rebase_time(SSL *ssl, SSL_SESSION *session);
3575 const SSL_SESSION *session,
[all …]
A Dtls_method.cc151 const SSL_SESSION *session) { in ssl_noop_x509_session_dup() argument
154 static void ssl_noop_x509_session_clear(SSL_SESSION *session) {} in ssl_noop_x509_session_clear() argument
155 static bool ssl_noop_x509_session_verify_cert_chain(SSL_SESSION *session, in ssl_noop_x509_session_verify_cert_chain() argument
A Dextensions.cc933 ssl->session != nullptr && in ext_ticket_add_clienthello()
935 ticket = ssl->session->ticket; in ext_ticket_add_clienthello()
1874 ssl_session_get_type(ssl->session.get()) != in should_offer_psk()
1903 return 15 + ssl->session->ticket.size() + binder_len; in ext_pre_shared_key_clienthello_length()
1929 ssl->session->ticket.size()) || in ext_pre_shared_key_add_clienthello()
4485 UniquePtr<SSL_SESSION> session(SSL_SESSION_from_bytes( in ssl_process_ticket() local
4487 if (!session) { in ssl_process_ticket()
4498 *out_session = std::move(session); in ssl_process_ticket()
4703 if (ssl->session != NULL) { in tls1_channel_id_hash()
4706 if (ssl->session->original_handshake_hash.empty()) { in tls1_channel_id_hash()
[all …]
A Dssl_transcript.cc205 const SSL_SESSION *session, in GetFinishedMAC() argument
215 if (!tls1_prf(Digest(), Span(out, kFinishedLen), session->secret, label, in GetFinishedMAC()
A Dhandshake.cc427 const SSL_SESSION *session = ssl_handshake_session(hs); in ssl_send_finished() local
431 if (!hs->transcript.GetFinishedMAC(finished_buf, &finished_len, session, in ssl_send_finished()
438 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->secret)) { in ssl_send_finished()
492 return hs->ssl->session.get(); in ssl_handshake_session()
/ssl/test/runner/
A Dshim_ticket.go186 tag, session, _, ok := parseDERElement(plaintext)
192 tag, _, session, ok = parseDERElement(session)
198 tag, version, _, ok := parseDERElement(session)
222 tag, session, _, ok := parseDERElement(plaintext)
228 tag, _, session, ok = parseDERElement(session)
234 tag, _, session, ok = parseDERElement(session)
240 tag, cipherSuite, _, ok := parseDERElement(session)
A Dhandshake_client.go41 session *ClientSessionState member
112 var session *ClientSessionState
143 session = candidateSession
144 hs.session = session
246 finishedHash := newFinishedHash(session.wireVersion, c.isDTLS, session.cipherSuite)
419 if sessionCache != nil && hs.session != nil && session != hs.session {
760 session := hs.session
764 session = nil
767 if session != nil && c.config.time().Before(session.ticketExpiration) {
2287 hs.session = session
[all …]
A Dcommon.go398 Get(sessionKey string) (session *ClientSessionState, ok bool)
411 Get(sessionID string) (session *sessionState, ok bool)
414 Put(sessionID string, session *sessionState)
2526 func (c *lruServerSessionCache) Put(sessionID string, session *sessionState) {
2527 c.lruSessionCache.Put(sessionID, session)
/ssl/test/
A Dtest_state.cc70 static void ssl_ctx_add_session(SSL_SESSION *session, void *void_param) { in ssl_ctx_add_session() argument
73 session, SSL_SESSION_INCLUDE_NONAUTH | SSL_SESSION_INCLUDE_TICKET); in ssl_ctx_add_session()
83 static void push_session(SSL_SESSION *session, void *arg) { in push_session() argument
85 s->push_back(session); in push_session()
123 UniquePtr<SSL_SESSION> session = in DeserializeContextState() local
125 if (!session) { in DeserializeContextState()
128 SSL_CTX_add_session(ctx, session.get()); in DeserializeContextState()
A Dsettings_writer.cc28 SSL_SESSION *session) { in Init() argument
41 if (session != nullptr) { in Init()
44 if (!SSL_SESSION_to_bytes(session, &data, &len)) { in Init()
A Dfuzzer.h538 bssl::UniquePtr<SSL_SESSION> session(SSL_SESSION_from_bytes( in SetupTest()
540 if (!session) { in SetupTest()
545 SSL_CTX_add_session(ctx_.get(), session.get()); in SetupTest()
547 SSL_set_session(ssl.get(), session.get()); in SetupTest()
A Dbssl_shim.cc780 SSL_SESSION *session, SettingsWriter *writer) { in DoConnection() argument
782 config->NewSSL(ssl_ctx, session, std::make_unique<TestState>()); in DoConnection()
1423 bssl::UniquePtr<SSL_SESSION> session; in main() local
1433 if (is_resume && !initial_config.is_server && !session) { in main()
1438 bssl::UniquePtr<SSL_SESSION> offer_session = std::move(session); in main()
1444 bool ok = DoConnection(&session, ssl_ctx.get(), config, &retry_config, in main()

Completed in 130 milliseconds

12