/openssl-master/crypto/modes/ |
A D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 317 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 369 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 375 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 397 ocb_block16_xor(&ctx->sess.offset, &ctx->l_star, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 409 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_encrypt() 461 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_decrypt() 472 ocb_block16_xor(&tmp, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() 501 ocb_block16_xor(&pad, &ctx->sess.checksum, &ctx->sess.checksum); in CRYPTO_ocb128_decrypt() [all …]
|
/openssl-master/engines/ |
A D | e_devcrypto.c | 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 377 memset(&to_cipher_ctx->sess, 0, sizeof(to_cipher_ctx->sess)); in cipher_ctrl() 382 memset(&cipher_ctx->sess, 0, sizeof(cipher_ctx->sess)); in cipher_ctrl() 428 session_op_t sess; in prepare_cipher_methods() local 439 memset(&sess, 0, sizeof(sess)); in prepare_cipher_methods() 506 fop.crid = sess.crid; in prepare_cipher_methods() 512 siop.ses = sess.ses; in prepare_cipher_methods() 675 session_op_t sess; member 755 memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess)); in digest_init() [all …]
|
/openssl-master/test/ |
A D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
A D | dtlstest.c | 169 SSL_SESSION *sess = NULL; in test_dtls_drop_records() local 195 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_dtls_drop_records() 223 if (sess != NULL) { in test_dtls_drop_records() 224 if (!TEST_true(SSL_set_session(clientssl, sess))) in test_dtls_drop_records() 253 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) in test_dtls_drop_records() 263 SSL_SESSION_free(sess); in test_dtls_drop_records()
|
A D | sslapitest.c | 445 SSL_SESSION *sess = NULL; in test_keylog_no_master_key() local 547 SSL_SESSION_free(sess); in test_keylog_no_master_key() 936 SSL_SESSION_free(sess); in test_ccs_change_cipher() 1825 SSL_SESSION_free(sess); in new_session_cb() 3037 *sess = clientpsk; in use_session_cb() 3090 *sess = NULL; in find_session_cb() 3095 *sess = serverpsk; in find_session_cb() 3158 if (!TEST_ptr(sess) in create_a_psk() 3169 return sess; in create_a_psk() 3244 if (sess == NULL) in setupearly_data_test() [all …]
|
A D | tls13ccstest.c | 251 SSL_SESSION *sess = NULL; in test_tls13ccs() local 306 sess = SSL_get1_session(cssl); in test_tls13ccs() 307 if (!TEST_ptr(sess)) in test_tls13ccs() 345 if (!TEST_true(SSL_set_session(cssl, sess)) in test_tls13ccs() 482 SSL_SESSION_free(sess); in test_tls13ccs()
|
A D | bad_dtls_test.c | 465 SSL_SESSION *sess = NULL; in test_bad_dtls() local 483 sess = client_session(); in test_bad_dtls() 484 if (!TEST_ptr(sess)) in test_bad_dtls() 504 || !TEST_true(SSL_set_session(con, sess))) in test_bad_dtls() 506 SSL_SESSION_free(sess); in test_bad_dtls()
|
A D | ssl_old_test.c | 813 SSL_SESSION *sess; in read_session() local 821 sess = PEM_read_bio_SSL_SESSION(f, NULL, 0, NULL); in read_session() 822 if (sess == NULL) { in read_session() 827 return sess; in read_session() 830 static int write_session(const char *filename, SSL_SESSION *sess) in write_session() argument 834 if (sess == NULL) { in write_session() 845 PEM_write_bio_SSL_SESSION(f, sess); in write_session()
|
/openssl-master/apps/ |
A D | s_server.c | 201 *sess = NULL; in psk_find_session_cb() 235 *sess = tmpsess; in psk_find_session_cb() 3614 sess->der = app_malloc(sess->derlen, "get session buffer"); in add_session() 3615 if (!sess->id) { in add_session() 3622 p = sess->der; in add_session() 3634 first = sess; in add_session() 3644 for (sess = first; sess; sess = sess->next) { in get_session() 3661 for (sess = first; sess; sess = sess->next) { in del_session() 3662 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session() 3689 for (sess = first; sess;) { in free_sessions() [all …]
|
A D | s_client.c | 160 SSL_SESSION **sess) in psk_use_session_cb() argument 205 *sess = NULL; in psk_use_session_cb() 208 *sess = usesess; in psk_use_session_cb() 755 static int new_session_cb(SSL *s, SSL_SESSION *sess) in new_session_cb() argument 764 PEM_write_bio_SSL_SESSION(stmp, sess); in new_session_cb() 776 SSL_SESSION_print(bio_c_out, sess); in new_session_cb() 1946 SSL_SESSION *sess; in s_client_main() local 1953 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); in s_client_main() 1955 if (sess == NULL) { in s_client_main() 1960 if (!SSL_set_session(con, sess)) { in s_client_main() [all …]
|
/openssl-master/ssl/statem/ |
A D | extensions_srvr.c | 973 *sess = tmpsess; in tls_get_stateful_ticket() 982 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1020 if (sess == NULL in tls_parse_ctos_psk() 1053 if (sess == NULL in tls_parse_ctos_psk() 1068 if (sess != NULL) { in tls_parse_ctos_psk() 1077 sess = sesstmp; in tls_parse_ctos_psk() 1125 sess = NULL; in tls_parse_ctos_psk() 1162 sess = NULL; in tls_parse_ctos_psk() 1170 if (sess == NULL) in tls_parse_ctos_psk() 1202 s->session = sess; in tls_parse_ctos_psk() [all …]
|
A D | extensions.c | 1437 unsigned char *binderout, SSL_SESSION *sess, int sign, in tls_psk_do_binder() argument 1468 && sess->ext.max_early_data > 0) in tls_psk_do_binder() 1490 early_secret = (unsigned char *)sess->early_secret; in tls_psk_do_binder() 1492 if (!tls13_generate_secret(s, md, NULL, sess->master_key, in tls_psk_do_binder() 1493 sess->master_key_length, early_secret)) { in tls_psk_do_binder()
|
A D | statem_srvr.c | 3663 SSL_SESSION *sess; in construct_stateless_ticket() local 3704 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); in construct_stateless_ticket() 3705 if (sess == NULL) { in construct_stateless_ticket() 3710 slen = i2d_SSL_SESSION(sess, NULL); in construct_stateless_ticket() 3714 SSL_SESSION_free(sess); in construct_stateless_ticket() 3718 if (!i2d_SSL_SESSION(sess, &p)) { in construct_stateless_ticket() 3720 SSL_SESSION_free(sess); in construct_stateless_ticket() 3723 SSL_SESSION_free(sess); in construct_stateless_ticket()
|
/openssl-master/ssl/record/ |
A D | ssl3_record.c | 108 SSL_SESSION *sess = s->session; in early_data_count_ok() local 115 if (!s->server && sess->ext.max_early_data == 0) { in early_data_count_ok() 121 sess = s->psksession; in early_data_count_ok() 125 max_early_data = sess->ext.max_early_data; in early_data_count_ok() 129 max_early_data = s->recv_max_early_data < sess->ext.max_early_data in early_data_count_ok() 180 SSL_SESSION *sess; in ssl3_get_record() local 198 sess = s->session; in ssl3_get_record() 619 if ((sess != NULL) in ssl3_get_record() 1491 SSL_SESSION *sess; in dtls1_process_record() local 1501 sess = s->session; in dtls1_process_record() [all …]
|
A D | rec_layer_d1.c | 801 SSL_SESSION *sess; in do_dtls1_write() local 830 sess = s->session; in do_dtls1_write() 832 if ((sess == NULL) in do_dtls1_write()
|
A D | rec_layer_s3.c | 681 SSL_SESSION *sess; in do_ssl3_write() local 716 sess = s->session; in do_ssl3_write() 718 if ((sess == NULL) in do_ssl3_write()
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_sess_set_get_cb.pod | 22 SSL_SESSION *sess); 24 SSL_SESSION *sess); 60 ssl session B<sess>. 87 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
A D | SSL_CTX_use_psk_identity_hint.pod | 22 SSL_SESSION **sess); 49 in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key, 55 callback should return successfully and ensure that B<*sess> is
|
A D | SSL_CTX_set_psk_client_callback.pod | 20 SSL_SESSION **sess); 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 98 this the callback should return successfully and ensure that B<*sess> is
|
A D | SSL_get_client_random.pod | 19 int SSL_SESSION_set1_master_key(SSL_SESSION *sess, const unsigned char *in, 40 SSL_SESSION B<sess>. For example, this could be used to set up a session based
|
/openssl-master/ssl/ |
A D | ssl_sess.c | 97 SSL_SESSION *sess; in SSL_get1_session() local 105 sess = ssl->session; in SSL_get1_session() 106 if (sess) in SSL_get1_session() 107 SSL_SESSION_up_ref(sess); in SSL_get1_session() 109 return sess; in SSL_get1_session() 1274 int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) in SSL_CTX_sess_set_new_cb() argument 1279 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx)) (SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb() 1284 void (*cb) (SSL_CTX *ctx, SSL_SESSION *sess)) in SSL_CTX_sess_set_remove_cb() argument 1290 SSL_SESSION *sess) { in SSL_CTX_sess_get_remove_cb()
|
A D | t1_lib.c | 1780 SSL_SESSION *sess = NULL; in tls_decrypt_ticket() local 1933 sess = d2i_SSL_SESSION(NULL, &p, slen); in tls_decrypt_ticket() 1936 if (sess) { in tls_decrypt_ticket() 1939 SSL_SESSION_free(sess); in tls_decrypt_ticket() 1940 sess = NULL; in tls_decrypt_ticket() 1952 sess->session_id_length = sesslen; in tls_decrypt_ticket() 1995 SSL_SESSION_free(sess); in tls_decrypt_ticket() 1996 sess = NULL; in tls_decrypt_ticket() 2003 SSL_SESSION_free(sess); in tls_decrypt_ticket() 2004 sess = NULL; in tls_decrypt_ticket() [all …]
|
/openssl-master/test/helpers/ |
A D | handshake.c | 1403 SSL_SESSION* sess = NULL; in do_handshake_internal() local 1617 if ((sess = SSL_get0_session(client.ssl)) != NULL) { in do_handshake_internal() 1618 SSL_SESSION_get0_ticket(sess, &tick, &tick_len); in do_handshake_internal() 1619 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1652 if ((sess = SSL_get0_session(server.ssl)) != NULL) { in do_handshake_internal() 1653 SSL_SESSION_get0_ticket_appdata(sess, (void**)&tick, &tick_len); in do_handshake_internal()
|
/openssl-master/ |
A D | NOTES-WINDOWS.md | 221 DWORD sess; 223 if (ProcessIdToSessionId(GetCurrentProcessId(), &sess)) 224 return sess == 0;
|
/openssl-master/include/crypto/ |
A D | modes.h | 198 } sess; member
|