/openssl-master/providers/implementations/kdfs/ |
A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 84 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 119 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 129 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 156 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 228 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 253 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/openssl-master/test/ |
A D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session() 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello() 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello() 475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
|
A D | ssl_test.c | 153 if (!TEST_int_eq(result->session_id, test_ctx->session_id_expected)) { in check_session_id() 156 ssl_session_id_name(result->session_id)); in check_session_id()
|
A D | sslapitest.c | 8483 memset(early->session_id, 1, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout() 8485 memset(middle->session_id, 2, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout() 8487 memset(late->session_id, 3, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
|
/openssl-master/ssl/ |
A D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION() 161 in->session_id, in->session_id_length); in i2d_SSL_SESSION() 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION() 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
|
A D | ssl_sess.c | 288 return s->session_id; in SSL_SESSION_get_id() 395 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 397 if (!cb(s, ss->session_id, &tmp)) { in ssl_generate_session_id() 415 if (SSL_has_matching_session_id(s, ss->session_id, in ssl_generate_session_id() 493 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 598 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session() 829 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free() 885 if (sid != s->session_id) in SSL_SESSION_set1_id() 886 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
A D | ssl_txt.c | 66 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print() 187 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
|
A D | ssl_lib.c | 930 if (id_len > sizeof(r.session_id)) in SSL_has_matching_session_id() 935 memcpy(r.session_id, id, id_len); in SSL_has_matching_session_id() 3129 const unsigned char *session_id = a->session_id; in ssl_session_hash() local 3135 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash() 3136 session_id = tmp_storage; in ssl_session_hash() 3140 ((unsigned long)session_id[0]) | in ssl_session_hash() 3141 ((unsigned long)session_id[1] << 8L) | in ssl_session_hash() 3142 ((unsigned long)session_id[2] << 16L) | in ssl_session_hash() 3143 ((unsigned long)session_id[3] << 24L); in ssl_session_hash() 3160 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp() [all …]
|
A D | ssl_local.h | 568 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member 729 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
|
A D | t1_lib.c | 1750 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client() 1951 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
|
/openssl-master/doc/man7/ |
A D | EVP_KDF-SSHKDF.pod | 39 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string> 102 "xcghash" and "session_id" values: 109 unsigned char session_id[32] = "012345..."; 125 session_id, (size_t)32);
|
A D | provider-kdf.pod | 269 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
|
/openssl-master/test/helpers/ |
A D | handshake.h | 76 ssl_session_id_t session_id; member
|
A D | handshake.c | 1629 ret->session_id = SSL_TEST_SESSION_ID_NO; in do_handshake_internal() 1631 ret->session_id = SSL_TEST_SESSION_ID_YES; in do_handshake_internal()
|
/openssl-master/ssl/statem/ |
A D | statem_clnt.c | 1102 unsigned char *session_id; in tls_construct_client_hello() local 1187 session_id = s->session->session_id; in tls_construct_client_hello() 1193 session_id = s->tmp_session_id; in tls_construct_client_hello() 1212 || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, in tls_construct_client_hello() 1376 PACKET session_id, extpkt; in tls_process_server_hello() local 1412 if (!PACKET_get_length_prefixed_1(pkt, &session_id)) { in tls_process_server_hello() 1416 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1417 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1550 && memcmp(PACKET_data(&session_id), s->session->session_id, in tls_process_server_hello() 1590 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello() [all …]
|
A D | statem_srvr.c | 1378 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local 1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1506 || !PACKET_get_length_prefixed_1(pkt, &session_id) in tls_process_client_hello() 1507 || !PACKET_copy_all(&session_id, clienthello->session_id, in tls_process_client_hello() 1807 memcpy(s->tmp_session_id, s->clienthello->session_id, in tls_early_post_process_client_hello() 2306 unsigned char *session_id; in tls_construct_server_hello() local 2348 session_id = s->tmp_session_id; in tls_construct_server_hello() 2351 session_id = s->session->session_id; in tls_construct_server_hello() 2354 if (sl > sizeof(s->session->session_id)) { in tls_construct_server_hello() 2369 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl) in tls_construct_server_hello() [all …]
|
/openssl-master/doc/man1/ |
A D | openssl-kdf.pod.in | 153 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id:
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_generate_session_id.pod | 109 * Prefix the session_id with the required prefix. NB: If our
|
/openssl-master/ |
A D | CHANGES.md | 4325 SSL/TLS protocol specifications, the session_id sent by the server will be
|