Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 19 of 19) sorted by relevance

/openssl-master/providers/implementations/kdfs/
A Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
84 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
119 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
129 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
156 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
228 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
253 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/openssl-master/test/
A Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session()
157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello()
261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello()
475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
A Dssl_test.c153 if (!TEST_int_eq(result->session_id, test_ctx->session_id_expected)) { in check_session_id()
156 ssl_session_id_name(result->session_id)); in check_session_id()
A Dsslapitest.c8483 memset(early->session_id, 1, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
8485 memset(middle->session_id, 2, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
8487 memset(late->session_id, 3, SSL3_SSL_SESSION_ID_LENGTH); in test_session_timeout()
/openssl-master/ssl/
A Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION()
161 in->session_id, in->session_id_length); in i2d_SSL_SESSION()
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION()
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
A Dssl_sess.c288 return s->session_id; in SSL_SESSION_get_id()
395 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id()
397 if (!cb(s, ss->session_id, &tmp)) { in ssl_generate_session_id()
415 if (SSL_has_matching_session_id(s, ss->session_id, in ssl_generate_session_id()
493 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache()
598 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session()
829 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free()
885 if (sid != s->session_id) in SSL_SESSION_set1_id()
886 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
A Dssl_txt.c66 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print()
187 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
A Dssl_lib.c930 if (id_len > sizeof(r.session_id)) in SSL_has_matching_session_id()
935 memcpy(r.session_id, id, id_len); in SSL_has_matching_session_id()
3129 const unsigned char *session_id = a->session_id; in ssl_session_hash() local
3135 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash()
3136 session_id = tmp_storage; in ssl_session_hash()
3140 ((unsigned long)session_id[0]) | in ssl_session_hash()
3141 ((unsigned long)session_id[1] << 8L) | in ssl_session_hash()
3142 ((unsigned long)session_id[2] << 16L) | in ssl_session_hash()
3143 ((unsigned long)session_id[3] << 24L); in ssl_session_hash()
3160 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp()
[all …]
A Dssl_local.h568 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
729 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member
A Dt1_lib.c1750 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
1951 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
/openssl-master/doc/man7/
A DEVP_KDF-SSHKDF.pod39 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
102 "xcghash" and "session_id" values:
109 unsigned char session_id[32] = "012345...";
125 session_id, (size_t)32);
A Dprovider-kdf.pod269 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
/openssl-master/test/helpers/
A Dhandshake.h76 ssl_session_id_t session_id; member
A Dhandshake.c1629 ret->session_id = SSL_TEST_SESSION_ID_NO; in do_handshake_internal()
1631 ret->session_id = SSL_TEST_SESSION_ID_YES; in do_handshake_internal()
/openssl-master/ssl/statem/
A Dstatem_clnt.c1102 unsigned char *session_id; in tls_construct_client_hello() local
1187 session_id = s->session->session_id; in tls_construct_client_hello()
1193 session_id = s->tmp_session_id; in tls_construct_client_hello()
1212 || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, in tls_construct_client_hello()
1376 PACKET session_id, extpkt; in tls_process_server_hello() local
1412 if (!PACKET_get_length_prefixed_1(pkt, &session_id)) { in tls_process_server_hello()
1416 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello()
1417 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello()
1550 && memcmp(PACKET_data(&session_id), s->session->session_id, in tls_process_server_hello()
1590 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello()
[all …]
A Dstatem_srvr.c1378 PACKET session_id, compression, extensions, cookie; in tls_process_client_hello() local
1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello()
1506 || !PACKET_get_length_prefixed_1(pkt, &session_id) in tls_process_client_hello()
1507 || !PACKET_copy_all(&session_id, clienthello->session_id, in tls_process_client_hello()
1807 memcpy(s->tmp_session_id, s->clienthello->session_id, in tls_early_post_process_client_hello()
2306 unsigned char *session_id; in tls_construct_server_hello() local
2348 session_id = s->tmp_session_id; in tls_construct_server_hello()
2351 session_id = s->session->session_id; in tls_construct_server_hello()
2354 if (sl > sizeof(s->session->session_id)) { in tls_construct_server_hello()
2369 if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl) in tls_construct_server_hello()
[all …]
/openssl-master/doc/man1/
A Dopenssl-kdf.pod.in153 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id:
/openssl-master/doc/man3/
A DSSL_CTX_set_generate_session_id.pod109 * Prefix the session_id with the required prefix. NB: If our
/openssl-master/
A DCHANGES.md4325 SSL/TLS protocol specifications, the session_id sent by the server will be

Completed in 86 milliseconds