Searched refs:session_id_len (Results 1 – 10 of 10) sorted by relevance
/openssl-master/util/perl/TLSProxy/ |
A D | ServerHello.pm | 39 $self->{session_id_len} = 0; 57 my $session_id_len = 0; 59 $session_id_len = unpack('C', substr($self->data, $ptr)); 61 $session = substr($self->data, $ptr, $session_id_len); 62 $ptr += $session_id_len; 113 $self->session_id_len($session_id_len); 124 print " Session ID Len:".$session_id_len."\n"; 147 $data .= pack('C', $self->session_id_len); 186 sub session_id_len subroutine 190 $self->{session_id_len} = shift; [all …]
|
A D | ClientHello.pm | 34 $self->{session_id_len} = 0; 53 my $session_id_len = unpack('C', substr($self->data, $ptr)); 55 my $session = substr($self->data, $ptr, $session_id_len); 56 $ptr += $session_id_len; 85 $self->session_id_len($session_id_len); 97 print " Session ID Len:".$session_id_len."\n"; 139 $data .= pack('C', $self->session_id_len); 184 sub session_id_len subroutine 188 $self->{session_id_len} = shift; 190 return $self->{session_id_len};
|
/openssl-master/providers/implementations/kdfs/ |
A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 50 size_t session_id_len; member 84 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 129 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 156 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 228 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 253 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/openssl-master/test/recipes/ |
A D | 70-test_tls13alerts.t | 52 ${$proxy->message_list}[1]->session_id_len(1);
|
/openssl-master/ssl/statem/ |
A D | statem_clnt.c | 1377 size_t session_id_len; in tls_process_server_hello() local 1416 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1417 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1418 || session_id_len > SSL3_SESSION_ID_SIZE) { in tls_process_server_hello() 1464 if (session_id_len != s->tmp_session_id_len in tls_process_server_hello() 1466 session_id_len) != 0) { in tls_process_server_hello() 1548 if (session_id_len != 0 in tls_process_server_hello() 1551 session_id_len) == 0) in tls_process_server_hello() 1587 s->session->session_id_length = session_id_len; in tls_process_server_hello() 1589 if (session_id_len > 0) in tls_process_server_hello() [all …]
|
A D | statem_srvr.c | 1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local 1463 || !PACKET_get_net_2(pkt, &session_id_len) in tls_process_client_hello() 1469 if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in tls_process_client_hello() 1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1483 clienthello->session_id_len = session_id_len; in tls_process_client_hello() 1509 &clienthello->session_id_len)) { in tls_process_client_hello() 1808 s->clienthello->session_id_len); in tls_early_post_process_client_hello() 1809 s->tmp_session_id_len = s->clienthello->session_id_len; in tls_early_post_process_client_hello()
|
/openssl-master/ssl/ |
A D | ssl_sess.c | 596 if (hello->session_id_len > 0) { in ssl_get_prev_session() 599 hello->session_id_len); in ssl_get_prev_session()
|
A D | ssl_local.h | 728 size_t session_id_len; member
|
A D | t1_lib.c | 1750 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
|
A D | ssl_lib.c | 5343 return s->clienthello->session_id_len; in SSL_client_hello_get0_session_id()
|
Completed in 46 milliseconds