/openssl-master/ssl/ |
A D | ssl_sess.c | 65 ss->calc_timeout = ss->time + ss->timeout; in ssl_session_calculate_timeout() 70 ss->timeout_ovf = ss->time > 0 && ss->calc_timeout < ss->time; in ssl_session_calculate_timeout() 124 SSL_SESSION *ss; in SSL_SESSION_new() local 129 ss = OPENSSL_zalloc(sizeof(*ss)); in SSL_SESSION_new() 152 return ss; in SSL_SESSION_new() 395 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 820 CRYPTO_DOWN_REF(&ss->references, &i, ss->lock); in SSL_SESSION_free() 828 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); in SSL_SESSION_free() 829 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free() 844 OPENSSL_clear_free(ss, sizeof(*ss)); in SSL_SESSION_free() [all …]
|
A D | ssl_local.h | 2380 __owur int ssl_generate_session_id(SSL *s, SSL_SESSION *ss); 2842 void ssl_session_calculate_timeout(SSL_SESSION* ss);
|
/openssl-master/crypto/x509/ |
A D | v3_akid.c | 110 int same_issuer, ss; in v2i_AUTHORITY_KEYID() local 151 ss = X509_check_private_key(ctx->subject_cert, ctx->issuer_pkey); in v2i_AUTHORITY_KEYID() 153 ss = same_issuer; in v2i_AUTHORITY_KEYID() 157 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID() 164 && !(same_issuer && !ss)) { in v2i_AUTHORITY_KEYID() 185 if (issuer == 2 || (issuer == 1 && !ss && ikeyid == NULL)) { in v2i_AUTHORITY_KEYID()
|
A D | by_dir.c | 172 const char *s, *ss, *p; in add_cert_dir() local 185 ss = s; in add_cert_dir() 187 len = p - ss; in add_cert_dir() 192 if (strlen(ent->dir) == len && strncmp(ent->dir, ss, len) == 0) in add_cert_dir() 211 ent->dir = OPENSSL_strndup(ss, len); in add_cert_dir()
|
/openssl-master/doc/man3/ |
A D | OSSL_ESS_check_signing_certs.pod | 22 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss, 41 the certificates required by the identifiers given in I<ss> and/or I<ssv2>. 42 If I<require_signing_cert> is nonzero, I<ss> or I<ssv2> must not be NULL. 43 If both I<ss> and I<ssv2> are not NULL, they are evaluated independently. 44 The list of certificate identifiers in I<ss> is of type B<ESS_CERT_ID>,
|
A D | SSL_CTX_set_session_ticket_cb.pod | 16 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss, 25 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len); 26 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len); 43 available. If ticket decryption was successful then the B<ss> argument contains 51 B<data> and B<len> into B<ss> which is then placed into any generated session 59 application data from B<ss>. The application data can be set via 68 When the B<dec_cb> callback is invoked, the SSL_SESSION B<ss> has not yet been 147 no session data will be available and the callback must not use the B<ss> 150 SSL_SESSION_get0_ticket_appdata() using the session provided in the B<ss>
|
/openssl-master/crypto/ess/ |
A D | ess_lib.c | 286 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss, in OSSL_ESS_check_signing_certs() argument 291 int n_v1 = ss == NULL ? -1 : sk_ESS_CERT_ID_num(ss->cert_ids); in OSSL_ESS_check_signing_certs() 295 if (require_signing_cert && ss == NULL && ssv2 == NULL) { in OSSL_ESS_check_signing_certs() 305 ret = find(sk_ESS_CERT_ID_value(ss->cert_ids, i), NULL, i, chain); in OSSL_ESS_check_signing_certs()
|
/openssl-master/crypto/cms/ |
A D | cms_ess.c | 105 ESS_SIGNING_CERT *ss = NULL; in ossl_cms_check_signing_certs() local 107 int ret = ossl_cms_signerinfo_get_signing_cert(si, &ss) >= 0 in ossl_cms_check_signing_certs() 109 && OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ossl_cms_check_signing_certs() 111 ESS_SIGNING_CERT_free(ss); in ossl_cms_check_signing_certs()
|
/openssl-master/crypto/ |
A D | param_build.c | 355 const size_t ss = OSSL_PARAM_ALIGN_SIZE * bld->secure_blocks; in OSSL_PARAM_BLD_to_param() local 357 if (ss > 0) { in OSSL_PARAM_BLD_to_param() 358 s = OPENSSL_secure_malloc(ss); in OSSL_PARAM_BLD_to_param() 372 ossl_param_set_secure_block(last, s, ss); in OSSL_PARAM_BLD_to_param()
|
/openssl-master/test/ |
A D | tls-provider.c | 330 unsigned char *ss, size_t *sslen) in xor_encapsulate() argument 345 if (ct == NULL || ss == NULL) { in xor_encapsulate() 374 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_encapsulate() 387 unsigned char *ss, size_t *sslen, in xor_decapsulate() argument 401 if (ss == NULL) { in xor_decapsulate() 421 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) in xor_decapsulate()
|
A D | sslapitest.c | 7468 static SSL_TICKET_RETURN dec_tick_cb(SSL *s, SSL_SESSION *ss, in dec_tick_cb() argument 7486 if (!TEST_true(SSL_SESSION_get0_ticket_appdata(ss, &tickdata, in dec_tick_cb()
|
/openssl-master/ssl/statem/ |
A D | extensions.c | 970 SSL_SESSION* ss = SSL_get_session(s); in final_server_name() local 972 if (ss != NULL) { in final_server_name() 973 OPENSSL_free(ss->ext.tick); in final_server_name() 974 ss->ext.tick = NULL; in final_server_name() 975 ss->ext.ticklen = 0; in final_server_name() 976 ss->ext.tick_lifetime_hint = 0; in final_server_name() 977 ss->ext.tick_age_add = 0; in final_server_name() 978 if (!ssl_generate_session_id(s, ss)) { in final_server_name()
|
/openssl-master/crypto/conf/ |
A D | conf_def.c | 353 char *ss; in def_load_bio() local 357 ss = start; in def_load_bio() 359 end = eat_alpha_numeric(conf, ss); in def_load_bio() 362 if (*p != '\0' && ss != p) { in def_load_bio() 363 ss = p; in def_load_bio()
|
/openssl-master/crypto/cmp/ |
A D | cmp_client.c | 92 OSSL_CMP_PKIFREETEXT *ss; in save_statusInfo() local 112 ss = si->statusString; /* may be NULL */ in save_statusInfo() 113 for (i = 0; i < sk_ASN1_UTF8STRING_num(ss); i++) { in save_statusInfo() 114 ASN1_UTF8STRING *str = sk_ASN1_UTF8STRING_value(ss, i); in save_statusInfo()
|
/openssl-master/crypto/ts/ |
A D | ts_rsp_verify.c | 234 ESS_SIGNING_CERT *ss = ossl_ess_get_signing_cert(si); in ts_check_signing_certs() local 236 int ret = OSSL_ESS_check_signing_certs(ss, ssv2, chain, 1) > 0; in ts_check_signing_certs() 238 ESS_SIGNING_CERT_free(ss); in ts_check_signing_certs()
|
/openssl-master/include/openssl/ |
A D | ess.h.in | 73 int OSSL_ESS_check_signing_certs(const ESS_SIGNING_CERT *ss,
|
A D | ssl.h.in | 2088 __owur int SSL_SESSION_set_ex_data(SSL_SESSION *ss, int idx, void *data); 2089 void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss, int idx); 2481 typedef SSL_TICKET_RETURN (*SSL_CTX_decrypt_session_ticket_fn)(SSL *s, SSL_SESSION *ss, 2490 int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len); 2491 int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len);
|
/openssl-master/test/recipes/ |
A D | 25-test_req.t | 380 my $ss = $cert =~ m/self-signed/; 387 push(@cmd, ("-CA", $ca_cert, "-CAkey", $ca_key)) unless $ss;
|
/openssl-master/test/helpers/ |
A D | handshake.c | 444 SSL_SESSION *ss = SSL_get_session(s); in generate_session_ticket_cb() local 447 if (ss == NULL || app_data == NULL) in generate_session_ticket_cb() 450 return SSL_SESSION_set1_ticket_appdata(ss, app_data, strlen(app_data)); in generate_session_ticket_cb() 453 static int decrypt_session_ticket_cb(SSL *s, SSL_SESSION *ss, in decrypt_session_ticket_cb() argument
|
/openssl-master/util/ |
A D | indent.pro | 34 -ss
|
/openssl-master/ |
A D | CHANGES.md | 16595 openssl verify ss.pem 16597 openssl verify -CAfile ss.pem ss.pem
|