Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 31) sorted by relevance

12

/lib/mbedtls/external/mbedtls/library/
A Dssl_tls.c3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save()
3694 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls12_session_load()
3699 memcpy(session->ticket, p, session->ticket_len); in ssl_tls12_session_load()
3836 memcpy(p, session->resumption_key, session->resumption_key_len); in ssl_tls13_session_save()
3890 if (session->ticket != NULL && session->ticket_len > 0) { in ssl_tls13_session_save()
3891 memcpy(p, session->ticket, session->ticket_len); in ssl_tls13_session_save()
3924 memcpy(session->resumption_key, p, session->resumption_key_len); in ssl_tls13_session_load()
4024 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls13_session_load()
4028 memcpy(session->ticket, p, session->ticket_len); in ssl_tls13_session_load()
8342 if (!session) { in ssl_calc_finished_tls_generic()
[all …]
A Dssl_tls13_client.c686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket()
716 *identity = session->ticket; in ssl_tls13_ticket_get_identity()
2746 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_parse_new_session_ticket_early_data_ext() local
2841 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_parse_new_session_ticket() local
2886 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket()
2888 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket()
2889 session->ticket_len = 0; in ssl_tls13_parse_new_session_ticket()
2898 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
2937 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_postprocess_new_session_ticket() local
2981 session->resumption_key, in ssl_tls13_postprocess_new_session_ticket()
[all …]
A Dssl_tls13_server.c187 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match_ticket() argument
320 mbedtls_ssl_session_free(session); in ssl_tls13_offered_psks_check_identity_match_ticket()
335 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match() argument
339 ((void) session); in ssl_tls13_offered_psks_check_identity_match()
579 mbedtls_ssl_session session; in ssl_tls13_parse_pre_shared_key_ext() local
603 &psk->type, &session); in ssl_tls13_parse_pre_shared_key_ext()
623 session.ticket_flags & in ssl_tls13_parse_pre_shared_key_ext()
3148 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_prepare_new_session_ticket() local
3175 if (session->ticket_alpn == NULL) { in ssl_tls13_prepare_new_session_ticket()
3227 session->resumption_key, in ssl_tls13_prepare_new_session_ticket()
[all …]
A Dssl_cache.c77 mbedtls_ssl_session *session) in mbedtls_ssl_cache_get() argument
94 ret = mbedtls_ssl_session_load(session, in mbedtls_ssl_cache_get()
95 entry->session, in mbedtls_ssl_cache_get()
121 if (entry->session != NULL) { in ssl_cache_entry_zeroize()
122 mbedtls_zeroize_and_free(entry->session, entry->session_len); in ssl_cache_entry_zeroize()
230 if (cur->session != NULL) { in ssl_cache_pick_writing_slot()
249 const mbedtls_ssl_session *session) in mbedtls_ssl_cache_set() argument
273 ret = mbedtls_ssl_session_save(session, NULL, 0, &session_serialized_len); in mbedtls_ssl_cache_set()
285 ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_cache_set()
300 cur->session = session_serialized; in mbedtls_ssl_cache_set()
A Dssl_misc.h2851 int mbedtls_ssl_session_set_hostname(mbedtls_ssl_session *session,
2867 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument
2869 return session->ticket_flags & in mbedtls_ssl_tls13_session_get_ticket_flags()
2880 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument
2886 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk() argument
2889 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION); in mbedtls_ssl_tls13_session_ticket_allow_psk()
2893 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk_ephemeral() argument
2900 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_early_data() argument
2903 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA); in mbedtls_ssl_tls13_session_ticket_allow_early_data()
2907 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_set_ticket_flags() argument
[all …]
A Dssl_ticket.c300 const mbedtls_ssl_session *session, in mbedtls_ssl_ticket_write() argument
350 if ((ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_ticket_write()
419 mbedtls_ssl_session *session, in mbedtls_ssl_ticket_parse() argument
500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
509 ret = mbedtls_ssl_session_get_ticket_creation_time(session, in mbedtls_ssl_ticket_parse()
A Dssl_tls12_server.c475 mbedtls_ssl_session session; in ssl_parse_session_ticket_ext() local
477 mbedtls_ssl_session_init(&session); in ssl_parse_session_ticket_ext()
505 mbedtls_ssl_session_free(&session); in ssl_parse_session_ticket_ext()
522 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext()
523 memcpy(&session.id, ssl->session_negotiate->id, session.id_len); in ssl_parse_session_ticket_ext()
2119 if (session->id_len == 0) { in ssl_handle_id_based_session_resumption()
2134 session->id, in ssl_handle_id_based_session_resumption()
2135 session->id_len, in ssl_handle_id_based_session_resumption()
2141 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption()
2147 mbedtls_ssl_session_free(session); in ssl_handle_id_based_session_resumption()
[all …]
A Dssl_tls13_generic.c1345 if (ssl->session) { in mbedtls_ssl_tls13_handshake_wrapup()
1346 mbedtls_ssl_session_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup()
1347 mbedtls_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup()
1349 ssl->session = ssl->session_negotiate; in mbedtls_ssl_tls13_handshake_wrapup()
A Dssl_tls12_client.c3444 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket()
3445 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket()
3446 ssl->session->ticket_len); in ssl_parse_new_session_ticket()
3447 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
3448 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket()
/lib/mbedtls/external/mbedtls/tests/src/test_helpers/
A Dssl_helpers.c1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session()
1688 session->id_len = sizeof(session->id); in mbedtls_test_ssl_tls12_populate_session()
1689 memset(session->id, 66, session->id_len); in mbedtls_test_ssl_tls12_populate_session()
1690 memset(session->master, 17, sizeof(session->master)); in mbedtls_test_ssl_tls12_populate_session()
1705 session->peer_cert = mbedtls_calloc(1, sizeof(*session->peer_cert)); in mbedtls_test_ssl_tls12_populate_session()
1773 session->mfl_code = 1; in mbedtls_test_ssl_tls12_populate_session()
1776 session->encrypt_then_mac = 1; in mbedtls_test_ssl_tls12_populate_session()
1793 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session()
1795 session->ticket_flags = 0x7; in mbedtls_test_ssl_tls13_populate_session()
1798 memset(session->resumption_key, 0x99, sizeof(session->resumption_key)); in mbedtls_test_ssl_tls13_populate_session()
[all …]
/lib/mbedtls/external/mbedtls/include/mbedtls/
A Dssl.h917 mbedtls_ssl_session *session);
2639 mbedtls_ssl_session *session,
2680 if (session == NULL || ticket_creation_time == NULL || in mbedtls_ssl_session_get_ticket_creation_time()
2702 return &session->MBEDTLS_PRIVATE(id); in mbedtls_ssl_session_get_id()
2714 return session->MBEDTLS_PRIVATE(id_len); in mbedtls_ssl_session_get_id_len()
2726 return session->MBEDTLS_PRIVATE(ciphersuite); in mbedtls_ssl_session_get_ciphersuite_id()
3286 int mbedtls_ssl_session_load(mbedtls_ssl_session *session,
3315 int mbedtls_ssl_session_save(const mbedtls_ssl_session *session,
4863 mbedtls_ssl_session *session);
5558 void mbedtls_ssl_session_init(mbedtls_ssl_session *session);
[all …]
A Dssl_cache.h58 unsigned char *MBEDTLS_PRIVATE(session); /*!< serialized session */
102 mbedtls_ssl_session *session);
120 const mbedtls_ssl_session *session);
/lib/lwip/lwip/doc/
A Dppp.txt106 printf("status_cb: Unable to open PPP session\n");
180 * Creating a new PPPoS session
215 * Creating a new PPPoE session
238 * Creating a new PPPoL2TP session
273 * Basic PPP client configuration. Can only be set if PPP session is in the
288 * if PPP session is in the dead state (i.e. disconnected).
331 * Only for PPPoS, the PPP session should be up and waiting for input.
343 * be called if PPP session is in the dead state (i.e. disconnected).
354 * Initiate the end of the PPP session, without carrier lost signal
371 * Free the PPP control block, can only be called if PPP session is in the
[all …]
/lib/lwip/lwip/src/netif/ppp/
A Dpppoe.c342 && sc->sc_session == session in pppoe_find_softc_by_session()
390 u16_t session, plen; in pppoe_disc_input() local
426 session = 0; in pppoe_disc_input()
438 session = lwip_ntohs(ph->session); in pppoe_disc_input()
634 sc->sc_session = session; in pppoe_disc_input()
657 (u16_t)ph->code, session)); in pppoe_disc_input()
672 u16_t session, plen; in pppoe_data_input() local
703 session = lwip_ntohs(ph->session); in pppoe_data_input()
704 sc = pppoe_find_softc_by_session(session, netif); in pppoe_data_input()
708 pppoe_send_padt(netif, session, shost); in pppoe_data_input()
[all …]
/lib/mbedtls/external/mbedtls/tests/include/test/
A Dssl_helpers.h548 int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session,
554 int mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session,
611 void *p_ticket, const mbedtls_ssl_session *session,
615 int mbedtls_test_ticket_parse(void *p_ticket, mbedtls_ssl_session *session,
625 mbedtls_ssl_session *session);
/lib/lwip/lwip/src/apps/altcp_tls/
A Daltcp_tls_mbedtls.c678 altcp_tls_init_session(struct altcp_tls_session *session) in altcp_tls_init_session() argument
680 if (session) in altcp_tls_init_session()
681 mbedtls_ssl_session_init(&session->data); in altcp_tls_init_session()
687 if (session && conn && conn->state) { in altcp_tls_get_session()
689 int ret = mbedtls_ssl_get_session(&state->ssl_context, &session->data); in altcp_tls_get_session()
698 if (session && conn && conn->state) { in altcp_tls_set_session()
702 if (session->data.MBEDTLS_PRIVATE(start)) in altcp_tls_set_session()
704 ret = mbedtls_ssl_set_session(&state->ssl_context, &session->data); in altcp_tls_set_session()
711 altcp_tls_free_session(struct altcp_tls_session *session) in altcp_tls_free_session() argument
713 if (session) in altcp_tls_free_session()
[all …]
/lib/lwip/lwip/src/apps/smtp/
A Dsmtp.c152 #define SMTP_USERNAME(session) (session)->username argument
153 #define SMTP_PASS(session) (session)->pass argument
154 #define SMTP_AUTH_PLAIN_DATA(session) (session)->auth_plain argument
155 #define SMTP_AUTH_PLAIN_LEN(session) (session)->auth_plain_len argument
157 #define SMTP_USERNAME(session) smtp_username argument
158 #define SMTP_PASS(session) smtp_pass argument
159 #define SMTP_AUTH_PLAIN_DATA(session) smtp_auth_plain argument
160 #define SMTP_AUTH_PLAIN_LEN(session) smtp_auth_plain_len argument
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_ssl.function2157 mbedtls_ssl_session session;
2164 mbedtls_ssl_session_init(&session);
2203 mbedtls_ssl_session_free(&session);
2219 mbedtls_ssl_session_free(&session);
2230 mbedtls_ssl_session session;
2237 mbedtls_ssl_session_init(&session);
2289 mbedtls_ssl_session session;
2362 mbedtls_ssl_session session;
2440 mbedtls_ssl_session session;
2468 TEST_ASSERT(*mbedtls_ssl_session_get_id(&session) == session.id);
[all …]
A Dtest_suite_ssl.data916 SSL session serialization: Wrong major version
920 SSL session serialization: Wrong minor version
924 SSL session serialization: Wrong patch version
928 SSL session serialization: Wrong config
932 TLS 1.3: CLI: session serialization: Wrong major version
936 TLS 1.3: CLI: session serialization: Wrong minor version
940 TLS 1.3: CLI: session serialization: Wrong patch version
944 TLS 1.3: CLI: session serialization: Wrong config
960 TLS 1.3: SRV: session serialization: Wrong config
3247 Force a bad session id length
[all …]
/lib/mbedtls/external/mbedtls/tests/
A DDescriptions.txt21 covered by compat.sh: session resumption (using session cache or tickets),
/lib/efi_loader/
A Defi_variable_tee.c48 u32 session; member
81 conn->session = arg.session; in get_connection()
123 tee_close_session(conn.tee, conn.session); in optee_mm_communicate()
129 arg.session = conn.session; in optee_mm_communicate()
139 tee_close_session(conn.tee, conn.session); in optee_mm_communicate()
/lib/mbedtls/external/mbedtls/programs/ssl/
A Dssl_server2.c1386 int dummy_ticket_write(void *p_ticket, const mbedtls_ssl_session *session, in dummy_ticket_write() argument
1403 if ((ret = mbedtls_ssl_session_save(session, p, end - p, in dummy_ticket_write()
1413 int dummy_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, in dummy_ticket_parse() argument
1419 if ((ret = mbedtls_ssl_session_load(session, buf + 4, len - 4)) != 0) { in dummy_ticket_parse()
1430 session->ticket_creation_time = mbedtls_ms_time() + 1000; in dummy_ticket_parse()
1434 session->ticket_creation_time = mbedtls_ms_time() - in dummy_ticket_parse()
1442 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse()
1449 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse()
1452 session->ticket_flags = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE; in dummy_ticket_parse()
1455 session->ticket_flags = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK; in dummy_ticket_parse()
[all …]
/lib/lwip/lwip/src/include/netif/ppp/
A Dpppoe.h90 PACK_STRUCT_FIELD(u16_t session);
/lib/mbedtls/external/mbedtls/docs/
A D3.0-migration-guide.md844 1. Users who manually inspect parts of the current session through
847 2. Users of session resumption who query the current session
900 to configure a custom session cache implementation different
903 Those users will need to modify the API of their session cache
905 session IDs and values being instances of `mbedtls_ssl_session`:
979 the same session. This use of `mbedtls_ssl_get_session()`
981 * If the various session copies are later loaded into
984 load the same session into different contexts via
986 makes a copy of the session that's being loaded, this
988 * If the various session copies are later serialized
[all …]
/lib/lwip/lwip/contrib/apps/chargen/
A DREADME21 and open a telnet session to your lwip platform at port 19. You should see an

Completed in 158 milliseconds

12