| /lib/mbedtls/external/mbedtls/library/ |
| A D | ssl_tls.c | 3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save() 3694 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls12_session_load() 3699 memcpy(session->ticket, p, session->ticket_len); in ssl_tls12_session_load() 3836 memcpy(p, session->resumption_key, session->resumption_key_len); in ssl_tls13_session_save() 3890 if (session->ticket != NULL && session->ticket_len > 0) { in ssl_tls13_session_save() 3891 memcpy(p, session->ticket, session->ticket_len); in ssl_tls13_session_save() 3924 memcpy(session->resumption_key, p, session->resumption_key_len); in ssl_tls13_session_load() 4024 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls13_session_load() 4028 memcpy(session->ticket, p, session->ticket_len); in ssl_tls13_session_load() 8342 if (!session) { in ssl_calc_finished_tls_generic() [all …]
|
| A D | ssl_tls13_client.c | 686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket() 716 *identity = session->ticket; in ssl_tls13_ticket_get_identity() 2746 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_parse_new_session_ticket_early_data_ext() local 2841 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_parse_new_session_ticket() local 2886 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2888 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket() 2889 session->ticket_len = 0; in ssl_tls13_parse_new_session_ticket() 2898 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket() 2937 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_postprocess_new_session_ticket() local 2981 session->resumption_key, in ssl_tls13_postprocess_new_session_ticket() [all …]
|
| A D | ssl_tls13_server.c | 187 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match_ticket() argument 320 mbedtls_ssl_session_free(session); in ssl_tls13_offered_psks_check_identity_match_ticket() 335 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match() argument 339 ((void) session); in ssl_tls13_offered_psks_check_identity_match() 579 mbedtls_ssl_session session; in ssl_tls13_parse_pre_shared_key_ext() local 603 &psk->type, &session); in ssl_tls13_parse_pre_shared_key_ext() 623 session.ticket_flags & in ssl_tls13_parse_pre_shared_key_ext() 3148 mbedtls_ssl_session *session = ssl->session; in ssl_tls13_prepare_new_session_ticket() local 3175 if (session->ticket_alpn == NULL) { in ssl_tls13_prepare_new_session_ticket() 3227 session->resumption_key, in ssl_tls13_prepare_new_session_ticket() [all …]
|
| A D | ssl_cache.c | 77 mbedtls_ssl_session *session) in mbedtls_ssl_cache_get() argument 94 ret = mbedtls_ssl_session_load(session, in mbedtls_ssl_cache_get() 95 entry->session, in mbedtls_ssl_cache_get() 121 if (entry->session != NULL) { in ssl_cache_entry_zeroize() 122 mbedtls_zeroize_and_free(entry->session, entry->session_len); in ssl_cache_entry_zeroize() 230 if (cur->session != NULL) { in ssl_cache_pick_writing_slot() 249 const mbedtls_ssl_session *session) in mbedtls_ssl_cache_set() argument 273 ret = mbedtls_ssl_session_save(session, NULL, 0, &session_serialized_len); in mbedtls_ssl_cache_set() 285 ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_cache_set() 300 cur->session = session_serialized; in mbedtls_ssl_cache_set()
|
| A D | ssl_misc.h | 2851 int mbedtls_ssl_session_set_hostname(mbedtls_ssl_session *session, 2867 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument 2869 return session->ticket_flags & in mbedtls_ssl_tls13_session_get_ticket_flags() 2880 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument 2886 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk() argument 2889 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION); in mbedtls_ssl_tls13_session_ticket_allow_psk() 2893 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk_ephemeral() argument 2900 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_early_data() argument 2903 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA); in mbedtls_ssl_tls13_session_ticket_allow_early_data() 2907 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_set_ticket_flags() argument [all …]
|
| A D | ssl_ticket.c | 300 const mbedtls_ssl_session *session, in mbedtls_ssl_ticket_write() argument 350 if ((ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_ticket_write() 419 mbedtls_ssl_session *session, in mbedtls_ssl_ticket_parse() argument 500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse() 509 ret = mbedtls_ssl_session_get_ticket_creation_time(session, in mbedtls_ssl_ticket_parse()
|
| A D | ssl_tls12_server.c | 475 mbedtls_ssl_session session; in ssl_parse_session_ticket_ext() local 477 mbedtls_ssl_session_init(&session); in ssl_parse_session_ticket_ext() 505 mbedtls_ssl_session_free(&session); in ssl_parse_session_ticket_ext() 522 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext() 523 memcpy(&session.id, ssl->session_negotiate->id, session.id_len); in ssl_parse_session_ticket_ext() 2119 if (session->id_len == 0) { in ssl_handle_id_based_session_resumption() 2134 session->id, in ssl_handle_id_based_session_resumption() 2135 session->id_len, in ssl_handle_id_based_session_resumption() 2141 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption() 2147 mbedtls_ssl_session_free(session); in ssl_handle_id_based_session_resumption() [all …]
|
| A D | ssl_tls13_generic.c | 1345 if (ssl->session) { in mbedtls_ssl_tls13_handshake_wrapup() 1346 mbedtls_ssl_session_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup() 1347 mbedtls_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup() 1349 ssl->session = ssl->session_negotiate; in mbedtls_ssl_tls13_handshake_wrapup()
|
| A D | ssl_tls12_client.c | 3444 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket() 3445 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket() 3446 ssl->session->ticket_len); in ssl_parse_new_session_ticket() 3447 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket() 3448 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket()
|
| /lib/mbedtls/external/mbedtls/tests/src/test_helpers/ |
| A D | ssl_helpers.c | 1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session() 1688 session->id_len = sizeof(session->id); in mbedtls_test_ssl_tls12_populate_session() 1689 memset(session->id, 66, session->id_len); in mbedtls_test_ssl_tls12_populate_session() 1690 memset(session->master, 17, sizeof(session->master)); in mbedtls_test_ssl_tls12_populate_session() 1705 session->peer_cert = mbedtls_calloc(1, sizeof(*session->peer_cert)); in mbedtls_test_ssl_tls12_populate_session() 1773 session->mfl_code = 1; in mbedtls_test_ssl_tls12_populate_session() 1776 session->encrypt_then_mac = 1; in mbedtls_test_ssl_tls12_populate_session() 1793 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session() 1795 session->ticket_flags = 0x7; in mbedtls_test_ssl_tls13_populate_session() 1798 memset(session->resumption_key, 0x99, sizeof(session->resumption_key)); in mbedtls_test_ssl_tls13_populate_session() [all …]
|
| /lib/mbedtls/external/mbedtls/include/mbedtls/ |
| A D | ssl.h | 917 mbedtls_ssl_session *session); 2639 mbedtls_ssl_session *session, 2680 if (session == NULL || ticket_creation_time == NULL || in mbedtls_ssl_session_get_ticket_creation_time() 2702 return &session->MBEDTLS_PRIVATE(id); in mbedtls_ssl_session_get_id() 2714 return session->MBEDTLS_PRIVATE(id_len); in mbedtls_ssl_session_get_id_len() 2726 return session->MBEDTLS_PRIVATE(ciphersuite); in mbedtls_ssl_session_get_ciphersuite_id() 3286 int mbedtls_ssl_session_load(mbedtls_ssl_session *session, 3315 int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, 4863 mbedtls_ssl_session *session); 5558 void mbedtls_ssl_session_init(mbedtls_ssl_session *session); [all …]
|
| A D | ssl_cache.h | 58 unsigned char *MBEDTLS_PRIVATE(session); /*!< serialized session */ 102 mbedtls_ssl_session *session); 120 const mbedtls_ssl_session *session);
|
| /lib/lwip/lwip/doc/ |
| A D | ppp.txt | 106 printf("status_cb: Unable to open PPP session\n"); 180 * Creating a new PPPoS session 215 * Creating a new PPPoE session 238 * Creating a new PPPoL2TP session 273 * Basic PPP client configuration. Can only be set if PPP session is in the 288 * if PPP session is in the dead state (i.e. disconnected). 331 * Only for PPPoS, the PPP session should be up and waiting for input. 343 * be called if PPP session is in the dead state (i.e. disconnected). 354 * Initiate the end of the PPP session, without carrier lost signal 371 * Free the PPP control block, can only be called if PPP session is in the [all …]
|
| /lib/lwip/lwip/src/netif/ppp/ |
| A D | pppoe.c | 342 && sc->sc_session == session in pppoe_find_softc_by_session() 390 u16_t session, plen; in pppoe_disc_input() local 426 session = 0; in pppoe_disc_input() 438 session = lwip_ntohs(ph->session); in pppoe_disc_input() 634 sc->sc_session = session; in pppoe_disc_input() 657 (u16_t)ph->code, session)); in pppoe_disc_input() 672 u16_t session, plen; in pppoe_data_input() local 703 session = lwip_ntohs(ph->session); in pppoe_data_input() 704 sc = pppoe_find_softc_by_session(session, netif); in pppoe_data_input() 708 pppoe_send_padt(netif, session, shost); in pppoe_data_input() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/include/test/ |
| A D | ssl_helpers.h | 548 int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session, 554 int mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session, 611 void *p_ticket, const mbedtls_ssl_session *session, 615 int mbedtls_test_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, 625 mbedtls_ssl_session *session);
|
| /lib/lwip/lwip/src/apps/altcp_tls/ |
| A D | altcp_tls_mbedtls.c | 678 altcp_tls_init_session(struct altcp_tls_session *session) in altcp_tls_init_session() argument 680 if (session) in altcp_tls_init_session() 681 mbedtls_ssl_session_init(&session->data); in altcp_tls_init_session() 687 if (session && conn && conn->state) { in altcp_tls_get_session() 689 int ret = mbedtls_ssl_get_session(&state->ssl_context, &session->data); in altcp_tls_get_session() 698 if (session && conn && conn->state) { in altcp_tls_set_session() 702 if (session->data.MBEDTLS_PRIVATE(start)) in altcp_tls_set_session() 704 ret = mbedtls_ssl_set_session(&state->ssl_context, &session->data); in altcp_tls_set_session() 711 altcp_tls_free_session(struct altcp_tls_session *session) in altcp_tls_free_session() argument 713 if (session) in altcp_tls_free_session() [all …]
|
| /lib/lwip/lwip/src/apps/smtp/ |
| A D | smtp.c | 152 #define SMTP_USERNAME(session) (session)->username argument 153 #define SMTP_PASS(session) (session)->pass argument 154 #define SMTP_AUTH_PLAIN_DATA(session) (session)->auth_plain argument 155 #define SMTP_AUTH_PLAIN_LEN(session) (session)->auth_plain_len argument 157 #define SMTP_USERNAME(session) smtp_username argument 158 #define SMTP_PASS(session) smtp_pass argument 159 #define SMTP_AUTH_PLAIN_DATA(session) smtp_auth_plain argument 160 #define SMTP_AUTH_PLAIN_LEN(session) smtp_auth_plain_len argument
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_ssl.function | 2157 mbedtls_ssl_session session; 2164 mbedtls_ssl_session_init(&session); 2203 mbedtls_ssl_session_free(&session); 2219 mbedtls_ssl_session_free(&session); 2230 mbedtls_ssl_session session; 2237 mbedtls_ssl_session_init(&session); 2289 mbedtls_ssl_session session; 2362 mbedtls_ssl_session session; 2440 mbedtls_ssl_session session; 2468 TEST_ASSERT(*mbedtls_ssl_session_get_id(&session) == session.id); [all …]
|
| A D | test_suite_ssl.data | 916 SSL session serialization: Wrong major version 920 SSL session serialization: Wrong minor version 924 SSL session serialization: Wrong patch version 928 SSL session serialization: Wrong config 932 TLS 1.3: CLI: session serialization: Wrong major version 936 TLS 1.3: CLI: session serialization: Wrong minor version 940 TLS 1.3: CLI: session serialization: Wrong patch version 944 TLS 1.3: CLI: session serialization: Wrong config 960 TLS 1.3: SRV: session serialization: Wrong config 3247 Force a bad session id length [all …]
|
| /lib/mbedtls/external/mbedtls/tests/ |
| A D | Descriptions.txt | 21 covered by compat.sh: session resumption (using session cache or tickets),
|
| /lib/efi_loader/ |
| A D | efi_variable_tee.c | 48 u32 session; member 81 conn->session = arg.session; in get_connection() 123 tee_close_session(conn.tee, conn.session); in optee_mm_communicate() 129 arg.session = conn.session; in optee_mm_communicate() 139 tee_close_session(conn.tee, conn.session); in optee_mm_communicate()
|
| /lib/mbedtls/external/mbedtls/programs/ssl/ |
| A D | ssl_server2.c | 1386 int dummy_ticket_write(void *p_ticket, const mbedtls_ssl_session *session, in dummy_ticket_write() argument 1403 if ((ret = mbedtls_ssl_session_save(session, p, end - p, in dummy_ticket_write() 1413 int dummy_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, in dummy_ticket_parse() argument 1419 if ((ret = mbedtls_ssl_session_load(session, buf + 4, len - 4)) != 0) { in dummy_ticket_parse() 1430 session->ticket_creation_time = mbedtls_ms_time() + 1000; in dummy_ticket_parse() 1434 session->ticket_creation_time = mbedtls_ms_time() - in dummy_ticket_parse() 1442 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse() 1449 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse() 1452 session->ticket_flags = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE; in dummy_ticket_parse() 1455 session->ticket_flags = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK; in dummy_ticket_parse() [all …]
|
| /lib/lwip/lwip/src/include/netif/ppp/ |
| A D | pppoe.h | 90 PACK_STRUCT_FIELD(u16_t session);
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | 3.0-migration-guide.md | 844 1. Users who manually inspect parts of the current session through 847 2. Users of session resumption who query the current session 900 to configure a custom session cache implementation different 903 Those users will need to modify the API of their session cache 905 session IDs and values being instances of `mbedtls_ssl_session`: 979 the same session. This use of `mbedtls_ssl_get_session()` 981 * If the various session copies are later loaded into 984 load the same session into different contexts via 986 makes a copy of the session that's being loaded, this 988 * If the various session copies are later serialized [all …]
|
| /lib/lwip/lwip/contrib/apps/chargen/ |
| A D | README | 21 and open a telnet session to your lwip platform at port 19. You should see an
|