/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_sess.c | 386 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) { in ssl_generate_session_id() 394 else if (s->session_ctx->generate_session_id) in ssl_generate_session_id() 395 cb = s->session_ctx->generate_session_id; in ssl_generate_session_id() 396 CRYPTO_THREAD_unlock(s->session_ctx->lock); in ssl_generate_session_id() 440 if (s->session_ctx->session_timeout == 0) in ssl_get_new_session() 443 ss->timeout = s->session_ctx->session_timeout; in ssl_get_new_session() 489 if ((s->session_ctx->session_cache_mode in lookup_sess_in_cache() 500 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) in lookup_sess_in_cache() 502 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); in lookup_sess_in_cache() 507 CRYPTO_THREAD_unlock(s->session_ctx in lookup_sess_in_cache() [all...] |
H A D | s3_msg.c | 59 SSL_CTX_remove_session(s->session_ctx, s->session); in ssl3_send_alert()
|
H A D | ssl_lib.c | 834 s->session_ctx = ctx; in SSL_new() 1005 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock)) in SSL_has_matching_session_id() 1007 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r); in SSL_has_matching_session_id() 1008 CRYPTO_THREAD_unlock(ssl->session_ctx->lock); in SSL_has_matching_session_id() 1287 SSL_CTX_free(s->session_ctx); in SSL_free() 3859 i = s->session_ctx->session_cache_mode; in ssl_update_cache() 3878 || s->session_ctx->remove_session_cb != NULL in ssl_update_cache() 3880 SSL_CTX_add_session(s->session_ctx, s->session); in ssl_update_cache() 3887 if (s->session_ctx->new_session_cb != NULL) { in ssl_update_cache() 3889 if (!s->session_ctx in ssl_update_cache() [all...] |
/third_party/openssl/ssl/ |
H A D | ssl_sess.c | 414 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) { in ssl_generate_session_id() 422 else if (s->session_ctx->generate_session_id) in ssl_generate_session_id() 423 cb = s->session_ctx->generate_session_id; in ssl_generate_session_id() 424 CRYPTO_THREAD_unlock(s->session_ctx->lock); in ssl_generate_session_id() 468 if (s->session_ctx->session_timeout == 0) in ssl_get_new_session() 471 ss->timeout = s->session_ctx->session_timeout; in ssl_get_new_session() 517 if ((s->session_ctx->session_cache_mode in lookup_sess_in_cache() 528 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) in lookup_sess_in_cache() 530 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); in lookup_sess_in_cache() 535 CRYPTO_THREAD_unlock(s->session_ctx in lookup_sess_in_cache() [all...] |
H A D | s3_msg.c | 59 SSL_CTX_remove_session(s->session_ctx, s->session); in ssl3_send_alert()
|
H A D | ssl_lib.c | 774 s->session_ctx = ctx; in SSL_new() 941 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock)) in SSL_has_matching_session_id() 943 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r); in SSL_has_matching_session_id() 944 CRYPTO_THREAD_unlock(ssl->session_ctx->lock); in SSL_has_matching_session_id() 1225 SSL_CTX_free(s->session_ctx); in SSL_free() 3760 i = s->session_ctx->session_cache_mode; in ssl_update_cache() 3779 || s->session_ctx->remove_session_cb != NULL in ssl_update_cache() 3781 SSL_CTX_add_session(s->session_ctx, s->session); in ssl_update_cache() 3788 if (s->session_ctx->new_session_cb != NULL) { in ssl_update_cache() 3790 if (!s->session_ctx in ssl_update_cache() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; in eap_server_tls_ssl_init() local 76 os_memcpy(session_ctx, "hostapd", 7); in eap_server_tls_ssl_init() 77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init() 79 flags, session_ctx, in eap_server_tls_ssl_init() 80 sizeof(session_ctx))) { in eap_server_tls_ssl_init()
|
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), in eap_sim_db_init() 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) eap_sim_db_init() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; in eap_server_tls_ssl_init() local 76 os_memcpy(session_ctx, "hostapd", 7); in eap_server_tls_ssl_init() 77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init() 79 flags, session_ctx, in eap_server_tls_ssl_init() 80 sizeof(session_ctx))) { in eap_server_tls_ssl_init()
|
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_lib.c | 198 /* N.B. s->session_ctx == s->ctx here */ in tls_setup_handshake() 199 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept); in tls_setup_handshake() 201 /* N.B. s->ctx may not equal s->session_ctx */ in tls_setup_handshake() 208 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect); in tls_setup_handshake() 210 ssl_tsan_counter(s->session_ctx, in tls_setup_handshake() 211 &s->session_ctx->stats.sess_connect_renegotiate); in tls_setup_handshake() 1135 /* N.B. s->ctx may not equal s->session_ctx */ in tls_finish_handshake() 1144 if ((s->session_ctx in tls_finish_handshake() [all...] |
H A D | extensions.c | 969 if (!ossl_assert(s->ctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { in final_server_name() 977 else if (s->session_ctx->ext.servername_cb != NULL) in final_server_name() 978 ret = s->session_ctx->ext.servername_cb(s, &altmp, in final_server_name() 979 s->session_ctx->ext.servername_arg); in final_server_name() 1002 * move the sess_accept increment from the session_ctx to the new in final_server_name() 1006 if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx in final_server_name() 1009 ssl_tsan_decr(s->session_ctx, &s->session_ctx->stats.sess_accept); in final_server_name()
|
H A D | extensions_srvr.c | 726 s->session_ctx->ext.cookie_hmac_key, in tls_parse_ctos_cookie() 727 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_parse_ctos_cookie() 1130 && !SSL_CTX_remove_session(s->session_ctx, sess)) { in tls_parse_ctos_psk() 1837 s->session_ctx->ext.cookie_hmac_key, in tls_construct_stoc_cookie() 1838 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_construct_stoc_cookie()
|
H A D | statem_clnt.c | 1586 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); in tls_process_server_hello() 2512 if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 in tls_process_new_session_ticket() 2519 SSL_CTX_remove_session(s->session_ctx, s->session); in tls_process_new_session_ticket()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_lib.c | 177 /* N.B. s->session_ctx == s->ctx here */ in tls_setup_handshake() 178 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept); in tls_setup_handshake() 180 /* N.B. s->ctx may not equal s->session_ctx */ in tls_setup_handshake() 187 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect); in tls_setup_handshake() 189 ssl_tsan_counter(s->session_ctx, in tls_setup_handshake() 190 &s->session_ctx->stats.sess_connect_renegotiate); in tls_setup_handshake() 1100 /* N.B. s->ctx may not equal s->session_ctx */ in tls_finish_handshake() 1109 if ((s->session_ctx in tls_finish_handshake() [all...] |
H A D | extensions.c | 941 if (!ossl_assert(s->ctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { in final_server_name() 949 else if (s->session_ctx->ext.servername_cb != NULL) in final_server_name() 950 ret = s->session_ctx->ext.servername_cb(s, &altmp, in final_server_name() 951 s->session_ctx->ext.servername_arg); in final_server_name() 974 * move the sess_accept increment from the session_ctx to the new in final_server_name() 978 if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx in final_server_name() 981 ssl_tsan_decr(s->session_ctx, &s->session_ctx->stats.sess_accept); in final_server_name()
|
H A D | extensions_srvr.c | 726 s->session_ctx->ext.cookie_hmac_key, in tls_parse_ctos_cookie() 727 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_parse_ctos_cookie() 1130 && !SSL_CTX_remove_session(s->session_ctx, sess)) { in tls_parse_ctos_psk() 1804 s->session_ctx->ext.cookie_hmac_key, in tls_construct_stoc_cookie() 1805 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_construct_stoc_cookie()
|
H A D | statem_clnt.c | 1578 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); in tls_process_server_hello() 2504 if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 in tls_process_new_session_ticket() 2511 SSL_CTX_remove_session(s->session_ctx, s->session); in tls_process_new_session_ticket()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) in hostapd_sim_db_cb() argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { in hostapd_sim_db_cb() 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx); in hostapd_sim_db_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) in hostapd_sim_db_cb() argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { in hostapd_sim_db_cb() 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx); in hostapd_sim_db_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_none.c | 83 const u8 *session_ctx, size_t session_ctx_len) in tls_connection_set_verify() 81 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) tls_connection_set_verify() argument
|
H A D | tls.h | 360 * @session_ctx: Session caching context or %NULL to use default 361 * @session_ctx_len: Length of @session_ctx in bytes. 368 const u8 *session_ctx,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_none.c | 83 const u8 *session_ctx, size_t session_ctx_len) in tls_connection_set_verify() 81 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) tls_connection_set_verify() argument
|
H A D | tls.h | 366 * @session_ctx: Session caching context or %NULL to use default 367 * @session_ctx_len: Length of @session_ctx in bytes. 374 const u8 *session_ctx,
|