/third_party/nghttp2/src/ |
H A D | tls.cc | 112 unsigned int session_id_length; in get_tls_session_info() local 113 tls_info->session_id = SSL_SESSION_get_id(session, &session_id_length); in get_tls_session_info() 114 tls_info->session_id_length = session_id_length; in get_tls_session_info()
|
H A D | tls.h | 85 size_t session_id_length; member
|
H A D | shrpx_mruby_module_env.cc | 403 unsigned int session_id_length = 0; in env_get_tls_session_id() local 404 auto session_id = SSL_SESSION_get_id(session, &session_id_length); in env_get_tls_session_id() 408 auto id = util::format_hex(balloc, StringRef{session_id, session_id_length}); in env_get_tls_session_id()
|
H A D | shrpx_log.cc | 728 unsigned int session_id_length = 0; in upstream_accesslog() 729 auto session_id = SSL_SESSION_get_id(session, &session_id_length); in upstream_accesslog() 730 if (session_id_length == 0) { in upstream_accesslog() 734 std::tie(p, last) = copy_hex_low(session_id, session_id_length, p, last); in upstream_accesslog()
|
H A D | shrpx_connection.cc | 822 tls_info.session_id_length); in write_tls_pending_handshake()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_sess.c | 291 *len = (unsigned int)s->session_id_length; in SSL_SESSION_get_id() 356 ss->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; in ssl_generate_session_id() 379 ss->session_id_length = 0; in ssl_generate_session_id() 399 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 400 tmp = (int)ss->session_id_length; in ssl_generate_session_id() 411 if (tmp == 0 || tmp > ss->session_id_length) { in ssl_generate_session_id() 417 ss->session_id_length = tmp; in ssl_generate_session_id() 420 (unsigned int)ss->session_id_length)) { in ssl_generate_session_id() 455 ss->session_id_length = 0; in ssl_get_new_session() 463 ss->session_id_length in ssl_get_new_session() [all...] |
H A D | ssl_txt.c | 65 for (i = 0; i < x->session_id_length; i++) { in SSL_SESSION_print() 173 if (x->session_id_length == 0 || x->master_key_length == 0) in SSL_SESSION_print_keylog() 186 for (i = 0; i < x->session_id_length; i++) { in SSL_SESSION_print_keylog()
|
H A D | ssl_asn1.c | 161 in->session_id, in->session_id_length); 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length,
|
H A D | ssl_lib.c | 1002 r.session_id_length = id_len; in SSL_has_matching_session_id() 3285 if (a->session_id_length < sizeof(tmp_storage)) { in ssl_session_hash() 3287 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash() 3310 if (a->session_id_length != b->session_id_length) in ssl_session_cmp() 3312 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp() 3840 * If the session_id_length is 0, we are not supposed to cache it, and it in ssl_update_cache() 3843 if (s->session->session_id_length == 0) in ssl_update_cache()
|
H A D | ssl_local.h | 574 size_t session_id_length; member
|
H A D | t1_lib.c | 1984 sess->session_id_length = sesslen; in tls_decrypt_ticket()
|
/third_party/openssl/ssl/ |
H A D | ssl_sess.c | 319 *len = (unsigned int)s->session_id_length; in SSL_SESSION_get_id() 384 ss->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; in ssl_generate_session_id() 407 ss->session_id_length = 0; in ssl_generate_session_id() 427 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 428 tmp = (int)ss->session_id_length; in ssl_generate_session_id() 439 if (tmp == 0 || tmp > ss->session_id_length) { in ssl_generate_session_id() 445 ss->session_id_length = tmp; in ssl_generate_session_id() 448 (unsigned int)ss->session_id_length)) { in ssl_generate_session_id() 483 ss->session_id_length = 0; in ssl_get_new_session() 491 ss->session_id_length in ssl_get_new_session() [all...] |
H A D | ssl_txt.c | 65 for (i = 0; i < x->session_id_length; i++) { in SSL_SESSION_print() 173 if (x->session_id_length == 0 || x->master_key_length == 0) in SSL_SESSION_print_keylog() 186 for (i = 0; i < x->session_id_length; i++) { in SSL_SESSION_print_keylog()
|
H A D | ssl_asn1.c | 161 in->session_id, in->session_id_length); 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length,
|
H A D | ssl_lib.c | 938 r.session_id_length = id_len; in SSL_has_matching_session_id() 3185 if (a->session_id_length < sizeof(tmp_storage)) { in ssl_session_hash() 3187 memcpy(tmp_storage, a->session_id, a->session_id_length); in ssl_session_hash() 3210 if (a->session_id_length != b->session_id_length) in ssl_session_cmp() 3212 return memcmp(a->session_id, b->session_id, a->session_id_length); in ssl_session_cmp() 3740 * If the session_id_length is 0, we are not supposed to cache it, and it in ssl_update_cache() 3744 if (s->session->session_id_length == 0 || s->session->not_resumable) in ssl_update_cache()
|
H A D | ssl_local.h | 567 size_t session_id_length; member
|
H A D | t1_lib.c | 1964 sess->session_id_length = sesslen; in tls_decrypt_ticket()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1212 assert(s->session->session_id_length <= sizeof(s->session->session_id)); in tls_construct_client_hello() 1213 sess_id_len = s->session->session_id_length; in tls_construct_client_hello() 1563 && session_id_len == s->session->session_id_length in tls_process_server_hello() 1585 if (s->session->session_id_length > 0) { in tls_process_server_hello() 1601 s->session->session_id_length = session_id_len; in tls_process_server_hello() 2500 if (SSL_IS_TLS13(s) || s->session->session_id_length > 0) { in tls_process_new_session_ticket() 2586 * but s->session->session_id_length is a size_t in tls_process_new_session_ticket() 2596 s->session->session_id_length = sess_len; in tls_process_new_session_ticket()
|
H A D | statem_srvr.c | 1441 * 7-8 session_id_length in tls_process_client_hello() 2364 s->session->session_id_length = 0; in tls_construct_server_hello() 2370 sl = s->session->session_id_length; in tls_construct_server_hello() 3894 s->session->session_id_length) in construct_stateful_ticket()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1204 assert(s->session->session_id_length <= sizeof(s->session->session_id)); in tls_construct_client_hello() 1205 sess_id_len = s->session->session_id_length; in tls_construct_client_hello() 1555 && session_id_len == s->session->session_id_length in tls_process_server_hello() 1577 if (s->session->session_id_length > 0) { in tls_process_server_hello() 1593 s->session->session_id_length = session_id_len; in tls_process_server_hello() 2492 if (SSL_IS_TLS13(s) || s->session->session_id_length > 0) { in tls_process_new_session_ticket() 2578 * but s->session->session_id_length is a size_t in tls_process_new_session_ticket() 2588 s->session->session_id_length = sess_len; in tls_process_new_session_ticket()
|
H A D | statem_srvr.c | 1430 * 7-8 session_id_length in tls_process_client_hello() 2343 s->session->session_id_length = 0; in tls_construct_server_hello() 2349 sl = s->session->session_id_length; in tls_construct_server_hello() 3873 s->session->session_id_length) in construct_stateful_ticket()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | ssl.rs | 15 session_id_length: c_uint, 39 session_id_length: c_uint, 73 session_id_length: c_uint,
|
/third_party/node/src/crypto/ |
H A D | crypto_tls.cc | 155 unsigned int session_id_length; in NewSessionCallback() local 157 SSL_SESSION_get_id(sess, &session_id_length); in NewSessionCallback() 162 session_id_length).FromMaybe(Local<Object>()); in NewSessionCallback()
|
/third_party/openssl/test/ |
H A D | sslapitest.c | 8840 early->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; in test_session_timeout() 8842 middle->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; in test_session_timeout() 8844 late->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; in test_session_timeout()
|