Home
last modified time | relevance | path

Searched refs:session_ctx (Results 1 - 25 of 44) sorted by relevance

12

/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_sess.c386 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) { in ssl_generate_session_id()
394 else if (s->session_ctx->generate_session_id) in ssl_generate_session_id()
395 cb = s->session_ctx->generate_session_id; in ssl_generate_session_id()
396 CRYPTO_THREAD_unlock(s->session_ctx->lock); in ssl_generate_session_id()
440 if (s->session_ctx->session_timeout == 0) in ssl_get_new_session()
443 ss->timeout = s->session_ctx->session_timeout; in ssl_get_new_session()
489 if ((s->session_ctx->session_cache_mode in lookup_sess_in_cache()
500 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) in lookup_sess_in_cache()
502 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); in lookup_sess_in_cache()
507 CRYPTO_THREAD_unlock(s->session_ctx in lookup_sess_in_cache()
[all...]
H A Ds3_msg.c59 SSL_CTX_remove_session(s->session_ctx, s->session); in ssl3_send_alert()
H A Dssl_lib.c834 s->session_ctx = ctx; in SSL_new()
1005 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock)) in SSL_has_matching_session_id()
1007 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r); in SSL_has_matching_session_id()
1008 CRYPTO_THREAD_unlock(ssl->session_ctx->lock); in SSL_has_matching_session_id()
1287 SSL_CTX_free(s->session_ctx); in SSL_free()
3859 i = s->session_ctx->session_cache_mode; in ssl_update_cache()
3878 || s->session_ctx->remove_session_cb != NULL in ssl_update_cache()
3880 SSL_CTX_add_session(s->session_ctx, s->session); in ssl_update_cache()
3887 if (s->session_ctx->new_session_cb != NULL) { in ssl_update_cache()
3889 if (!s->session_ctx in ssl_update_cache()
[all...]
/third_party/openssl/ssl/
H A Dssl_sess.c414 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) { in ssl_generate_session_id()
422 else if (s->session_ctx->generate_session_id) in ssl_generate_session_id()
423 cb = s->session_ctx->generate_session_id; in ssl_generate_session_id()
424 CRYPTO_THREAD_unlock(s->session_ctx->lock); in ssl_generate_session_id()
468 if (s->session_ctx->session_timeout == 0) in ssl_get_new_session()
471 ss->timeout = s->session_ctx->session_timeout; in ssl_get_new_session()
517 if ((s->session_ctx->session_cache_mode in lookup_sess_in_cache()
528 if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) in lookup_sess_in_cache()
530 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); in lookup_sess_in_cache()
535 CRYPTO_THREAD_unlock(s->session_ctx in lookup_sess_in_cache()
[all...]
H A Ds3_msg.c59 SSL_CTX_remove_session(s->session_ctx, s->session); in ssl3_send_alert()
H A Dssl_lib.c774 s->session_ctx = ctx; in SSL_new()
941 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock)) in SSL_has_matching_session_id()
943 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r); in SSL_has_matching_session_id()
944 CRYPTO_THREAD_unlock(ssl->session_ctx->lock); in SSL_has_matching_session_id()
1225 SSL_CTX_free(s->session_ctx); in SSL_free()
3760 i = s->session_ctx->session_cache_mode; in ssl_update_cache()
3779 || s->session_ctx->remove_session_cb != NULL in ssl_update_cache()
3781 SSL_CTX_add_session(s->session_ctx, s->session); in ssl_update_cache()
3788 if (s->session_ctx->new_session_cb != NULL) { in ssl_update_cache()
3790 if (!s->session_ctx in ssl_update_cache()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_tls_common.c49 u8 session_ctx[8]; in eap_server_tls_ssl_init() local
76 os_memcpy(session_ctx, "hostapd", 7); in eap_server_tls_ssl_init()
77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init()
79 flags, session_ctx, in eap_server_tls_ssl_init()
80 sizeof(session_ctx))) { in eap_server_tls_ssl_init()
H A Deap_sim_db.h35 void (*get_complete_cb)(void *ctx, void *session_ctx),
H A Deap_sim_db.c64 void (*get_complete_cb)(void *ctx, void *session_ctx);
756 void (*get_complete_cb)(void *ctx, void *session_ctx), in eap_sim_db_init()
755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) eap_sim_db_init() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_tls_common.c49 u8 session_ctx[8]; in eap_server_tls_ssl_init() local
76 os_memcpy(session_ctx, "hostapd", 7); in eap_server_tls_ssl_init()
77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init()
79 flags, session_ctx, in eap_server_tls_ssl_init()
80 sizeof(session_ctx))) { in eap_server_tls_ssl_init()
H A Deap_sim_db.h35 void (*get_complete_cb)(void *ctx, void *session_ctx),
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_lib.c198 /* N.B. s->session_ctx == s->ctx here */ in tls_setup_handshake()
199 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept); in tls_setup_handshake()
201 /* N.B. s->ctx may not equal s->session_ctx */ in tls_setup_handshake()
208 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect); in tls_setup_handshake()
210 ssl_tsan_counter(s->session_ctx, in tls_setup_handshake()
211 &s->session_ctx->stats.sess_connect_renegotiate); in tls_setup_handshake()
1135 /* N.B. s->ctx may not equal s->session_ctx */ in tls_finish_handshake()
1144 if ((s->session_ctx in tls_finish_handshake()
[all...]
H A Dextensions.c969 if (!ossl_assert(s->ctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { in final_server_name()
977 else if (s->session_ctx->ext.servername_cb != NULL) in final_server_name()
978 ret = s->session_ctx->ext.servername_cb(s, &altmp, in final_server_name()
979 s->session_ctx->ext.servername_arg); in final_server_name()
1002 * move the sess_accept increment from the session_ctx to the new in final_server_name()
1006 if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx in final_server_name()
1009 ssl_tsan_decr(s->session_ctx, &s->session_ctx->stats.sess_accept); in final_server_name()
H A Dextensions_srvr.c726 s->session_ctx->ext.cookie_hmac_key, in tls_parse_ctos_cookie()
727 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_parse_ctos_cookie()
1130 && !SSL_CTX_remove_session(s->session_ctx, sess)) { in tls_parse_ctos_psk()
1837 s->session_ctx->ext.cookie_hmac_key, in tls_construct_stoc_cookie()
1838 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_construct_stoc_cookie()
H A Dstatem_clnt.c1586 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); in tls_process_server_hello()
2512 if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 in tls_process_new_session_ticket()
2519 SSL_CTX_remove_session(s->session_ctx, s->session); in tls_process_new_session_ticket()
/third_party/openssl/ssl/statem/
H A Dstatem_lib.c177 /* N.B. s->session_ctx == s->ctx here */ in tls_setup_handshake()
178 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept); in tls_setup_handshake()
180 /* N.B. s->ctx may not equal s->session_ctx */ in tls_setup_handshake()
187 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect); in tls_setup_handshake()
189 ssl_tsan_counter(s->session_ctx, in tls_setup_handshake()
190 &s->session_ctx->stats.sess_connect_renegotiate); in tls_setup_handshake()
1100 /* N.B. s->ctx may not equal s->session_ctx */ in tls_finish_handshake()
1109 if ((s->session_ctx in tls_finish_handshake()
[all...]
H A Dextensions.c941 if (!ossl_assert(s->ctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { in final_server_name()
949 else if (s->session_ctx->ext.servername_cb != NULL) in final_server_name()
950 ret = s->session_ctx->ext.servername_cb(s, &altmp, in final_server_name()
951 s->session_ctx->ext.servername_arg); in final_server_name()
974 * move the sess_accept increment from the session_ctx to the new in final_server_name()
978 if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx in final_server_name()
981 ssl_tsan_decr(s->session_ctx, &s->session_ctx->stats.sess_accept); in final_server_name()
H A Dextensions_srvr.c726 s->session_ctx->ext.cookie_hmac_key, in tls_parse_ctos_cookie()
727 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_parse_ctos_cookie()
1130 && !SSL_CTX_remove_session(s->session_ctx, sess)) { in tls_parse_ctos_psk()
1804 s->session_ctx->ext.cookie_hmac_key, in tls_construct_stoc_cookie()
1805 sizeof(s->session_ctx->ext.cookie_hmac_key)); in tls_construct_stoc_cookie()
H A Dstatem_clnt.c1578 ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); in tls_process_server_hello()
2504 if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 in tls_process_new_session_ticket()
2511 SSL_CTX_remove_session(s->session_ctx, s->session); in tls_process_new_session_ticket()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dauthsrv.c38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) in hostapd_sim_db_cb() argument
41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { in hostapd_sim_db_cb()
43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx); in hostapd_sim_db_cb()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dauthsrv.c38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) in hostapd_sim_db_cb() argument
41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { in hostapd_sim_db_cb()
43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx); in hostapd_sim_db_cb()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_none.c83 const u8 *session_ctx, size_t session_ctx_len) in tls_connection_set_verify()
81 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) tls_connection_set_verify() argument
H A Dtls.h360 * @session_ctx: Session caching context or %NULL to use default
361 * @session_ctx_len: Length of @session_ctx in bytes.
368 const u8 *session_ctx,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_none.c83 const u8 *session_ctx, size_t session_ctx_len) in tls_connection_set_verify()
81 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) tls_connection_set_verify() argument
H A Dtls.h366 * @session_ctx: Session caching context or %NULL to use default
367 * @session_ctx_len: Length of @session_ctx in bytes.
374 const u8 *session_ctx,

Completed in 42 milliseconds

12