/third_party/mbedtls/library/ |
H A D | ssl_cache.c | 39 size_t session_id_len, in ssl_cache_find_entry() 56 if (session_id_len != cur->session_id_len || in ssl_cache_find_entry() 58 cur->session_id_len) != 0) { in ssl_cache_find_entry() 76 size_t session_id_len, in mbedtls_ssl_cache_get() 89 ret = ssl_cache_find_entry(cache, session_id, session_id_len, &entry); in mbedtls_ssl_cache_get() 132 size_t session_id_len, in ssl_cache_pick_writing_slot() 154 if (session_id_len == cur->session_id_len && in ssl_cache_pick_writing_slot() 155 memcmp(session_id, cur->session_id, cur->session_id_len) in ssl_cache_pick_writing_slot() 37 ssl_cache_find_entry(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_find_entry() argument 74 mbedtls_ssl_cache_get(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session) mbedtls_ssl_cache_get() argument 130 ssl_cache_pick_writing_slot(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_pick_writing_slot() argument 246 mbedtls_ssl_cache_set(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session) mbedtls_ssl_cache_set() argument 321 mbedtls_ssl_cache_remove(void *data, unsigned char const *session_id, size_t session_id_len) mbedtls_ssl_cache_remove() argument [all...] |
H A D | ssl_client.c | 739 size_t session_id_len; in ssl_prepare_client_hello() local 813 session_id_len = session_negotiate->id_len; in ssl_prepare_client_hello() 817 if (session_id_len < 16 || session_id_len > 32 || in ssl_prepare_client_hello() 822 session_id_len = 0; in ssl_prepare_client_hello() 839 session_id_len = 32; in ssl_prepare_client_hello() 864 session_id_len = 32; in ssl_prepare_client_hello() 868 if (session_id_len != session_negotiate->id_len) { in ssl_prepare_client_hello() 869 session_negotiate->id_len = session_id_len; in ssl_prepare_client_hello() 870 if (session_id_len > in ssl_prepare_client_hello() [all...] |
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 39 $self->{session_id_len} = 0; 57 my $session_id_len = 0; 59 $session_id_len = unpack('C', substr($self->data, $ptr)); 61 $session = substr($self->data, $ptr, $session_id_len); 62 $ptr += $session_id_len; 113 $self->session_id_len($session_id_len); 124 print " Session ID Len:".$session_id_len."\n"; 147 $data .= pack('C', $self->session_id_len); 186 sub session_id_len subroutine [all...] |
H A D | ClientHello.pm | 34 $self->{session_id_len} = 0; 53 my $session_id_len = unpack('C', substr($self->data, $ptr)); 55 my $session = substr($self->data, $ptr, $session_id_len); 56 $ptr += $session_id_len; 85 $self->session_id_len($session_id_len); 97 print " Session ID Len:".$session_id_len."\n"; 139 $data .= pack('C', $self->session_id_len); 184 sub session_id_len subroutine 188 $self->{session_id_len} [all...] |
/third_party/openssl/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 39 $self->{session_id_len} = 0; 57 my $session_id_len = 0; 59 $session_id_len = unpack('C', substr($self->data, $ptr)); 61 $session = substr($self->data, $ptr, $session_id_len); 62 $ptr += $session_id_len; 113 $self->session_id_len($session_id_len); 124 print " Session ID Len:".$session_id_len."\n"; 147 $data .= pack('C', $self->session_id_len); 186 sub session_id_len subroutine [all...] |
H A D | ClientHello.pm | 34 $self->{session_id_len} = 0; 53 my $session_id_len = unpack('C', substr($self->data, $ptr)); 55 my $session = substr($self->data, $ptr, $session_id_len); 56 $ptr += $session_id_len; 85 $self->session_id_len($session_id_len); 97 print " Session ID Len:".$session_id_len."\n"; 139 $data .= pack('C', $self->session_id_len); 184 sub session_id_len subroutine 188 $self->{session_id_len} [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl_cache.h | 56 size_t MBEDTLS_PRIVATE(session_id_len); 90 * \param session_id_len The length of \p session_id in bytes. 101 size_t session_id_len, 111 * \param session_id_len The length of \p session_id in bytes. 119 size_t session_id_len, 129 * \param session_id_len The length of \p session_id in bytes. 138 size_t session_id_len);
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 50 size_t session_id_len; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 50 size_t session_id_len; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_server_write.c | 68 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; in tls_write_server_hello() 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() 75 conn->session_id, conn->session_id_len); in tls_write_server_hello() 94 *pos++ = conn->session_id_len; in tls_write_server_hello() 95 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_write_server_hello() 96 pos += conn->session_id_len; in tls_write_server_hello()
|
H A D | tlsv1_client_read.c | 155 if (conn->session_id_len && conn->session_id_len == *pos && in tls_process_server_hello() 156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { in tls_process_server_hello() 157 pos += 1 + conn->session_id_len; in tls_process_server_hello() 161 conn->session_id_len = *pos; in tls_process_server_hello() 163 os_memcpy(conn->session_id, pos, conn->session_id_len); in tls_process_server_hello() 164 pos += conn->session_id_len; in tls_process_server_hello() 167 conn->session_id, conn->session_id_len); in tls_process_server_hello()
|
H A D | tlsv1_client_i.h | 24 size_t session_id_len; member
|
H A D | tlsv1_server_i.h | 25 size_t session_id_len; member
|
H A D | tlsv1_client_write.c | 113 *pos++ = conn->session_id_len; in tls_send_client_hello() 114 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_send_client_hello() 115 pos += conn->session_id_len; in tls_send_client_hello()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_server_write.c | 68 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; in tls_write_server_hello() 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() 75 conn->session_id, conn->session_id_len); in tls_write_server_hello() 94 *pos++ = conn->session_id_len; in tls_write_server_hello() 95 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_write_server_hello() 96 pos += conn->session_id_len; in tls_write_server_hello()
|
H A D | tlsv1_client_read.c | 155 if (conn->session_id_len && conn->session_id_len == *pos && in tls_process_server_hello() 156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { in tls_process_server_hello() 157 pos += 1 + conn->session_id_len; in tls_process_server_hello() 161 conn->session_id_len = *pos; in tls_process_server_hello() 163 os_memcpy(conn->session_id, pos, conn->session_id_len); in tls_process_server_hello() 164 pos += conn->session_id_len; in tls_process_server_hello() 167 conn->session_id, conn->session_id_len); in tls_process_server_hello()
|
H A D | tlsv1_client_i.h | 24 size_t session_id_len; member
|
H A D | tlsv1_server_i.h | 25 size_t session_id_len; member
|
H A D | tlsv1_client_write.c | 101 *pos++ = conn->session_id_len; in tls_send_client_hello() 102 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_send_client_hello() 103 pos += conn->session_id_len; in tls_send_client_hello()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1387 size_t session_id_len; in tls_process_server_hello() local 1430 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1431 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1432 || session_id_len > SSL3_SESSION_ID_SIZE) { in tls_process_server_hello() 1478 if (session_id_len != s->tmp_session_id_len in tls_process_server_hello() 1480 session_id_len) != 0) { in tls_process_server_hello() 1562 if (session_id_len != 0 in tls_process_server_hello() 1563 && session_id_len == s->session->session_id_length in tls_process_server_hello() 1565 session_id_len) == 0) in tls_process_server_hello() 1601 s->session->session_id_length = session_id_len; in tls_process_server_hello() [all...] |
H A D | statem_srvr.c | 1470 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local 1474 || !PACKET_get_net_2(pkt, &session_id_len) in tls_process_client_hello() 1480 if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in tls_process_client_hello() 1487 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1494 clienthello->session_id_len = session_id_len; in tls_process_client_hello() 1520 &clienthello->session_id_len)) { in tls_process_client_hello() 1572 if (clienthello->session_id_len > 0) { in tls_process_client_hello() 1828 s->clienthello->session_id_len); in tls_early_post_process_client_hello() 1829 s->tmp_session_id_len = s->clienthello->session_id_len; in tls_early_post_process_client_hello() [all...] |
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1379 size_t session_id_len; in tls_process_server_hello() local 1422 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1423 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1424 || session_id_len > SSL3_SESSION_ID_SIZE) { in tls_process_server_hello() 1470 if (session_id_len != s->tmp_session_id_len in tls_process_server_hello() 1472 session_id_len) != 0) { in tls_process_server_hello() 1554 if (session_id_len != 0 in tls_process_server_hello() 1555 && session_id_len == s->session->session_id_length in tls_process_server_hello() 1557 session_id_len) == 0) in tls_process_server_hello() 1593 s->session->session_id_length = session_id_len; in tls_process_server_hello() [all...] |
H A D | statem_srvr.c | 1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local 1463 || !PACKET_get_net_2(pkt, &session_id_len) in tls_process_client_hello() 1469 if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in tls_process_client_hello() 1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1483 clienthello->session_id_len = session_id_len; in tls_process_client_hello() 1509 &clienthello->session_id_len)) { in tls_process_client_hello() 1808 s->clienthello->session_id_len); in tls_early_post_process_client_hello() 1809 s->tmp_session_id_len = s->clienthello->session_id_len; in tls_early_post_process_client_hello()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap.c | 684 size_t session_id_len = 0; in eap_peer_erp_init() local 731 session_id_len = ext_session_id_len; in eap_peer_erp_init() 734 session_id_len = sm->eapSessionIdLen; in eap_peer_erp_init() 737 if (!session_id || session_id_len == 0) { in eap_peer_erp_init() 744 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap.c | 692 size_t session_id_len = 0; in eap_peer_erp_init() local 739 session_id_len = ext_session_id_len; in eap_peer_erp_init() 742 session_id_len = sm->eapSessionIdLen; in eap_peer_erp_init() 745 if (!session_id || session_id_len == 0) { in eap_peer_erp_init() 752 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init()
|