Lines Matching full:session
602 ScopedSSL_SESSION session(SSL_SESSION_from_bytes(input.data(), input.size()));
603 if (!session) {
612 if (!SSL_SESSION_to_bytes(session.get(), &encoded_raw, &encoded_len)) {
627 session.reset(d2i_SSL_SESSION(NULL, &cptr, input.size()));
628 if (!session || cptr != input.data() + input.size()) {
634 int len = i2d_SSL_SESSION(session.get(), NULL);
647 len = i2d_SSL_SESSION(session.get(), &ptr);
671 ScopedSSL_SESSION session(SSL_SESSION_from_bytes(input.data(), input.size()));
672 if (session) {
761 ScopedSSL_SESSION session(SSL_SESSION_from_bytes(der.data(), der.size()));
762 if (!session) {
767 OPENSSL_free(session->tlsext_tick);
768 session->tlsext_tick = reinterpret_cast<uint8_t*>(OPENSSL_malloc(ticket_len));
769 if (session->tlsext_tick == nullptr) {
772 memset(session->tlsext_tick, 'a', ticket_len);
773 session->tlsext_ticklen = ticket_len;
776 session->time = time(NULL);
777 return session;
785 ScopedSSL_SESSION session = CreateSessionWithTicket(ticket_len);
786 if (!ctx || !session) {
791 if (!ssl || !bio || !SSL_set_session(ssl.get(), session.get())) {
884 static void AppendSession(SSL_SESSION *session, void *arg) {
887 out->push_back(session);
890 // ExpectCache returns true if |ctx|'s session cache consists of |expected|, in
896 for (SSL_SESSION *session : expected) {
897 if (ptr != session) {
943 for (SSL_SESSION *session : *sessions_) {
944 SSL_SESSION_free(session);
952 // Test that the internal session cache behaves as expected.
963 ScopedSSL_SESSION session = CreateTestSession(i);
964 if (!session) {
967 sessions.push_back(session.release());
973 for (SSL_SESSION *session : sessions) {
974 if (!SSL_CTX_add_session(ctx.get(), session)) {
996 // Although collisions should be impossible (256-bit session IDs), the cache