/external/boringssl/src/ssl/ |
ssl_session.c | 186 SSL_SESSION *new_session = ssl_session_new(session->x509_method); local 187 if (new_session == NULL) { 191 new_session->is_server = session->is_server; 192 new_session->ssl_version = session->ssl_version; 193 new_session->sid_ctx_length = session->sid_ctx_length; 194 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); 197 new_session->master_key_length = session->master_key_length; 198 OPENSSL_memcpy(new_session->master_key, session->master_key, 200 new_session->cipher = session->cipher; 204 new_session->psk_identity = BUF_strdup(session->psk_identity) [all...] |
tls13_both.c | 228 hs->new_session->peer_sha256); 279 !CBS_stow(&ocsp_response, &hs->new_session->ocsp_response, 280 &hs->new_session->ocsp_response_length)) { 301 &sct, &hs->new_session->tlsext_signed_cert_timestamp_list, 302 &hs->new_session->tlsext_signed_cert_timestamp_list_length)) { 319 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free); 320 hs->new_session->certs = certs; 323 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session)) { 329 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs) == 0) { 338 hs->new_session->verify_result = X509_V_OK [all...] |
handshake_server.c | 396 * hashes in |hs->new_session| in case we need them to verify a 472 if (hs->new_session != NULL && 474 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free); 475 hs->new_session->certs = NULL; 476 ssl->ctx->x509_method->session_clear(hs->new_session); 484 ssl->s3->established_session = hs->new_session; 486 hs->new_session = NULL; 979 hs->new_session->session_id_length = 0; 992 hs->new_session->cipher = hs->new_cipher; 996 OPENSSL_free(hs->new_session->tlsext_hostname) [all...] |
handshake_client.c | 489 SSL_SESSION_dup(hs->new_session, SSL_SESSION_DUP_ALL); 496 SSL_SESSION_free(hs->new_session); 497 hs->new_session = NULL; 940 hs->new_session->session_id_length = CBS_len(&session_id); 941 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), [all...] |
tls13_client.c | 257 hs->new_session = SSL_SESSION_dup(ssl->session, SSL_SESSION_DUP_AUTH_ONLY); 258 if (hs->new_session == NULL) { 264 ssl_session_renew_timeout(ssl, hs->new_session, 271 hs->new_session->cipher = cipher; 281 if (!tls13_advance_key_schedule(hs, hs->new_session->master_key, 282 hs->new_session->master_key_length)) { 351 hs->new_session->early_alpn = 353 if (hs->new_session->early_alpn == NULL) { 357 hs->new_session->early_alpn_len = ssl->s3->alpn_selected_len; 361 if (ssl->session->cipher != hs->new_session->cipher | [all...] |
tls13_server.c | 145 SSL_SESSION *session = hs->new_session; 355 hs->new_session = SSL_SESSION_dup(session, SSL_SESSION_DUP_AUTH_ONLY); 372 if (hs->new_session == NULL) { 380 ssl_session_renew_timeout(ssl, hs->new_session, 394 hs->new_session->cipher = hs->new_cipher; 397 OPENSSL_free(hs->new_session->tlsext_hostname); 398 hs->new_session->tlsext_hostname = BUF_strdup(hs->hostname); 399 if (hs->new_session->tlsext_hostname == NULL) { 407 hs->new_session->early_alpn = 409 if (hs->new_session->early_alpn == NULL) [all...] |
tls_method.c | 274 static int ssl_noop_x509_session_dup(SSL_SESSION *new_session,
|
tls13_enc.c | 286 hs->new_session->master_key_length = hs->hash_len; 288 hs, hs->new_session->master_key, hs->new_session->master_key_length,
|
t1_enc.c | 333 if (hs->new_session != NULL) { 334 session = hs->new_session;
|
ssl_x509.c | 543 static int ssl_crypto_x509_session_dup(SSL_SESSION *new_session, 547 new_session->x509_peer = session->x509_peer; 550 new_session->x509_chain = X509_chain_up_ref(session->x509_chain); 551 if (new_session->x509_chain == NULL) { [all...] |
t1_lib.c | 619 OPENSSL_free(hs->new_session->tlsext_hostname); 620 hs->new_session->tlsext_hostname = BUF_strdup(ssl->tlsext_hostname); 621 if (!hs->new_session->tlsext_hostname) { [all...] |
ssl_test.cc | 2402 bssl::UniquePtr<SSL_SESSION> new_session = local [all...] |
s3_both.c | 170 SSL_SESSION_free(hs->new_session);
|
internal.h | 1069 SSL_SESSION *new_session; member in struct:ssl_handshake_st [all...] |
/external/libmicrohttpd/src/testspdy/ |
test_session_timeout.c | 46 int new_session; variable 91 if(!new_session)do_sleep = 1; 92 new_session = 1; 163 if(new_session && !closed_session) 228 /*if(new_session) 249 if(!new_session || !closed_session)
|
/external/toybox/toys/pending/ |
telnetd.c | 182 static int new_session(int sockfd) function 322 pty_fd = new_session(master_fd); //master_fd = 0 369 pty_fd = new_session(new_fd);
|
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 108 bssl::UniquePtr<SSL_SESSION> new_session; member in struct:TestState 876 GetTestState(ssl)->new_session.reset(session); [all...] |
/external/e2fsprogs/misc/ |
e4crypt.c | 791 "e4crypt new_session\n\n" \ 826 CMD(new_session),
|