/system/netd/server/dns/ |
DnsTlsSessionCache.h | 45 // bssl::UniquePtr<SSL_SESSION> is actually serving as a reference counted 47 bssl::UniquePtr<SSL_SESSION> getSession() EXCLUDES(mLock); 51 static int newSessionCallback(SSL* _Nullable ssl, SSL_SESSION* _Nullable session); 54 void recordSession(SSL_SESSION* _Nullable session) EXCLUDES(mLock); 57 std::deque<bssl::UniquePtr<SSL_SESSION>> mSessions GUARDED_BY(mLock);
|
DnsTlsSessionCache.cpp | 40 int DnsTlsSessionCache::newSessionCallback(SSL* ssl, SSL_SESSION* session) { 56 void DnsTlsSessionCache::recordSession(SSL_SESSION* session) { 65 bssl::UniquePtr<SSL_SESSION> DnsTlsSessionCache::getSession() { 71 bssl::UniquePtr<SSL_SESSION> ret = std::move(mSessions.front());
|
/external/boringssl/src/include/openssl/ |
lhash_macros.h | 137 // SSL_SESSION 139 ((LHASH_OF(SSL_SESSION) *)lh_new( \ 140 CHECKED_CAST(lhash_hash_func, uint32_t(*)(const SSL_SESSION *), hash), \ 142 int (*)(const SSL_SESSION *a, const SSL_SESSION *b), \ 146 lh_free(CHECKED_CAST(_LHASH *, LHASH_OF(SSL_SESSION) *, lh)); 149 lh_num_items(CHECKED_CAST(_LHASH *, LHASH_OF(SSL_SESSION) *, lh)) 152 ((SSL_SESSION *)lh_retrieve( \ 153 CHECKED_CAST(_LHASH *, LHASH_OF(SSL_SESSION) *, lh), \ 154 CHECKED_CAST(void *, SSL_SESSION *, data)) [all...] |
ssl.h | [all...] |
base.h | 329 typedef struct ssl_session_st SSL_SESSION;
|
/external/boringssl/src/ssl/ |
ssl_session.cc | 164 static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *session); 165 static void SSL_SESSION_list_add(SSL_CTX *ctx, SSL_SESSION *session); 166 static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *session, int lock); 168 UniquePtr<SSL_SESSION> ssl_session_new(const SSL_X509_METHOD *x509_method) { 169 UniquePtr<SSL_SESSION> session( 170 (SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION))); 175 OPENSSL_memset(session.get(), 0, sizeof(SSL_SESSION)); 187 UniquePtr<SSL_SESSION> SSL_SESSION_dup(SSL_SESSION *session, int dup_flags) [all...] |
tls_method.cc | 135 static int ssl_noop_x509_session_cache_objects(SSL_SESSION *sess) { 138 static int ssl_noop_x509_session_dup(SSL_SESSION *new_session, 139 const SSL_SESSION *session) { 142 static void ssl_noop_x509_session_clear(SSL_SESSION *session) {} 143 static int ssl_noop_x509_session_verify_cert_chain(SSL_SESSION *session,
|
ssl_x509.cc | 293 static int ssl_crypto_x509_session_cache_objects(SSL_SESSION *sess) { 332 static int ssl_crypto_x509_session_dup(SSL_SESSION *new_session, 333 const SSL_SESSION *session) { 348 static void ssl_crypto_x509_session_clear(SSL_SESSION *session) { 357 static int ssl_crypto_x509_session_verify_cert_chain(SSL_SESSION *session, 525 SSL_SESSION *session = SSL_get_session(ssl); 538 SSL_SESSION *session = SSL_get_session(ssl); 572 SSL_SESSION *session = SSL_get_session(ssl); 701 SSL_SESSION *session = SSL_get_session(ssl); 961 static SSL_SESSION *ssl_session_new_with_crypto_x509(void) [all...] |
internal.h | 568 const SSL_SESSION *session, 575 bool GetFinishedMAC(uint8_t *out, size_t *out_len, const SSL_SESSION *session, [all...] |
ssl_asn1.cc | 109 // An SSL_SESSION is serialized as the following ASN.1 structure: 200 static int SSL_SESSION_to_bytes_full(const SSL_SESSION *in, CBB *cbb, 527 UniquePtr<SSL_SESSION> SSL_SESSION_parse(CBS *cbs, 530 UniquePtr<SSL_SESSION> ret = ssl_session_new(x509_method); 759 int ssl_session_serialize(const SSL_SESSION *in, CBB *cbb) { 767 int SSL_SESSION_to_bytes(const SSL_SESSION *in, uint8_t **out_data, 795 int SSL_SESSION_to_bytes_for_ticket(const SSL_SESSION *in, uint8_t **out_data, 807 int i2d_SSL_SESSION(SSL_SESSION *in, uint8_t **pp) { 830 SSL_SESSION *SSL_SESSION_from_bytes(const uint8_t *in, size_t in_len, 834 UniquePtr<SSL_SESSION> ret [all...] |
ssl_versions.cc | 387 const char *SSL_SESSION_get_version(const SSL_SESSION *session) { 391 uint16_t SSL_SESSION_get_protocol_version(const SSL_SESSION *session) { 395 int SSL_SESSION_set_protocol_version(SSL_SESSION *session, uint16_t version) {
|
ssl_test.cc | 513 // kOpenSSLSession is a serialized SSL_SESSION. 547 // kCustomSession is a custom serialized SSL_SESSION generated by 560 // kBoringSSLSession is a serialized SSL_SESSION generated from bssl client. 658 // kBadSessionExtraField is a custom serialized SSL_SESSION generated by replacing 670 // kBadSessionVersion is a custom serialized SSL_SESSION generated by replacing 682 // kBadSessionTrailingData is a custom serialized SSL_SESSION with trailing data 721 // Verify the SSL_SESSION decodes. 726 bssl::UniquePtr<SSL_SESSION> session( 733 // Verify the SSL_SESSION encoding round-trips. 750 // Verify the SSL_SESSION also decodes with the legacy API [all...] |
ssl_transcript.cc | 274 static bool SSL3HandshakeMAC(const SSL_SESSION *session, 322 const SSL_SESSION *session, 348 const SSL_SESSION *session,
|
tls13_enc.cc | 139 const SSL_SESSION *session = SSL_get_session(ssl); 341 bool tls13_derive_session_psk(SSL_SESSION *session, Span<const uint8_t> nonce) { 448 int tls13_verify_psk_binder(SSL_HANDSHAKE *hs, SSL_SESSION *session,
|
handshake.cc | 276 // TODO(davidben): Remove this helper once |SSL_SESSION| can use |UniquePtr| 287 const SSL_SESSION *prev_session = ssl->s3->established_session.get(); 433 const SSL_SESSION *session = SSL_get_session(ssl);
|
t1_enc.cc | 353 const SSL_SESSION *session = SSL_get_session(ssl); 422 const SSL_SESSION *session = SSL_get_session(ssl);
|
tls13_server.cc | 162 UniquePtr<SSL_SESSION> session( 269 SSL_HANDSHAKE *hs, uint8_t *out_alert, UniquePtr<SSL_SESSION> *out_session, 303 UniquePtr<SSL_SESSION> session; 369 UniquePtr<SSL_SESSION> session; [all...] |
ssl_lib.cc | 486 static uint32_t ssl_session_hash(const SSL_SESSION *sess) { 508 // able to construct an SSL_SESSION that will collide with any existing session 510 static int ssl_session_cmp(const SSL_SESSION *a, const SSL_SESSION *b) { [all...] |
handshake_server.cc | 586 UniquePtr<SSL_SESSION> session; 725 const SSL_SESSION *session = hs->new_session.get(); [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
NativeRef.java | 138 static final class SSL_SESSION extends NativeRef { 139 SSL_SESSION(long nativePointer) {
|
NativeSslSession.java | 41 * A utility wrapper that abstracts operations on the underlying native SSL_SESSION instance. 50 * session information via the SSL_SESSION, we get some values (e.g. peer certs) from 53 static NativeSslSession newInstance(NativeRef.SSL_SESSION ref, ConscryptSession session) 153 NativeRef.SSL_SESSION ref = 154 new NativeRef.SSL_SESSION(NativeCrypto.d2i_SSL_SESSION(sessionData)); 213 private final NativeRef.SSL_SESSION ref; 215 // BoringSSL offers no API to obtain these values directly from the SSL_SESSION. 225 private Impl(AbstractSessionContext context, NativeRef.SSL_SESSION ref, String host,
|
ConscryptFileDescriptorSocket.java | 48 import org.conscrypt.NativeRef.SSL_SESSION; 366 // Create a native reference which will release the SSL_SESSION in its finalizer. 369 NativeRef.SSL_SESSION ref = new SSL_SESSION(sslSessionNativePtr); [all...] |
/external/boringssl/src/tool/ |
client.cc | 177 static bssl::UniquePtr<SSL_SESSION> resume_session; 179 static int NewSessionCallback(SSL *ssl, SSL_SESSION *session) { 188 resume_session = bssl::UniquePtr<SSL_SESSION>(session); 273 bssl::UniquePtr<SSL_SESSION> session(PEM_read_bio_SSL_SESSION(in.get(),
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/TlsLib/ |
TlsConfig.c | 373 SSL_SESSION *Session; 803 SSL_SESSION *Session; 904 SSL_SESSION *Session;
|
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 100 bssl::UniquePtr<SSL_SESSION> session; 101 bssl::UniquePtr<SSL_SESSION> pending_session; 111 bssl::UniquePtr<SSL_SESSION> new_session; 860 static SSL_SESSION *GetSessionCallback(SSL *ssl, const uint8_t *data, int len, 907 static int NewSessionCallback(SSL *ssl, SSL_SESSION *session) { [all...] |