HomeSort by relevance Sort by last modified time
    Searched refs:new_session (Results 1 - 20 of 20) sorted by null

  /external/boringssl/src/ssl/
ssl_session.cc 188 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); local
189 if (!new_session) {
193 new_session->is_server = session->is_server;
194 new_session->ssl_version = session->ssl_version;
195 new_session->sid_ctx_length = session->sid_ctx_length;
196 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length);
199 new_session->master_key_length = session->master_key_length;
200 OPENSSL_memcpy(new_session->master_key, session->master_key,
202 new_session->cipher = session->cipher;
206 new_session->psk_identity = BUF_strdup(session->psk_identity)
    [all...]
handshake_server.cc 625 hs->new_session->session_id_length = 0;
638 hs->new_session->cipher = hs->new_cipher;
655 hs->new_session->verify_result = X509_V_OK;
725 const SSL_SESSION *session = hs->new_session.get();
818 hs->new_session->group_id = group_id;
    [all...]
tls13_both.cc 155 hs->new_session->peer_sha256);
205 CRYPTO_BUFFER_free(hs->new_session->ocsp_response);
206 hs->new_session->ocsp_response =
208 if (hs->new_session->ocsp_response == nullptr) {
229 CRYPTO_BUFFER_free(hs->new_session->signed_cert_timestamp_list);
230 hs->new_session->signed_cert_timestamp_list =
232 if (hs->new_session->signed_cert_timestamp_list == nullptr) {
248 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free);
249 hs->new_session->certs = certs.release();
251 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get()))
    [all...]
handshake.cc 295 sk_CRYPTO_BUFFER_num(hs->new_session->certs)) {
301 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs); i++) {
305 sk_CRYPTO_BUFFER_value(hs->new_session->certs, i);
320 set_crypto_buffer(&hs->new_session->ocsp_response,
322 set_crypto_buffer(&hs->new_session->signed_cert_timestamp_list,
324 hs->new_session->verify_result = prev_session->verify_result;
334 hs->new_session->verify_result = X509_V_OK;
342 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION;
349 hs->new_session.get(), ssl, &alert)
handshake_client.cc 675 hs->new_session->session_id_length = CBS_len(&session_id);
676 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id),
719 hs->new_session->cipher = cipher;
825 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free);
826 hs->new_session->certs = chain.release();
828 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs) == 0 ||
830 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) {
838 sk_CRYPTO_BUFFER_value(hs->new_session->certs, 0))) {
885 CRYPTO_BUFFER_free(hs->new_session->ocsp_response);
886 hs->new_session->ocsp_response
    [all...]
tls13_server.cc 159 ssl_session_rebase_time(ssl, hs->new_session.get());
163 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH));
383 hs->new_session =
403 if (hs->new_session == NULL) {
411 ssl_session_renew_timeout(ssl, hs->new_session.get(),
425 hs->new_session->cipher = hs->new_cipher;
429 hs->new_session->early_alpn = (uint8_t *)BUF_memdup(
431 if (hs->new_session->early_alpn == NULL) {
435 hs->new_session->early_alpn_len = ssl->s3->alpn_selected.size();
451 if (!tls13_init_key_schedule(hs, hs->new_session->master_key
    [all...]
tls13_client.cc 329 hs->new_session = SSL_SESSION_dup(ssl->session, SSL_SESSION_DUP_AUTH_ONLY);
330 if (!hs->new_session) {
337 ssl_session_renew_timeout(ssl, hs->new_session.get(),
344 hs->new_session->cipher = cipher;
352 if (!tls13_init_key_schedule(hs, hs->new_session->master_key,
353 hs->new_session->master_key_length)) {
421 hs->new_session->early_alpn = (uint8_t *)BUF_memdup(
423 if (hs->new_session->early_alpn == NULL) {
427 hs->new_session->early_alpn_len = ssl->s3->alpn_selected.size();
431 if (hs->early_session->cipher != hs->new_session->cipher |
    [all...]
tls_method.cc 138 static int ssl_noop_x509_session_dup(SSL_SESSION *new_session,
tls13_enc.cc 294 hs->new_session->master_key_length = hs->hash_len;
295 return derive_secret(hs, hs->new_session->master_key,
296 hs->new_session->master_key_length,
ssl_test.cc 2352 bssl::UniquePtr<SSL_SESSION> new_session = ExpectSessionRenewed( local
2472 bssl::UniquePtr<SSL_SESSION> new_session = local
    [all...]
ssl_x509.cc 332 static int ssl_crypto_x509_session_dup(SSL_SESSION *new_session,
336 new_session->x509_peer = session->x509_peer;
339 new_session->x509_chain = X509_chain_up_ref(session->x509_chain);
340 if (new_session->x509_chain == NULL) {
    [all...]
t1_lib.cc     [all...]
internal.h 1414 UniquePtr<SSL_SESSION> new_session; member in struct:bssl::SSL_HANDSHAKE
    [all...]
  /external/libmicrohttpd/src/testspdy/
test_session_timeout.c 46 int new_session; variable
91 if(!new_session)do_sleep = 1;
92 new_session = 1;
163 if(new_session && !closed_session)
228 /*if(new_session)
249 if(!new_session || !closed_session)
  /external/tensorflow/tensorflow/cc/client/
client_session.cc 54 Session* new_session; local
55 Status status = NewSession(session_options, &new_session);
57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr()));
  /external/toybox/toys/pending/
telnetd.c 182 static int new_session(int sockfd) function
322 pty_fd = new_session(master_fd); //master_fd = 0
369 pty_fd = new_session(new_fd);
  /external/boringssl/src/ssl/test/
bssl_shim.cc 111 bssl::UniquePtr<SSL_SESSION> new_session; member in struct:TestState
917 GetTestState(ssl)->new_session.reset(session);
1182 bssl::UniquePtr<SSL_SESSION> new_session = bssl::SSL_SESSION_dup( local
    [all...]
  /external/e2fsprogs/misc/
e4crypt.c 791 "e4crypt new_session\n\n" \
826 CMD(new_session),
  /external/f2fs-tools/tools/
f2fscrypt.c 836 "f2fscrypt new_session\n\n" \
870 CMD(new_session),
  /external/tensorflow/tensorflow/c/
c_api.cc 2422 TF_Session* new_session = new TF_Session(session, graph); local
    [all...]

Completed in 259 milliseconds