/external/boringssl/src/ssl/ |
ssl_session.cc | 188 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); local 189 if (!new_session) { 193 new_session->is_server = session->is_server; 194 new_session->ssl_version = session->ssl_version; 195 new_session->sid_ctx_length = session->sid_ctx_length; 196 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); 199 new_session->master_key_length = session->master_key_length; 200 OPENSSL_memcpy(new_session->master_key, session->master_key, 202 new_session->cipher = session->cipher; 206 new_session->psk_identity = BUF_strdup(session->psk_identity) [all...] |
handshake_server.cc | 625 hs->new_session->session_id_length = 0; 638 hs->new_session->cipher = hs->new_cipher; 655 hs->new_session->verify_result = X509_V_OK; 725 const SSL_SESSION *session = hs->new_session.get(); 818 hs->new_session->group_id = group_id; [all...] |
tls13_both.cc | 155 hs->new_session->peer_sha256); 205 CRYPTO_BUFFER_free(hs->new_session->ocsp_response); 206 hs->new_session->ocsp_response = 208 if (hs->new_session->ocsp_response == nullptr) { 229 CRYPTO_BUFFER_free(hs->new_session->signed_cert_timestamp_list); 230 hs->new_session->signed_cert_timestamp_list = 232 if (hs->new_session->signed_cert_timestamp_list == nullptr) { 248 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free); 249 hs->new_session->certs = certs.release(); 251 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) [all...] |
handshake.cc | 295 sk_CRYPTO_BUFFER_num(hs->new_session->certs)) { 301 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs); i++) { 305 sk_CRYPTO_BUFFER_value(hs->new_session->certs, i); 320 set_crypto_buffer(&hs->new_session->ocsp_response, 322 set_crypto_buffer(&hs->new_session->signed_cert_timestamp_list, 324 hs->new_session->verify_result = prev_session->verify_result; 334 hs->new_session->verify_result = X509_V_OK; 342 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; 349 hs->new_session.get(), ssl, &alert)
|
handshake_client.cc | 675 hs->new_session->session_id_length = CBS_len(&session_id); 676 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), 719 hs->new_session->cipher = cipher; 825 sk_CRYPTO_BUFFER_pop_free(hs->new_session->certs, CRYPTO_BUFFER_free); 826 hs->new_session->certs = chain.release(); 828 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs) == 0 || 830 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { 838 sk_CRYPTO_BUFFER_value(hs->new_session->certs, 0))) { 885 CRYPTO_BUFFER_free(hs->new_session->ocsp_response); 886 hs->new_session->ocsp_response [all...] |
tls13_server.cc | 159 ssl_session_rebase_time(ssl, hs->new_session.get()); 163 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); 383 hs->new_session = 403 if (hs->new_session == NULL) { 411 ssl_session_renew_timeout(ssl, hs->new_session.get(), 425 hs->new_session->cipher = hs->new_cipher; 429 hs->new_session->early_alpn = (uint8_t *)BUF_memdup( 431 if (hs->new_session->early_alpn == NULL) { 435 hs->new_session->early_alpn_len = ssl->s3->alpn_selected.size(); 451 if (!tls13_init_key_schedule(hs, hs->new_session->master_key [all...] |
tls13_client.cc | 329 hs->new_session = SSL_SESSION_dup(ssl->session, SSL_SESSION_DUP_AUTH_ONLY); 330 if (!hs->new_session) { 337 ssl_session_renew_timeout(ssl, hs->new_session.get(), 344 hs->new_session->cipher = cipher; 352 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, 353 hs->new_session->master_key_length)) { 421 hs->new_session->early_alpn = (uint8_t *)BUF_memdup( 423 if (hs->new_session->early_alpn == NULL) { 427 hs->new_session->early_alpn_len = ssl->s3->alpn_selected.size(); 431 if (hs->early_session->cipher != hs->new_session->cipher | [all...] |
tls_method.cc | 138 static int ssl_noop_x509_session_dup(SSL_SESSION *new_session,
|
tls13_enc.cc | 294 hs->new_session->master_key_length = hs->hash_len; 295 return derive_secret(hs, hs->new_session->master_key, 296 hs->new_session->master_key_length,
|
ssl_test.cc | 2352 bssl::UniquePtr<SSL_SESSION> new_session = ExpectSessionRenewed( local 2472 bssl::UniquePtr<SSL_SESSION> new_session = local [all...] |
ssl_x509.cc | 332 static int ssl_crypto_x509_session_dup(SSL_SESSION *new_session, 336 new_session->x509_peer = session->x509_peer; 339 new_session->x509_chain = X509_chain_up_ref(session->x509_chain); 340 if (new_session->x509_chain == NULL) { [all...] |
t1_lib.cc | [all...] |
internal.h | 1414 UniquePtr<SSL_SESSION> new_session; member in struct:bssl::SSL_HANDSHAKE [all...] |
/external/libmicrohttpd/src/testspdy/ |
test_session_timeout.c | 46 int new_session; variable 91 if(!new_session)do_sleep = 1; 92 new_session = 1; 163 if(new_session && !closed_session) 228 /*if(new_session) 249 if(!new_session || !closed_session)
|
/external/tensorflow/tensorflow/cc/client/ |
client_session.cc | 54 Session* new_session; local 55 Status status = NewSession(session_options, &new_session); 57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr()));
|
/external/toybox/toys/pending/ |
telnetd.c | 182 static int new_session(int sockfd) function 322 pty_fd = new_session(master_fd); //master_fd = 0 369 pty_fd = new_session(new_fd);
|
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 111 bssl::UniquePtr<SSL_SESSION> new_session; member in struct:TestState 917 GetTestState(ssl)->new_session.reset(session); 1182 bssl::UniquePtr<SSL_SESSION> new_session = bssl::SSL_SESSION_dup( local [all...] |
/external/e2fsprogs/misc/ |
e4crypt.c | 791 "e4crypt new_session\n\n" \ 826 CMD(new_session),
|
/external/f2fs-tools/tools/ |
f2fscrypt.c | 836 "f2fscrypt new_session\n\n" \ 870 CMD(new_session),
|
/external/tensorflow/tensorflow/c/ |
c_api.cc | 2422 TF_Session* new_session = new TF_Session(session, graph); local [all...] |