/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_session_id_context.pod | 11 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, 13 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, 18 SSL_CTX_set_session_id_context() sets the context B<sid_ctx> of length 21 SSL_set_session_id_context() sets the context B<sid_ctx> of length 30 must set its own session id context B<sid_ctx> which is used to distinguish 31 the contexts and is stored in exported sessions. The B<sid_ctx> can be 44 The maximum length of the B<sid_ctx> is limited to 69 The length B<sid_ctx_len> of the session id context B<sid_ctx> exceeded
|
D | SSL_SESSION_get0_id_context.pod | 15 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, 31 B<sid_ctx> and associates it with the session B<s>. The length of the ID context
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 295 return s->sid_ctx; in SSL_SESSION_get0_id_context() 462 if (s->sid_ctx_length > sizeof(ss->sid_ctx)) { in ssl_get_new_session() 467 memcpy(ss->sid_ctx, s->sid_ctx, s->sid_ctx_length); in ssl_get_new_session() 620 || memcmp(ret->sid_ctx, s->sid_ctx, ret->sid_ctx_length)) { in ssl_get_prev_session() 1050 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, in SSL_SESSION_set1_id_context() argument 1058 if (sid_ctx != s->sid_ctx) in SSL_SESSION_set1_id_context() 1059 memcpy(s->sid_ctx, sid_ctx, sid_ctx_len); in SSL_SESSION_set1_id_context()
|
D | ssl_asn1.c | 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 163 ssl_session_oinit(&as.session_id_context, &sid_ctx, in i2d_SSL_SESSION() 164 in->sid_ctx, in->sid_ctx_length); in i2d_SSL_SESSION() 319 if (!ssl_session_memcpy(ret->sid_ctx, &ret->sid_ctx_length, in d2i_SSL_SESSION()
|
D | ssl_lib.c | 737 if (!ossl_assert(s->sid_ctx_length <= sizeof(s->sid_ctx))) in SSL_new() 739 memcpy(&s->sid_ctx, &ctx->sid_ctx, sizeof(s->sid_ctx)); in SSL_new() 874 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, in SSL_CTX_set_session_id_context() argument 882 memcpy(ctx->sid_ctx, sid_ctx, sid_ctx_len); in SSL_CTX_set_session_id_context() 887 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, in SSL_set_session_id_context() argument 895 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len); in SSL_set_session_id_context() 1639 if (!SSL_set_session_id_context(t, f->sid_ctx, (int)f->sid_ctx_length)) { in SSL_copy_session_id() 4093 if (!SSL_set_session_id_context(ret, s->sid_ctx, in SSL_dup() 4339 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx))) in SSL_set_SSL_CTX() 4350 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) { in SSL_set_SSL_CTX() [all …]
|
D | ssl_txt.c | 72 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) in SSL_SESSION_print()
|
D | ssl_local.h | 575 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member 986 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member 1502 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | types.rs | 474 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 541 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 639 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 772 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 820 sid_ctx: [c_uchar; 32], 890 sid_ctx: [c_uchar; 32],
|
D | ssl.rs | 18 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 42 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 76 sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], 585 sid_ctx: *const c_uchar, in SSL_CTX_set_session_id_context()
|
/third_party/nghttp2/src/ |
D | shrpx_tls.cc | 972 const unsigned char sid_ctx[] = "shrpx"; in create_ssl_context() local 973 SSL_CTX_set_session_id_context(ssl_ctx, sid_ctx, sizeof(sid_ctx) - 1); in create_ssl_context() 1273 const unsigned char sid_ctx[] = "shrpx"; in create_quic_ssl_context() local 1274 SSL_CTX_set_session_id_context(ssl_ctx, sid_ctx, sizeof(sid_ctx) - 1); in create_quic_ssl_context()
|
D | HttpServer.cc | 2155 const unsigned char sid_ctx[] = "nghttpd"; in run() local 2156 SSL_CTX_set_session_id_context(ssl_ctx, sid_ctx, sizeof(sid_ctx) - 1); in run()
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | mod.rs | 942 pub fn set_session_id_context(&mut self, sid_ctx: &[u8]) -> Result<(), ErrorStack> { in set_session_id_context() 944 assert!(sid_ctx.len() <= c_uint::max_value() as usize); in set_session_id_context() 947 sid_ctx.as_ptr(), in set_session_id_context() 948 sid_ctx.len() as SizeTy, in set_session_id_context()
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | ssl.h | 1645 const unsigned char *sid_ctx, 1720 const unsigned char *sid_ctx, 1726 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 1090 memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length); in tls_parse_ctos_psk()
|
D | statem_clnt.c | 1563 || memcmp(s->session->sid_ctx, s->sid_ctx, s->sid_ctx_length)) { in tls_process_server_hello()
|
/third_party/openssl/include/openssl/ |
D | ssl.h.in | 1683 const unsigned char *sid_ctx, 1765 const unsigned char *sid_ctx, 1771 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
|
/third_party/node/src/ |
D | node_crypto.cc | 1363 const unsigned char* sid_ctx = in SetSessionIdContext() local 1367 int r = SSL_CTX_set_session_id_context(sc->ctx_.get(), sid_ctx, sid_ctx_len); in SetSessionIdContext()
|
/third_party/libabigail/tests/data/test-diff-pkg/ |
D | spice-server-0.12.4-19.el7.x86_64-0.12.8-1.el7.x86_64-report-2.txt | 248 … 'unsigned char sid_ctx[32]', at offset 2144 (in bits) at ssl.h:1180:1
|