/external/boringssl/src/ssl/ |
D | ssl_session.cc | 193 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); in SSL_SESSION_dup() local 194 if (!new_session) { in SSL_SESSION_dup() 198 new_session->is_server = session->is_server; in SSL_SESSION_dup() 199 new_session->ssl_version = session->ssl_version; in SSL_SESSION_dup() 200 new_session->sid_ctx_length = session->sid_ctx_length; in SSL_SESSION_dup() 201 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); in SSL_SESSION_dup() 204 new_session->master_key_length = session->master_key_length; in SSL_SESSION_dup() 205 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup() 207 new_session->cipher = session->cipher; in SSL_SESSION_dup() 211 new_session->psk_identity.reset(BUF_strdup(session->psk_identity.get())); in SSL_SESSION_dup() [all …]
|
D | handshake_server.cc | 722 hs->new_session->session_id_length = 0; in do_select_parameters() 735 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 752 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 836 const SSL_SESSION *session = hs->new_session.get(); in do_send_server_hello() 931 hs->new_session->group_id = group_id; in do_send_server_certificate() 1091 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_client_certificate() 1093 ? hs->new_session->peer_sha256 in do_read_client_certificate() 1101 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_client_certificate() 1107 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in do_read_client_certificate() 1120 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate() [all …]
|
D | handshake.cc | 294 sk_CRYPTO_BUFFER_num(hs->new_session->certs.get())) { in ssl_verify_peer_cert() 300 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()); in ssl_verify_peer_cert() 305 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), i); in ssl_verify_peer_cert() 320 hs->new_session->ocsp_response = UpRef(prev_session->ocsp_response); in ssl_verify_peer_cert() 321 hs->new_session->signed_cert_timestamp_list = in ssl_verify_peer_cert() 323 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 333 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 341 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert() 348 hs->new_session.get(), hs, &alert) in ssl_verify_peer_cert()
|
D | tls13_both.cc | 224 hs->new_session->peer_sha256); in tls13_process_certificate() 274 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 297 hs->new_session->signed_cert_timestamp_list.reset( in tls13_process_certificate() 299 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in tls13_process_certificate() 314 hs->new_session->certs = std::move(certs); in tls13_process_certificate() 316 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in tls13_process_certificate() 322 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in tls13_process_certificate() 331 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate() 337 hs->new_session->peer_sha256_valid = retain_sha256; in tls13_process_certificate() [all …]
|
D | handshake_client.cc | 658 hs->new_session->session_id_length = CBS_len(&session_id); in do_read_server_hello() 659 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in do_read_server_hello() 702 hs->new_session->cipher = cipher; in do_read_server_hello() 807 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_server_certificate() 813 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0 || in do_read_server_certificate() 815 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_server_certificate() 823 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), 0))) { in do_read_server_certificate() 870 hs->new_session->ocsp_response.reset( in do_read_certificate_status() 872 if (hs->new_session->ocsp_response == nullptr) { in do_read_certificate_status() 999 hs->new_session->group_id = group_id; in do_read_server_key_exchange() [all …]
|
D | tls13_server.cc | 191 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() 195 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); in add_new_session_tickets() 422 hs->new_session = in do_select_session() 439 if (hs->new_session == NULL) { in do_select_session() 447 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_select_session() 461 hs->new_session->cipher = hs->new_cipher; in do_select_session() 464 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_select_session() 482 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_select_session() 483 hs->new_session->master_key_length)) { in do_select_session() 832 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate() [all …]
|
D | tls13_client.cc | 343 hs->new_session = in do_read_server_hello() 345 if (!hs->new_session) { in do_read_server_hello() 352 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_read_server_hello() 359 hs->new_session->cipher = cipher; in do_read_server_hello() 367 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_read_server_hello() 368 hs->new_session->master_key_length)) { in do_read_server_hello() 434 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_read_encrypted_extensions() 440 if (hs->early_session->cipher != hs->new_session->cipher || in do_read_encrypted_extensions()
|
D | ssl_x509.cc | 333 static int ssl_crypto_x509_session_dup(SSL_SESSION *new_session, in ssl_crypto_x509_session_dup() argument 335 new_session->x509_peer = UpRef(session->x509_peer).release(); in ssl_crypto_x509_session_dup() 337 new_session->x509_chain = X509_chain_up_ref(session->x509_chain); in ssl_crypto_x509_session_dup() 338 if (new_session->x509_chain == nullptr) { in ssl_crypto_x509_session_dup() 343 new_session->x509_chain_without_leaf = in ssl_crypto_x509_session_dup() 345 if (new_session->x509_chain_without_leaf == nullptr) { in ssl_crypto_x509_session_dup()
|
D | handoff.cc | 272 s3->session_reused ? ssl->session.get() : s3->hs->new_session.get(); in SSL_serialize_handback() 364 s3->hs->new_session = in SSL_apply_handback() 366 session = s3->hs->new_session.get(); in SSL_apply_handback()
|
D | tls13_enc.cc | 370 hs->new_session->master_key_length = hs->hash_len; in tls13_derive_resumption_secret() 371 return derive_secret(hs, hs->new_session->master_key, in tls13_derive_resumption_secret() 372 hs->new_session->master_key_length, in tls13_derive_resumption_secret()
|
D | tls_method.cc | 141 static int ssl_noop_x509_session_dup(SSL_SESSION *new_session, in ssl_noop_x509_session_dup() argument
|
D | ssl_test.cc | 2370 bssl::UniquePtr<SSL_SESSION> new_session = ExpectSessionRenewed( in TEST_P() local 2372 ASSERT_TRUE(new_session); in TEST_P() 2375 EXPECT_NE(session.get(), new_session.get()); in TEST_P() 2380 ASSERT_TRUE(GetServerTicketTime(&session_time, new_session.get())); in TEST_P() 2382 session_time = SSL_SESSION_get_time(new_session.get()); in TEST_P() 2392 new_session.get(), in TEST_P() 2398 new_session.get(), in TEST_P() 2408 new_session = ExpectSessionRenewed(client_ctx_.get(), server_ctx_.get(), in TEST_P() 2409 new_session.get()); in TEST_P() 2410 ASSERT_TRUE(new_session); in TEST_P() [all …]
|
D | t1_lib.cc | 1338 hs->new_session->signed_cert_timestamp_list.reset( in ext_sct_parse_serverhello() 1340 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in ext_sct_parse_serverhello() 2257 hs->new_session->group_id = group_id; in ssl_ext_key_share_parse_serverhello() 2344 hs->new_session->group_id = group_id; in ssl_ext_key_share_add_serverhello() 3870 sizeof(hs->new_session->original_handshake_hash) == EVP_MAX_MD_SIZE, in tls1_record_handshake_hashes_for_channel_id() 3874 if (!hs->transcript.GetHash(hs->new_session->original_handshake_hash, in tls1_record_handshake_hashes_for_channel_id() 3881 hs->new_session->original_handshake_hash_len = (uint8_t)digest_len; in tls1_record_handshake_hashes_for_channel_id()
|
D | internal.h | 1547 UniquePtr<SSL_SESSION> new_session; 2053 int (*session_dup)(SSL_SESSION *new_session, const SSL_SESSION *session);
|
/external/tensorflow/tensorflow/cc/client/ |
D | client_session.cc | 54 Session* new_session; in ClientSession() local 55 Status status = NewSession(session_options, &new_session); in ClientSession() 57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr())); in ClientSession()
|
/external/boringssl/src/ssl/test/ |
D | test_state.cc | 69 UniquePtr<SSL_SESSION> new_session = SSL_SESSION_dup( in ssl_ctx_add_session() local 71 if (new_session != nullptr) { in ssl_ctx_add_session() 72 SSL_CTX_add_session(ctx, new_session.get()); in ssl_ctx_add_session()
|
D | test_state.h | 53 bssl::UniquePtr<SSL_SESSION> new_session; member
|
D | bssl_shim.cc | 1021 GetTestState(ssl)->new_session->ticket_max_early_data != 0; in DoExchange() 1033 *out_session = std::move(GetTestState(ssl)->new_session); in DoExchange()
|
D | test_config.cc | 560 GetTestState(ssl)->new_session.reset(session); in NewSessionCallback()
|
/external/toybox/toys/pending/ |
D | telnetd.c | 182 static int new_session(int sockfd) in new_session() function 322 pty_fd = new_session(master_fd); //master_fd = 0 in telnetd_main() 369 pty_fd = new_session(new_fd); in telnetd_main()
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 831 CMD(new_session),
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 872 CMD(new_session),
|
/external/tensorflow/tensorflow/c/ |
D | c_api.cc | 2586 TF_Session* new_session = new TF_Session(session, graph); in TF_NewSession() local 2589 graph->sessions[new_session] = ""; in TF_NewSession() 2591 return new_session; in TF_NewSession()
|