/external/boringssl/src/ssl/ |
D | ssl_session.cc | 193 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); in SSL_SESSION_dup() local 194 if (!new_session) { in SSL_SESSION_dup() 198 new_session->is_server = session->is_server; in SSL_SESSION_dup() 199 new_session->ssl_version = session->ssl_version; in SSL_SESSION_dup() 200 new_session->sid_ctx_length = session->sid_ctx_length; in SSL_SESSION_dup() 201 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); in SSL_SESSION_dup() 204 new_session->master_key_length = session->master_key_length; in SSL_SESSION_dup() 205 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup() 207 new_session->cipher = session->cipher; in SSL_SESSION_dup() 211 new_session->psk_identity.reset(BUF_strdup(session->psk_identity.get())); in SSL_SESSION_dup() [all …]
|
D | handshake_server.cc | 777 hs->new_session->session_id_length = 0; in do_select_parameters() 790 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 807 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 891 const SSL_SESSION *session = hs->new_session.get(); in do_send_server_hello() 986 hs->new_session->group_id = group_id; in do_send_server_certificate() 1146 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_client_certificate() 1148 ? hs->new_session->peer_sha256 in do_read_client_certificate() 1156 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_client_certificate() 1162 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in do_read_client_certificate() 1175 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate() [all …]
|
D | tls13_both.cc | 224 hs->new_session->peer_sha256); in tls13_process_certificate() 274 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 297 hs->new_session->signed_cert_timestamp_list.reset( in tls13_process_certificate() 299 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in tls13_process_certificate() 314 hs->new_session->certs = std::move(certs); in tls13_process_certificate() 316 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in tls13_process_certificate() 322 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in tls13_process_certificate() 331 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate() 337 hs->new_session->peer_sha256_valid = retain_sha256; in tls13_process_certificate() [all …]
|
D | handshake.cc | 301 sk_CRYPTO_BUFFER_num(hs->new_session->certs.get())) { in ssl_verify_peer_cert() 307 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()); in ssl_verify_peer_cert() 312 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), i); in ssl_verify_peer_cert() 327 hs->new_session->ocsp_response = UpRef(prev_session->ocsp_response); in ssl_verify_peer_cert() 328 hs->new_session->signed_cert_timestamp_list = in ssl_verify_peer_cert() 330 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 340 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 348 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert() 355 hs->new_session.get(), hs, &alert) in ssl_verify_peer_cert()
|
D | handshake_client.cc | 663 hs->new_session->session_id_length = CBS_len(&session_id); in do_read_server_hello() 664 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in do_read_server_hello() 707 hs->new_session->cipher = cipher; in do_read_server_hello() 812 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_server_certificate() 818 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0 || in do_read_server_certificate() 820 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_server_certificate() 828 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), 0))) { in do_read_server_certificate() 875 hs->new_session->ocsp_response.reset( in do_read_certificate_status() 877 if (hs->new_session->ocsp_response == nullptr) { in do_read_certificate_status() 1004 hs->new_session->group_id = group_id; in do_read_server_key_exchange() [all …]
|
D | tls13_server.cc | 135 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() 139 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); in add_new_session_tickets() 366 hs->new_session = in do_select_session() 368 if (hs->new_session == nullptr) { in do_select_session() 399 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_select_session() 413 hs->new_session->cipher = hs->new_cipher; in do_select_session() 416 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_select_session() 435 hs, MakeConstSpan(hs->new_session->master_key, in do_select_session() 436 hs->new_session->master_key_length))) { in do_select_session() 568 if (!tls13_verify_psk_binder(hs, hs->new_session.get(), msg, &binders)) { in do_read_second_client_hello() [all …]
|
D | tls13_client.cc | 344 hs->new_session = in do_read_server_hello() 346 if (!hs->new_session) { in do_read_server_hello() 353 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_read_server_hello() 360 hs->new_session->cipher = cipher; in do_read_server_hello() 369 hs, MakeConstSpan(hs->new_session->master_key, in do_read_server_hello() 370 hs->new_session->master_key_length))) { in do_read_server_hello() 437 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_read_encrypted_extensions() 443 if (hs->early_session->cipher != hs->new_session->cipher || in do_read_encrypted_extensions()
|
D | ssl_x509.cc | 333 static bool ssl_crypto_x509_session_dup(SSL_SESSION *new_session, in ssl_crypto_x509_session_dup() argument 335 new_session->x509_peer = UpRef(session->x509_peer).release(); in ssl_crypto_x509_session_dup() 337 new_session->x509_chain = X509_chain_up_ref(session->x509_chain); in ssl_crypto_x509_session_dup() 338 if (new_session->x509_chain == nullptr) { in ssl_crypto_x509_session_dup() 343 new_session->x509_chain_without_leaf = in ssl_crypto_x509_session_dup() 345 if (new_session->x509_chain_without_leaf == nullptr) { in ssl_crypto_x509_session_dup()
|
D | handoff.cc | 276 s3->session_reused ? ssl->session.get() : s3->hs->new_session.get(); in SSL_serialize_handback() 368 s3->hs->new_session = in SSL_apply_handback() 370 session = s3->hs->new_session.get(); in SSL_apply_handback()
|
D | tls13_enc.cc | 354 hs->new_session->master_key_length = hs->transcript.DigestLen(); in tls13_derive_resumption_secret() 357 MakeSpan(hs->new_session->master_key, hs->new_session->master_key_length), in tls13_derive_resumption_secret()
|
D | tls_method.cc | 141 static bool ssl_noop_x509_session_dup(SSL_SESSION *new_session, in ssl_noop_x509_session_dup() argument
|
D | ssl_test.cc | 2443 bssl::UniquePtr<SSL_SESSION> new_session = ExpectSessionRenewed( in TEST_P() local 2445 ASSERT_TRUE(new_session); in TEST_P() 2448 EXPECT_NE(session.get(), new_session.get()); in TEST_P() 2453 ASSERT_TRUE(GetServerTicketTime(&session_time, new_session.get())); in TEST_P() 2455 session_time = SSL_SESSION_get_time(new_session.get()); in TEST_P() 2465 new_session.get(), in TEST_P() 2471 new_session.get(), in TEST_P() 2481 new_session = ExpectSessionRenewed(client_ctx_.get(), server_ctx_.get(), in TEST_P() 2482 new_session.get()); in TEST_P() 2483 ASSERT_TRUE(new_session); in TEST_P() [all …]
|
D | t1_lib.cc | 1304 hs->new_session->signed_cert_timestamp_list.reset( in ext_sct_parse_serverhello() 1306 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in ext_sct_parse_serverhello() 2275 hs->new_session->group_id = group_id; in ssl_ext_key_share_parse_serverhello() 2362 hs->new_session->group_id = group_id; in ssl_ext_key_share_add_serverhello() 3956 sizeof(hs->new_session->original_handshake_hash) == EVP_MAX_MD_SIZE, in tls1_record_handshake_hashes_for_channel_id() 3960 if (!hs->transcript.GetHash(hs->new_session->original_handshake_hash, in tls1_record_handshake_hashes_for_channel_id() 3967 hs->new_session->original_handshake_hash_len = (uint8_t)digest_len; in tls1_record_handshake_hashes_for_channel_id()
|
D | internal.h | 1677 UniquePtr<SSL_SESSION> new_session; 2185 bool (*session_dup)(SSL_SESSION *new_session, const SSL_SESSION *session);
|
/external/boringssl/src/ssl/test/ |
D | test_state.cc | 69 UniquePtr<SSL_SESSION> new_session = SSL_SESSION_dup( in ssl_ctx_add_session() local 71 if (new_session != nullptr) { in ssl_ctx_add_session() 72 SSL_CTX_add_session(ctx, new_session.get()); in ssl_ctx_add_session()
|
D | test_state.h | 53 bssl::UniquePtr<SSL_SESSION> new_session; member
|
D | bssl_shim.cc | 1070 GetTestState(ssl)->new_session->ticket_max_early_data != 0; in DoExchange() 1082 *out_session = std::move(GetTestState(ssl)->new_session); in DoExchange()
|
D | test_config.cc | 561 GetTestState(ssl)->new_session.reset(session); in NewSessionCallback()
|
/external/tensorflow/tensorflow/cc/client/ |
D | client_session.cc | 54 Session* new_session; in ClientSession() local 55 Status status = NewSession(session_options, &new_session); in ClientSession() 57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr())); in ClientSession()
|
/external/toybox/toys/pending/ |
D | telnetd.c | 179 static int new_session(int sockfd) in new_session() function 319 pty_fd = new_session(master_fd); //master_fd = 0 in telnetd_main() 366 pty_fd = new_session(new_fd); in telnetd_main()
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 831 CMD(new_session),
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 872 CMD(new_session),
|
/external/tensorflow/tensorflow/c/ |
D | c_api.cc | 2174 TF_Session* new_session = new TF_Session(session, graph); in TF_NewSession() local 2177 graph->sessions[new_session] = ""; in TF_NewSession() 2179 return new_session; in TF_NewSession()
|
/external/python/pyopenssl/tests/ |
D | test_ssl.py | 2108 new_session = Session() 2109 assert isinstance(new_session, Session)
|