Home
last modified time | relevance | path

Searched refs:new_session (Results 1 – 24 of 24) sorted by relevance

/external/boringssl/src/ssl/
Dssl_session.cc193 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); in SSL_SESSION_dup() local
194 if (!new_session) { in SSL_SESSION_dup()
198 new_session->is_server = session->is_server; in SSL_SESSION_dup()
199 new_session->ssl_version = session->ssl_version; in SSL_SESSION_dup()
200 new_session->sid_ctx_length = session->sid_ctx_length; in SSL_SESSION_dup()
201 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); in SSL_SESSION_dup()
204 new_session->master_key_length = session->master_key_length; in SSL_SESSION_dup()
205 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup()
207 new_session->cipher = session->cipher; in SSL_SESSION_dup()
211 new_session->psk_identity.reset(BUF_strdup(session->psk_identity.get())); in SSL_SESSION_dup()
[all …]
Dhandshake_server.cc777 hs->new_session->session_id_length = 0; in do_select_parameters()
790 hs->new_session->cipher = hs->new_cipher; in do_select_parameters()
807 hs->new_session->verify_result = X509_V_OK; in do_select_parameters()
891 const SSL_SESSION *session = hs->new_session.get(); in do_send_server_hello()
986 hs->new_session->group_id = group_id; in do_send_server_certificate()
1146 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_client_certificate()
1148 ? hs->new_session->peer_sha256 in do_read_client_certificate()
1156 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_client_certificate()
1162 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in do_read_client_certificate()
1175 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate()
[all …]
Dtls13_both.cc224 hs->new_session->peer_sha256); in tls13_process_certificate()
274 hs->new_session->ocsp_response.reset( in tls13_process_certificate()
276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate()
297 hs->new_session->signed_cert_timestamp_list.reset( in tls13_process_certificate()
299 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in tls13_process_certificate()
314 hs->new_session->certs = std::move(certs); in tls13_process_certificate()
316 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in tls13_process_certificate()
322 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in tls13_process_certificate()
331 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate()
337 hs->new_session->peer_sha256_valid = retain_sha256; in tls13_process_certificate()
[all …]
Dhandshake.cc301 sk_CRYPTO_BUFFER_num(hs->new_session->certs.get())) { in ssl_verify_peer_cert()
307 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()); in ssl_verify_peer_cert()
312 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), i); in ssl_verify_peer_cert()
327 hs->new_session->ocsp_response = UpRef(prev_session->ocsp_response); in ssl_verify_peer_cert()
328 hs->new_session->signed_cert_timestamp_list = in ssl_verify_peer_cert()
330 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert()
340 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert()
348 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert()
355 hs->new_session.get(), hs, &alert) in ssl_verify_peer_cert()
Dhandshake_client.cc663 hs->new_session->session_id_length = CBS_len(&session_id); in do_read_server_hello()
664 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in do_read_server_hello()
707 hs->new_session->cipher = cipher; in do_read_server_hello()
812 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_server_certificate()
818 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0 || in do_read_server_certificate()
820 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_server_certificate()
828 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), 0))) { in do_read_server_certificate()
875 hs->new_session->ocsp_response.reset( in do_read_certificate_status()
877 if (hs->new_session->ocsp_response == nullptr) { in do_read_certificate_status()
1004 hs->new_session->group_id = group_id; in do_read_server_key_exchange()
[all …]
Dtls13_server.cc135 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets()
139 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); in add_new_session_tickets()
366 hs->new_session = in do_select_session()
368 if (hs->new_session == nullptr) { in do_select_session()
399 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_select_session()
413 hs->new_session->cipher = hs->new_cipher; in do_select_session()
416 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_select_session()
435 hs, MakeConstSpan(hs->new_session->master_key, in do_select_session()
436 hs->new_session->master_key_length))) { in do_select_session()
568 if (!tls13_verify_psk_binder(hs, hs->new_session.get(), msg, &binders)) { in do_read_second_client_hello()
[all …]
Dtls13_client.cc344 hs->new_session = in do_read_server_hello()
346 if (!hs->new_session) { in do_read_server_hello()
353 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_read_server_hello()
360 hs->new_session->cipher = cipher; in do_read_server_hello()
369 hs, MakeConstSpan(hs->new_session->master_key, in do_read_server_hello()
370 hs->new_session->master_key_length))) { in do_read_server_hello()
437 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_read_encrypted_extensions()
443 if (hs->early_session->cipher != hs->new_session->cipher || in do_read_encrypted_extensions()
Dssl_x509.cc333 static bool ssl_crypto_x509_session_dup(SSL_SESSION *new_session, in ssl_crypto_x509_session_dup() argument
335 new_session->x509_peer = UpRef(session->x509_peer).release(); in ssl_crypto_x509_session_dup()
337 new_session->x509_chain = X509_chain_up_ref(session->x509_chain); in ssl_crypto_x509_session_dup()
338 if (new_session->x509_chain == nullptr) { in ssl_crypto_x509_session_dup()
343 new_session->x509_chain_without_leaf = in ssl_crypto_x509_session_dup()
345 if (new_session->x509_chain_without_leaf == nullptr) { in ssl_crypto_x509_session_dup()
Dhandoff.cc276 s3->session_reused ? ssl->session.get() : s3->hs->new_session.get(); in SSL_serialize_handback()
368 s3->hs->new_session = in SSL_apply_handback()
370 session = s3->hs->new_session.get(); in SSL_apply_handback()
Dtls13_enc.cc354 hs->new_session->master_key_length = hs->transcript.DigestLen(); in tls13_derive_resumption_secret()
357 MakeSpan(hs->new_session->master_key, hs->new_session->master_key_length), in tls13_derive_resumption_secret()
Dtls_method.cc141 static bool ssl_noop_x509_session_dup(SSL_SESSION *new_session, in ssl_noop_x509_session_dup() argument
Dssl_test.cc2443 bssl::UniquePtr<SSL_SESSION> new_session = ExpectSessionRenewed( in TEST_P() local
2445 ASSERT_TRUE(new_session); in TEST_P()
2448 EXPECT_NE(session.get(), new_session.get()); in TEST_P()
2453 ASSERT_TRUE(GetServerTicketTime(&session_time, new_session.get())); in TEST_P()
2455 session_time = SSL_SESSION_get_time(new_session.get()); in TEST_P()
2465 new_session.get(), in TEST_P()
2471 new_session.get(), in TEST_P()
2481 new_session = ExpectSessionRenewed(client_ctx_.get(), server_ctx_.get(), in TEST_P()
2482 new_session.get()); in TEST_P()
2483 ASSERT_TRUE(new_session); in TEST_P()
[all …]
Dt1_lib.cc1304 hs->new_session->signed_cert_timestamp_list.reset( in ext_sct_parse_serverhello()
1306 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in ext_sct_parse_serverhello()
2275 hs->new_session->group_id = group_id; in ssl_ext_key_share_parse_serverhello()
2362 hs->new_session->group_id = group_id; in ssl_ext_key_share_add_serverhello()
3956 sizeof(hs->new_session->original_handshake_hash) == EVP_MAX_MD_SIZE, in tls1_record_handshake_hashes_for_channel_id()
3960 if (!hs->transcript.GetHash(hs->new_session->original_handshake_hash, in tls1_record_handshake_hashes_for_channel_id()
3967 hs->new_session->original_handshake_hash_len = (uint8_t)digest_len; in tls1_record_handshake_hashes_for_channel_id()
Dinternal.h1677 UniquePtr<SSL_SESSION> new_session;
2185 bool (*session_dup)(SSL_SESSION *new_session, const SSL_SESSION *session);
/external/boringssl/src/ssl/test/
Dtest_state.cc69 UniquePtr<SSL_SESSION> new_session = SSL_SESSION_dup( in ssl_ctx_add_session() local
71 if (new_session != nullptr) { in ssl_ctx_add_session()
72 SSL_CTX_add_session(ctx, new_session.get()); in ssl_ctx_add_session()
Dtest_state.h53 bssl::UniquePtr<SSL_SESSION> new_session; member
Dbssl_shim.cc1070 GetTestState(ssl)->new_session->ticket_max_early_data != 0; in DoExchange()
1082 *out_session = std::move(GetTestState(ssl)->new_session); in DoExchange()
Dtest_config.cc561 GetTestState(ssl)->new_session.reset(session); in NewSessionCallback()
/external/tensorflow/tensorflow/cc/client/
Dclient_session.cc54 Session* new_session; in ClientSession() local
55 Status status = NewSession(session_options, &new_session); in ClientSession()
57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr())); in ClientSession()
/external/toybox/toys/pending/
Dtelnetd.c179 static int new_session(int sockfd) in new_session() function
319 pty_fd = new_session(master_fd); //master_fd = 0 in telnetd_main()
366 pty_fd = new_session(new_fd); in telnetd_main()
/external/e2fsprogs/misc/
De4crypt.c831 CMD(new_session),
/external/f2fs-tools/tools/
Df2fscrypt.c872 CMD(new_session),
/external/tensorflow/tensorflow/c/
Dc_api.cc2174 TF_Session* new_session = new TF_Session(session, graph); in TF_NewSession() local
2177 graph->sessions[new_session] = ""; in TF_NewSession()
2179 return new_session; in TF_NewSession()
/external/python/pyopenssl/tests/
Dtest_ssl.py2108 new_session = Session()
2109 assert isinstance(new_session, Session)